full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/1270.ps1
|
1270.ps1
|
function Start-CDscPullConfiguration
{
[CmdletBinding(DefaultParameterSetName='WithCredentials')]
param(
[Parameter(Mandatory=$true,ParameterSetName='WithCredentials')]
[string[]]
$ComputerName,
[Parameter(ParameterSetName='WithCredentials')]
[PSCredential]
$Credential,
[Parameter(ParameterSetName='WithCimSession')]
[Microsoft.Management.Infrastructure.CimSession[]]
$CimSession,
[string[]]
$ModuleName
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$credentialParam = @{ }
if( $PSCmdlet.ParameterSetName -eq 'WithCredentials' )
{
if( $Credential )
{
$credentialParam.Credential = $Credential
}
$CimSession = New-CimSession -ComputerName $ComputerName @credentialParam
if( -not $CimSession )
{
return
}
}
$CimSession = Get-DscLocalConfigurationManager -CimSession $CimSession |
ForEach-Object {
if( $_.RefreshMode -ne 'Pull' )
{
Write-Error ('The Local Configuration Manager on ''{0}'' is not in Pull mode (current RefreshMode is ''{1}'').' -f $_.PSComputerName,$_.RefreshMode)
return
}
foreach( $session in $CimSession )
{
if( $session.ComputerName -eq $_.PSComputerName )
{
return $session
}
}
}
if( -not $CimSession )
{
return
}
Invoke-Command -ComputerName $CimSession.ComputerName @credentialParam -ScriptBlock {
$modulesRoot = Join-Path -Path $env:ProgramFiles -ChildPath 'WindowsPowerShell\Modules'
Get-ChildItem -Path $modulesRoot -Filter '*_tmp' -Directory |
Remove-Item -Recurse
}
if( $ModuleName )
{
Invoke-Command -ComputerName $CimSession.ComputerName @credentialParam -ScriptBlock {
param(
[string[]]
$ModuleName
)
$dscProcessID = Get-WmiObject msft_providers |
Where-Object {$_.provider -like 'dsccore'} |
Select-Object -ExpandProperty HostProcessIdentifier
Stop-Process -Id $dscProcessID -Force
$modulesRoot = Join-Path -Path $env:ProgramFiles -ChildPath 'WindowsPowerShell\Modules'
Get-ChildItem -Path $modulesRoot -Directory |
Where-Object { $ModuleName -contains $_.Name } |
Remove-Item -Recurse
} -ArgumentList (,$ModuleName)
}
$win32OS = Get-CimInstance -CimSession $CimSession -ClassName 'Win32_OperatingSystem'
$results = Invoke-CimMethod -CimSession $CimSession `
-Namespace 'root/microsoft/windows/desiredstateconfiguration' `
-Class 'MSFT_DscLocalConfigurationManager' `
-MethodName 'PerformRequiredConfigurationChecks' `
-Arguments @{ 'Flags' = [uint32]1 }
$successfulComputers = $results | Where-Object { $_ -and $_.ReturnValue -eq 0 } | Select-Object -ExpandProperty 'PSComputerName'
$CimSession |
Where-Object { $successfulComputers -notcontains $_.ComputerName } |
ForEach-Object {
$session = $_
$startedAt= $win32OS | Where-Object { $_.PSComputerName -eq $session.ComputerName } | Select-Object -ExpandProperty 'LocalDateTime'
Get-CDscError -ComputerName $session.ComputerName -StartTime $startedAt -Wait
} |
Write-CDscError
}
|
combined_dataset/train/non-malicious/sample_17_81.ps1
|
sample_17_81.ps1
|
$ErrorActionPreference = "Stop"
Set-StrictMode -Version Latest
Set-Variable -Option Constant -Name CameraPnPClassName -Value "Camera"
Set-Variable -Option Constant -Name ImagePnPClassName -Value "Image"
Set-Variable -Option Constant -Name DeviceParametersKeyName -Value "Device Parameters"
Set-Variable -Option Constant -Name EnumRegistryPath -Value "HKLM:\SYSTEM\CurrentControlSet\Enum"
Set-Variable -Option Constant -Name EnableDshowRedirectionPropName -Value "EnableDshowRedirection"
Set-Variable -Option Constant -Name EnableDshowBridgeBitMask -Value 1
Set-Variable -Option Constant -Name AutoDecodeMJPEGBitMask -Value 2
Set-Variable -Option Constant -Name EnableDshowRedirectionValue -Value ($EnableDshowBridgeBitMask -bOr $AutoDecodeMJPEGBitMask) # Evaluates to 3
# Dock ingest device whitelisted IDs
$DockIds = @(
"VID_046D&PID_0863", # Logitech SmartDock
"VID_046D&PID_0876", # Logitech Flare
"VID_14BE&PID_0025", # Crestron SR
"VID_095D&PID_9203", # Polycom MSR
"VID_17EF&PID_7219", # Lenovo Hub 500
"VID_17EF&PID_7222", # Lenovo Hub 500 2nd
"VID_03F0&PID_0E67", # HP Elite Slice
"VID_14BE&PID_0029", # Crestron HD-CONV-USB-200
"VID_14BE&PID_0030", # Crestron HD-CONV-USB-250
"VID_14BE&PID_0031", # Crestron HD-CONV-USB-260
"VID_14BE&PID_004D", # Crestron HD-CONV-USB-300
"VID_6993&PID_B00C", # Yealink MShare
"VID_6993&PID_B00E", # Yealink MShare-raw
"VID_6993&PID_B086", # Yealink MTouch Plus
"VID_17EF&PID_721F", # Lenovo Hub 700
"VID_17EF&PID_722F", # Lenovo HUB 60
"VID_0B8C&PID_C000", # SMART SR LRS
"VID_095D&PID_9160", # Poly MTR v2
"VID_6993&PID_B032", # Yealink Core 2 Rigel
"VID_17EF&PID_7237", # Lenovo ThinkSmart Corekit
"VID_03F0&PID_4384", # HP Smart
"VID_17EF&PID_723A", # Lenovo ThinkSmart Video Ingest
"VID_1FF7&PID_0FF6", # CVTE MAXHUB
"VID_03F0&PID_09B7", # HP OBI WAN
"VID_17EF&PID_F00B", # Lenovo ThinkSmart Edition Tiny
"VID_17EF&PID_F008", # Lenovo ThinkSmart Gen2
"VID_17EF&PID_F009", # Lenovo ThinkSmart Gen2 2nd
"VID_1FF7&PID_0F75", # CVTE XCore Kit Pro
"VID_1FF7&PID_0F33", # CVTE Interactive Whiteboard
"VID_0543&PID_A030" # ViewSonic MTR
)
# Logging constants
Import-Module (Join-Path $PSScriptRoot "Events.psm1")
# Loops through the white-listed ingest IDs until it finds a PnPEntity that is a camera/imaging device and has a Device ID containing a white-listed ID
function Get-IngestCameraDeviceEntity {
foreach ($CameraId in $DockIds) {
$PnpEntityResult = Get-WmiObject Win32_PnpEntity | where {($_.PNPClass -eq $CameraPnPClassName -or $_.PNPClass -eq $ImagePnPClassName) -and $_.DeviceId -match $CameraId}
if ($PnpEntityResult -ne $null) {
return $PnpEntityResult
}
}
return $null
}
# If the registry entry for the ingest camera device does not exist, returns null
# Otherwise, returns the path to the 'Device Parameters' key under the ingest device node,
# creating that key if it does not already exist
function Create-DeviceParametersRegistryPath {
param ([String]$deviceId)
$DevicePath = Join-Path -Path $EnumRegistryPath -ChildPath $deviceId
if (-not (Test-Path($DevicePath))) {
Write-EventLog @EVLCameraPathNotFound
return $Null
}
Write-EventLog @EVLCameraPathFound
$DeviceParametersPath = Join-Path -Path $DevicePath -ChildPath $DeviceParametersKeyName
if (-not (Test-Path($DeviceParametersPath))) {
Write-EventLog @EVLDeviceParamsKeyNotPresent
New-Item -Path $DevicePath -Name $DeviceParametersKeyName
} else {
Write-EventLog @EVLDeviceParamsKeyAlreadyPresent
}
return $DeviceParametersPath
}
# Returns -1 if EnableDshowRedirection property does not exist, otherwise returns value of the 'EnableDshowRedirection' property under the given path
Function Get-EnableDshowRedirection {
Param ([String]$DeviceParamsPath)
$DeviceParamsKey = Get-ItemProperty -Path $DeviceParamsPath
$CameraDeviceMemberProperty = Get-Member -InputObject $DeviceParamsKey -Name $EnableDshowRedirectionPropName
if ($CameraDeviceMemberProperty) {
Write-Output ($DeviceParamsKey | Select -ExpandProperty $EnableDshowRedirectionPropName)
} else {
Write-Output -1
}
}
# Sets the value of the 'EnableDshowRedirection' property under the given path to 0x3
# See Dshow Bridge documentation: https://docs.microsoft.com/en-us/windows-hardware/drivers/stream/dshow-bridge-implementation-guidance-for-usb-video-class-devices
Function Set-EnableDshowRedirection {
Param ([String]$DeviceParamsPath)
Set-ItemProperty -Path $DeviceParamsPath -Name $EnableDshowRedirectionPropName -Value $EnableDshowRedirectionValue | Out-Null
}
# Creates an 'EnableDshowRedirection' property under the given path and initializes its value to 0x3
# See Dshow Bridge documentation: https://docs.microsoft.com/en-us/windows-hardware/drivers/stream/dshow-bridge-implementation-guidance-for-usb-video-class-devices
Function Create-EnableDshowRedirection {
Param ([String]$DeviceParamsPath)
New-ItemProperty -Path $DeviceParamsPath -Name $EnableDshowRedirectionPropName -Value $EnableDshowRedirectionValue | Out-Null
}
###
# Main section
###
. (Join-Path $PSScriptRoot Elevate.ps1)
Elevate $MyInvocation
# Find PnpEntity for ingest camera
$IngestCameraDeviceEntity = Get-IngestCameraDeviceEntity
# If we cannot find an ingest camera, we exit
If ($IngestCameraDeviceEntity -eq $Null) {
Write-EventLog @EVLCameraNotFound
Exit
}
# Build the path to the 'Device Parameters' key under the ingest camera device
$IngestCameraDeviceParametersPath = Create-DeviceParametersRegistryPath($IngestCameraDeviceEntity.DeviceID)
If (-not $IngestCameraDeviceParametersPath) {
Write-EventLog @EVLDeviceParamsKeyNotCreated
Exit
}
# Get the current value of the 'EnableDshowRedirection' property (will return -1 if property does not exist)
$DshowRedirectionLookupResult = [int](Get-EnableDshowRedirection($IngestCameraDeviceParametersPath))
echo $DshowRedirectionLookupResult
If ($DshowRedirectionLookupResult -eq $EnableDshowRedirectionValue) {
Write-EventLog @EVLDshowCurrentlyEnabled
Exit
} Elseif ($DshowRedirectionLookupResult -eq $EnableDshowBridgeBitMask) {
Write-EventLog @EVLNeedToAutoDecodeMJPEG
Set-EnableDshowRedirection($IngestCameraDeviceParametersPath)
} Elseif ($DshowRedirectionLookupResult -eq 0) {
Write-EventLog @EVLDshowCurrentlyDisabled
Set-EnableDshowRedirection($IngestCameraDeviceParametersPath)
} Else {
Write-EventLog @EVLDshowKeyNotFound
Create-EnableDshowRedirection($IngestCameraDeviceParametersPath)
}
# After modifying/creating EnableDshowRedirection property, check again to ensure it has been enabled
$SecondaryDshowRedirectionLookupResult = Get-EnableDshowRedirection($IngestCameraDeviceParametersPath)
If ($SecondaryDshowRedirectionLookupResult -le 0) {
Write-EventLog @EVLEnableDshowUnsuccessful
} Else {
Write-EventLog @EVLEnableDshowSuccessful
}
|
combined_dataset/train/non-malicious/sample_40_91.ps1
|
sample_40_91.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Get-AMTHardwareAsset {
<#
.Synopsis
Shows hardware information about the system
.Description
This Cmdlet returns the hardware information from clients that have Intel Active Management Technology (AMT) firmware version 3.2 or higher.
.Notes
Supported AMT Firmware Versions:
This Cmdlet supports AMT firmware version 3.2 or higher.
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
get-AMTHardwareAsset vProClient.vprodemo.com -Credential $AMTCredential
ComputerName PSParentPath Name Value
------------ ------------ ---- -----
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version 1.16
vProClient.vprodemo.com AmtSystem::\HardwareAssets... ReleaseDate 2010/10/21 12:00:00 AM
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer American Megatrends Inc.
vProClient.vprodemo.com AmtSystem::\HardwareAssets... CPUStatus CPU Enabled
vProClient.vprodemo.com AmtSystem::\HardwareAssets... CurrentClockSpeed 2700
vProClient.vprodemo.com AmtSystem::\HardwareAssets... ExternalBusClockSpeed 100
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Family Intel(R) Core(TM) i7 proce...
vProClient.vprodemo.com AmtSystem::\HardwareAssets... MaxClockSpeed 2700
vProClient.vprodemo.com AmtSystem::\HardwareAssets... UpgradeMethod ZIF Socket
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer Intel(R) Corporation
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version Intel(R) Core(TM) i7-2620M...
.example
Get-AMTHardwareAsset -ComputerName vProClient.vProDemo.com -Credential $AMTCredential | Where-Object -FilterSc#ript {$_.PSPath -like "*BIOS*"}
ComputerName PSParentPath Name Value
------------ ------------ ---- -----
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version 1.16
vProClient.vprodemo.com AmtSystem::\HardwareAssets... ReleaseDate 2010/10/21 12:00:00 AM
vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer American Megatrends Inc.
Displays only the results that contain "BIOS" in their path
.example
Get-AMTHardwareAsset -ComputerName vProClient.vProDemo.com -Credential $AMTCredential | Where-Object -FilterSc#ript {$_.PSPath -like "*BIOS*"} | format-list
ComputerName : vProClient.vprodemo.com
PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS
Name : Version
Value : 1.16
ComputerName : vProClient.vprodemo.com
PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS
Name : ReleaseDate
Value : 2010/10/21 12:00:00 AM
ComputerName : vProClient.vprodemo.com
PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS
Name : Manufacturer
Value : American Megatrends Inc.
Displays only the results that contain "BIOS" in their path and formatted into a list.
.example
Get-AMTHardwareAsset -ComputerName vProClient -Credential $AMTCredential -TextOutput
vProClient BIOS
vProClient BIOS:Primary BIOS
Version............. 1.16
ReleaseDate......... 2010/10/21 12:00:00 AM
Manufacturer........ American Megatrends Inc.
vProClient Cpu
vProClient Cpu:CPU 0
CPUStatus........... CPU Enabled
CurrentClockSpeed... 2700
ExternalBusClockSpeed 100
Family.............. Intel(R) Core(TM) i7 processor
MaxClockSpeed....... 2700
UpgradeMethod....... ZIF Socket
Manufacturer........ Intel(R) Corporation
Version............. Intel(R) Core(TM) i7-2620M CPU @ 2.70GHz
Displays results formatted as text.
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=1, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Format output to text")] [switch] $TextOutput,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
PROCESS {
function Traverse([string]$path, [int]$indentdepth, [string] $header)
{
Get-ChildItem $path | ForEach-Object {
if ($_.Type -eq "Container")
{
$test = $path + "\" + $_.Name
if($header)
{
$ContainerName = $header + ":"+ $_.Name
}
else
{
$ContainerName = $_.Name
}
if ($TextOutput.IsPresent){
Write-Output ($Comp + " ".PadRight($indentdepth, " ") + $ContainerName)
}
traverse $test ($indentdepth+2) $ContainerName
}
else
{
#write-host $tempAMTPSDrive":\HardwareAssets\"$_.Name
if ($TextOutput.IsPresent){
Write-output ("".PadRight($indentdepth, " ") + " " + $_.Name.PadRight(20, ".") + " " + $_.Value)
}
$obj = New-Object PSObject
$fullName = $header + ":"+ $_.Name
$obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$obj | Add-Member -MemberType NoteProperty -Name PSParentPath -Value $_.PSParentPath
$obj | Add-Member -MemberType noteproperty -Name Name -value $_.Name
$obj | Add-Member -MemberType noteproperty -Name Value -value $_.Value
$global:Results += $obj
}
}
}
if ($Credential.username.Length -gt 0) {
} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$passwd = ConvertTo-SecureString $Password -AsPlainText –Force
$Credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $Username,$passwd
} else {
$Credential = Get-Credential $Username
}
}
$tlsstring = ""
if ($TLS.IsPresent)
{
$tlsstring = "-TLS"
}
if ($Port -eq "16993")
{
$tlsstring = "-TLS"
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
$global:Results = @()
$rand = New-Object System.Random
ForEach ($Comp in $ComputerName) {
$tempAMTPSDrive = "AMTDrive"+$rand.next()
$CannotConnect = $False
if ($Credential.username.Length -gt 0){
$expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp -Credential `$Credential $tlsstring -ea Stop"
} else {
$expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp $tlsstring -ea Stop"
}
try{
$null = invoke-expression $expression
}
catch{
if($_.FullyQualifiedErrorId -eq "WsmanUnauthorizedException,Microsoft.PowerShell.Commands.NewPSDriveCommand")
{
Write-Output "Unauthorized to connect to $Comp : Incorrect username or password"
}
if($_.FullyQualifiedErrorId -eq "NewDriveProviderException,Microsoft.PowerShell.Commands.NewPSDriveCommand")
{
Write-Output "Could not connect to host $Comp : Check Name or IP address"
}
$CannotConnect = $True
}
if($CannotConnect -ne $true)
{
$temp = $tempAMTPSDrive+":\HardwareAssets"
traverse $temp 0
if (!$TextOutput.IsPresent){
Write-Output $Results
}
Remove-PSDrive $tempAMTPSDrive
}
}
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAopOM5VZAj0GjQ
# mX4p/EyuuqJzCznlls1BI9t6SdlHvaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgDDFuUvUNyu612Ftr
# 2ttoh0OZ/FeW60Mou60GMo96INwwDQYJKoZIhvcNAQEBBQAEggGAtOm5hTj2cSiH
# jhhekbb6EBHqMtjyMpqnZM1yhGt2OXoSXwrK//wZUSocYZlTWdHS3aAS9X8Fv4qN
# gXhbppST5wI/4XLl9ohJt8lRUH4WH3HdGQrXeVigJIxl1zayd1sms5yWSLrfYWbM
# B9JxGOA45PCr8vWfM4nio2SnQwUk2TPxtV2JC3EeVjsh++2QjjyveweVJ+u6NJmh
# K+J0WP6iRLrNwOXHmlk9vZIYP0XNv+V3xF7eqvM3uQnJbu4hWtTIJcXsK/tsef2x
# Vzu2vX3PBAAns3jJgjlNzW3ck2OCj4EjBBaQ1rpa9rQ3zJAgXQ41jhK7J3fqLQW2
# uLbPnrwo9lK3FNFDKEPLj+0+lhvr5PLWysl8EpeLjEGxVSRBY11iBJu4AWKw5Jfq
# fWVHStFqnmHP++YtWGmqNqGnj1r4dwqYH3/5u27zQ3jiBaN6QEe/oVItyFtLmhK7
# FUaABA+YP+b+t+77fKaA2v5ESl3E0nvevrsprqrJLtXTJgaTRgM6oYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIGwwxp4cx1JNqUvI0uYckkDgsNsxRQNiIadd
# iszF2x+dAhUApfHlUFYtiXTPp+oxpw/QUk634WEYDzIwMjEwNzE5MTYyOTM0WqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMDcxOTE2MjkzNFowPwYJKoZIhvcNAQkEMTIEMCnREMqEhTdq
# nfhy/rhEVL3HTMc5YvO1WQpzE8tmY8ysYGvLhyMqEZbHGG1caM9XOjCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgAfO2mZxyl6VkOQv3qMacolwmuZyLEiYEGCnjlOdA3PS5S5wPfI
# XvxtxjLmYCQzdn4kNcVC1mi0CKWKkWnhrtaBMw/awcJNtnRyh5haafI3YzF7wLgP
# Vev0c+lsyWexGt6YfQYSWMVRVOMmy05jT39u/hr0iqdVF4GiKjwI3YckShFt/VuT
# O+Dhx4OLzdu4N0WeiD9+aH4d2m1PJPBaZWam9+8+JEFU0LLnQDTDTucE6hrgCH68
# sTm/F0KFIVO4Hcxxd52wKultsRqtjMi9iPWk18/LABFCojoSymFxLDKWdzVi6LIP
# EbIBR4QIcw3BSPXAX7ojdfBTRjLC7RCA50RruCAPp7IXnbCFDtnpVM84dUSTbASS
# e4rtzcUIsvzWgpbwWo4ZPdOR0VCtR4R9q6XD0cLHu271fzDN1KkD04WAHHSFY0lP
# wZc8SCT0aOat+raWp+sdT37CUPWEdohNj+mfjRfhdUSZ0DvgaQTsJolwPPL3B7Qb
# +y+dZH+G7QmcvTVn1Ah749A2wXNG4MlZIEgI8Ad+6OR7Xj/QfkkgfQaHHqw+y6qB
# la7mBUBJBLWzMKmLgWySFUeIC53ekR8Ho4SPSoRTjfb5OV2S4b0NOrjp3kyQXZoL
# 3DvyWwrjfdwlEKUofmAtrUxS6oOUdhEEhyWu+6gC4cY0Mq1dDZRXMW50XA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_22_21.ps1
|
sample_22_21.ps1
|
#
# Module manifest for module 'OCI.PSModules.Accessgovernancecp'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Accessgovernancecp.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c71dab6b-b390-499f-9d71-506da8082df7'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Accessgovernancecp Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Accessgovernancecp.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAccessgovernancecpGovernanceInstance',
'Get-OCIAccessgovernancecpGovernanceInstanceConfiguration',
'Get-OCIAccessgovernancecpGovernanceInstancesList',
'Move-OCIAccessgovernancecpGovernanceInstanceCompartment',
'New-OCIAccessgovernancecpGovernanceInstance',
'Remove-OCIAccessgovernancecpGovernanceInstance',
'Update-OCIAccessgovernancecpGovernanceInstance',
'Update-OCIAccessgovernancecpGovernanceInstanceConfiguration'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Accessgovernancecp'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2914.ps1
|
2914.ps1
|
Framework "1.1.0"
task default -depends MsBuild
task MsBuild {
if ( $IsMacOS -OR $IsLinux ) {
$output = &dotnet build -version -nologo 2>&1
Assert ($output -NotLike "15.1") '$output should contain 15.1'
}
}
|
combined_dataset/train/non-malicious/3872.ps1
|
3872.ps1
|
function Test-GetWebApp
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$wname2 = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "Shared"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier
$actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -Name $wname
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname2 -Location $location -AppServicePlan $whpName
Assert-AreEqual $wname2 $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp
Assert-True { $result.Count -ge 2 }
$result = Get-AzWebApp -Location $location
Assert-True { $result.Count -ge 2 }
$result = Get-AzWebApp -ResourceGroupName $rgname
Assert-AreEqual 2 $result.Count
$result = Get-AzWebApp -AppServicePlan $serverFarm
Assert-True { $result.Count -ge 2 }
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname2 -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-StartStopRestartWebApp
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "Shared"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier
$webApp = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName
Assert-AreEqual $wname $webApp.Name
Assert-AreEqual $serverFarm.Id $webApp.ServerFarmId
$webApp = $webApp | Stop-AzWebApp
Assert-AreEqual "Stopped" $webApp.State
$ping = PingWebApp $webApp
$webApp = $webApp | Start-AzWebApp
Assert-AreEqual "Running" $webApp.State
$ping = PingWebApp $webApp
$webApp = Stop-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual "Stopped" $webApp.State
$ping = PingWebApp $webApp
$webApp = Start-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual "Running" $webApp.State
$ping = PingWebApp $webApp
$webApp = Restart-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual "Running" $webApp.State
$ping = PingWebApp $webApp
$webApp = $webApp | Restart-AzWebApp
Assert-AreEqual "Running" $webApp.State
$ping = PingWebApp $webApp
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CloneNewWebApp
{
$rgname = Get-ResourceGroupName
$appname = Get-WebsiteName
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Premium"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$destPlanName = Get-WebHostPlanName
$destLocation = Get-SecondaryLocation
$destAppName = Get-WebsiteName
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appname -Location $location -AppServicePlan $planName
Assert-AreEqual $appname $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
$webapp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname
Assert-AreEqual $appname $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
$serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Location $destLocation -Tier $tier
$webapp2 = New-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Location $destLocation -AppServicePlan $destPlanName -SourceWebApp $webapp
Assert-AreEqual $destAppName $webapp2.Name
$webapp2 = Get-AzWebApp -ResourceGroupName $rgname -Name $destAppName
Assert-AreEqual $destAppName $webapp2.Name
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $appname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force
Remove-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CloneNewWebAppAndDeploymentSlots
{
$rgname = Get-ResourceGroupName
$appname = Get-WebsiteName
$slot1name = "staging"
$slot2name = "testing"
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Premium"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$destPlanName = Get-WebHostPlanName
$destLocation = Get-SecondaryLocation
$destAppName = Get-WebsiteName
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appname -Location $location -AppServicePlan $planName
Assert-AreEqual $appname $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
$webapp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname
Assert-AreEqual $appname $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
$slot1 = New-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot1name -AppServicePlan $planName
$appWithSlotName = "$appname/$slot1name"
Assert-AreEqual $appWithSlotName $slot1.Name
Assert-AreEqual $serverFarm.Id $slot1.ServerFarmId
$slot2 = New-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot2name -AppServicePlan $planName
$appWithSlotName = "$appname/$slot2name"
Assert-AreEqual $appWithSlotName $slot2.Name
Assert-AreEqual $serverFarm.Id $slot2.ServerFarmId
$serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Location $destLocation -Tier $tier
$webapp2 = New-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Location $destLocation -AppServicePlan $destPlanName -SourceWebApp $webapp -IncludeSourceWebAppSlots
Assert-AreEqual $destAppName $webapp2.Name
$webapp2 = Get-AzWebApp -ResourceGroupName $rgname -Name $destAppName
Assert-AreEqual $destAppName $webapp2.Name
$slot1 = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot1name
$appWithSlotName = "$destAppName/$slot1name"
Assert-AreEqual $appWithSlotName $slot1.Name
Assert-AreEqual $serverFarm2.Id $slot1.ServerFarmId
$slot2 = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot2name
$appWithSlotName = "$destAppName/$slot2name"
Assert-AreEqual $appWithSlotName $slot2.Name
Assert-AreEqual $serverFarm2.Id $slot2.ServerFarmId
}
finally
{
Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot1name -Force
Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot2name -Force
Remove-AzWebApp -ResourceGroupName $rgname -Name $appname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force
Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot1name -Force
Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot2name -Force
Remove-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CloneNewWebAppWithTrafficManager
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "Premium"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$destAppServicePlanName = Get-WebHostPlanName
$destLocation = Get-SecondaryLocation
$destWebAppName = Get-WebsiteName
$profileName = Get-TrafficManagerProfileName
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier
$actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destAppServicePlanName -Location $destLocation -Tier $tier
$actual = New-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName -Location $destLocation -AppServicePlan $destAppServicePlanName -SourceWebApp $result -TrafficManagerProfileName $profileName
Assert-AreEqual $destWebAppName $actual.Name
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName
Assert-AreEqual $destWebAppName $result.Name
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destAppServicePlanName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CreateNewWebApp
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "Shared"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CreateNewWebAppHyperV
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "PremiumContainer"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$containerImageName = "pstestacr.azurecr.io/tests/iis:latest"
$containerRegistryUrl = "https://pstestacr.azurecr.io"
$containerRegistryUser = "pstestacr"
$pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv"
$containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force
$dockerPrefix = "DOCKER|"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
Assert-AreEqual $true $result.IsXenon
Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion
$appSettings = @{
"DOCKER_REGISTRY_SERVER_URL" = $containerRegistryUrl;
"DOCKER_REGISTRY_SERVER_USERNAME" = $containerRegistryUser;
"DOCKER_REGISTRY_SERVER_PASSWORD" = $pass;}
foreach($nvp in $webApp.SiteConfig.AppSettings)
{
Assert-True { $appSettings.Keys -contains $nvp.Name }
Assert-True { $appSettings[$nvp.Name] -match $nvp.Value }
}
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-EnableContainerContinuousDeploymentAndGetUrl
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "PremiumContainer"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$containerImageName = "pstestacr.azurecr.io/tests/iis:latest"
$containerRegistryUrl = "https://pstestacr.azurecr.io"
$containerRegistryUser = "pstestacr"
$pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv"
$containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force
$dockerPrefix = "DOCKER|"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -EnableContainerContinuousDeployment -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
Assert-AreEqual $true $result.IsXenon
Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion
$appSettings = @{
"DOCKER_REGISTRY_SERVER_URL" = $containerRegistryUrl;
"DOCKER_REGISTRY_SERVER_USERNAME" = $containerRegistryUser;
"DOCKER_REGISTRY_SERVER_PASSWORD" = $pass;
"DOCKER_ENABLE_CI" = "true"}
foreach($nvp in $webApp.SiteConfig.AppSettings)
{
Assert-True { $appSettings.Keys -contains $nvp.Name }
Assert-True { $appSettings[$nvp.Name] -match $nvp.Value }
}
$ci_url = Get-AzWebAppContainerContinuousDeploymentUrl -ResourceGroupName $rgname -Name $wname
$expression = "https://" + $wname + ":(.*)@" + $wname + ".scm.azurewebsites.net/docker/hook"
$sanitizedCiUrl = { $ci_url -replace '$','' }
$matchResult = { $sanitizedCiUrl -match $expression }
Assert-AreEqual $true $matchResult
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-WindowsContainerCanIssueWebAppPSSession
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "PremiumContainer"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$containerImageName = "mcr.microsoft.com/azure-app-service/samples/aspnethelloworld:latest"
$containerRegistryUrl = "https://mcr.microsoft.com"
$containerRegistryUser = "testregistry"
$pass = "7Dxo9p79Ins2K3ZU"
$containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force
$dockerPrefix = "DOCKER|"
try
{
Write-Debug "Creating app service plan..."
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Large -HyperV
Write-Debug "App service plan created"
Write-Debug "Creating web app plan..."
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Write-Debug "Webapp created"
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Write-Debug "Webapp retrieved"
Write-Debug "Validating web app properties..."
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
Assert-AreEqual $true $result.IsXenon
Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion
$actualAppSettings = @{}
foreach ($kvp in $result.SiteConfig.AppSettings)
{
$actualAppSettings[$kvp.Name] = $kvp.Value
}
$expectedAppSettings = @{}
$expectedAppSettings["DOCKER_REGISTRY_SERVER_URL"] = $containerRegistryUrl;
$expectedAppSettings["DOCKER_REGISTRY_SERVER_USERNAME"] = $containerRegistryUser;
$expectedAppSettings["DOCKER_REGISTRY_SERVER_PASSWORD"] = $pass;
foreach ($key in $expectedAppSettings.Keys)
{
Assert-True {$actualAppSettings.Keys -contains $key}
Assert-AreEqual $actualAppSettings[$key] $expectedAppSettings[$key]
}
Write-Debug "Enabling Win-RM..."
$actualAppSettings["CONTAINER_WINRM_ENABLED"] = "1"
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wName -AppSettings $actualAppSettings
New-AzWebAppContainerPSSession -ResourceGroupName $rgname -Name $wname -WarningVariable wv -WarningAction SilentlyContinue -ErrorAction SilentlyContinue -Force
if ((Get-WebsitesTestMode) -ne 'Playback')
{
$message = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The connection to the specified remote host was refused."
$resultError = $Error[0] -like "*$($message)*"
Write-Debug "Expected Message: $message"
}
else
{
$messageDNS = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The WinRM client cannot process the request because the server name cannot be resolved"
$messageUnavailable = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The WinRM client sent a request to an HTTP server and got a response saying the requested HTTP URL was not available."
$messagePsVersionNotSupported = "Remote Powershell sessions into Windows Containers on App Service from this version of PowerShell is not supported.";
$messageWSMANNotConfigured = "Your current WSMAN Trusted Hosts settings will prevent you from connecting to your Container Web App";
$resultError = ($Error[0] -like "*$($messageDNS)*") -or
($Error[0] -like "*$($messageUnavailable)*") -or
($Error[0] -like "*$($messageWSMANNotConfigured)*") -or
($Error[0] -like "*$($messagePsVersionNotSupported)*")
$resultWarning = ($wv[0] -like "*$($messageWSMANNotConfigured)*")
Write-Debug "Expected error message 1: $messageDNS"
Write-Debug "Expected error message 2: $messageUnavailable"
Write-Debug "Expected error message 3: $messagePsVersionNotSupported"
Write-Debug "Expected Warning message 1: $messageWSMANNotConfigured"
}
Write-Debug "Error: $Error[0]"
Write-Debug "Warnings: $wv"
Write-Debug "Printing PsVersion"
foreach ($key in $PsVersionTable.Keys)
{
Write-Debug "$key"
foreach($v in $PsVersionTable[$key])
{
Write-Debug " $v"
}
}
If(!$resultError -or !$resultWarning)
{
Write-Output "expected error $($message), actual error $($Error[0])"
Write-Output "Warnings: $wv"
}
Assert-True {$resultError -or $resultWarning}
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-WindowsContainerWebAppPSSessionOpened
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "PremiumContainer"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$containerImageName = "mcr.microsoft.com/azure-app-service/samples/aspnethelloworld:latest"
$containerRegistryUrl = "https://mcr.microsoft.com"
$containerRegistryUser = "testregistry"
$pass = "7Dxo9p79Ins2K3ZU"
$containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force
$dockerPrefix = "DOCKER|"
try
{
Write-Debug "Creating app service plan..."
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Large -HyperV
Write-Debug "App service plan created"
Write-Debug "Creating web app plan..."
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Write-Debug "Webapp created"
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Write-Debug "Webapp retrieved"
Write-Debug "Validating web app properties..."
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
Assert-AreEqual $true $result.IsXenon
Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion
$actualAppSettings = @{}
foreach ($kvp in $result.SiteConfig.AppSettings)
{
$actualAppSettings[$kvp.Name] = $kvp.Value
}
$expectedAppSettings = @{}
$expectedAppSettings["DOCKER_REGISTRY_SERVER_URL"] = $containerRegistryUrl;
$expectedAppSettings["DOCKER_REGISTRY_SERVER_USERNAME"] = $containerRegistryUser;
$expectedAppSettings["DOCKER_REGISTRY_SERVER_PASSWORD"] = $pass;
foreach ($key in $expectedAppSettings.Keys)
{
Assert-True {$actualAppSettings.Keys -contains $key}
Assert-AreEqual $actualAppSettings[$key] $expectedAppSettings[$key]
}
Write-Debug "Enabling Win-RM..."
$actualAppSettings["CONTAINER_WINRM_ENABLED"] = "1"
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wName -AppSettings $actualAppSettings
$status = PingWebApp($webApp)
Write-Debug "Just pinged the web app"
Write-Debug "Status: $status"
$count=0
while (($status -like "ServiceUnavailable") -and $count -le 15)
{
Wait-Seconds 60
$status = PingWebApp($webApp)
Write-Debug $count
$count++
}
Assert-AreEqual $status "200"
$ps_session = New-AzWebAppContainerPSSession -ResourceGroupName $rgname -Name $wname -Force
Write-Debug "After PSSession"
Assert-AreEqual $ps_session.ComputerName $wname".azurewebsites.net"
Assert-AreEqual $ps_session.State "Opened"
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-SetAzureStorageWebAppHyperV
{
$rgname = Get-ResourceGroupName
$wname = Get-WebsiteName
$location = Get-WebLocation
$whpName = Get-WebHostPlanName
$tier = "PremiumContainer"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$containerImageName = "pstestacr.azurecr.io/tests/iis:latest"
$containerRegistryUrl = "https://pstestacr.azurecr.io"
$containerRegistryUser = "pstestacr"
$pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv"
$containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force
$dockerPrefix = "DOCKER|"
$azureStorageAccountCustomId1 = "mystorageaccount"
$azureStorageAccountType1 = "AzureFiles"
$azureStorageAccountName1 = "myaccountname.file.core.windows.net"
$azureStorageAccountShareName1 = "myremoteshare"
$azureStorageAccountAccessKey1 = "AnAccessKey"
$azureStorageAccountMountPath1 = "C:\mymountpath"
$azureStorageAccountCustomId2 = "mystorageaccount2"
$azureStorageAccountType2 = "AzureFiles"
$azureStorageAccountName2 = "myaccountname2.file.core.windows.net"
$azureStorageAccountShareName2 = "myremoteshare2"
$azureStorageAccountAccessKey2 = "AnAccessKey2"
$azureStorageAccountMountPath2 = "C:\mymountpath2"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
Assert-AreEqual $true $result.IsXenon
Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion
$testStorageAccount1 = New-AzWebAppAzureStoragePath -Name $azureStorageAccountCustomId1 -Type $azureStorageAccountType1 -AccountName $azureStorageAccountName1 -ShareName $azureStorageAccountShareName1 -AccessKey $azureStorageAccountAccessKey1 -MountPath $azureStorageAccountMountPath1
$testStorageAccount2 = New-AzWebAppAzureStoragePath -Name $azureStorageAccountCustomId2 -Type $azureStorageAccountType2 -AccountName $azureStorageAccountName2 -ShareName $azureStorageAccountShareName2 -AccessKey $azureStorageAccountAccessKey2 -MountPath $azureStorageAccountMountPath2
Write-Debug "Created the new storage account paths"
Write-Debug $testStorageAccount1.Name
Write-Debug $testStorageAccount2.Name
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wname -AzureStoragePath $testStorageAccount1, $testStorageAccount2
Write-Debug "Set the new storage account paths"
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
$azureStorageAccounts = $result.AzureStoragePath
Write-Debug $azureStorageAccounts[0].Name
Assert-AreEqual $azureStorageAccounts[0].Name $azureStorageAccountCustomId1
Write-Debug $azureStorageAccounts[0].Type
Assert-AreEqual $azureStorageAccounts[0].Type $azureStorageAccountType1
Write-Debug $azureStorageAccounts[0].AccountName
Assert-AreEqual $azureStorageAccounts[0].AccountName $azureStorageAccountName1
Write-Debug $azureStorageAccounts[0].ShareName
Assert-AreEqual $azureStorageAccounts[0].ShareName $azureStorageAccountShareName1
Write-Debug $azureStorageAccounts[0].AccessKey
Assert-AreEqual $azureStorageAccounts[0].AccessKey $azureStorageAccountAccessKey1
Write-Debug $azureStorageAccounts[0].MountPath
Assert-AreEqual $azureStorageAccounts[0].MountPath $azureStorageAccountMountPath1
Write-Debug $azureStorageAccounts[1].Name
Assert-AreEqual $azureStorageAccounts[1].Name $azureStorageAccountCustomId2
Write-Debug $azureStorageAccounts[1].Type
Assert-AreEqual $azureStorageAccounts[1].Type $azureStorageAccountType2
Write-Debug $azureStorageAccounts[1].AccountName
Assert-AreEqual $azureStorageAccounts[1].AccountName $azureStorageAccountName2
Write-Debug $azureStorageAccounts[1].ShareName
Assert-AreEqual $azureStorageAccounts[1].ShareName $azureStorageAccountShareName2
Write-Debug $azureStorageAccounts[1].AccessKey
Assert-AreEqual $azureStorageAccounts[1].AccessKey $azureStorageAccountAccessKey2
Write-Debug $azureStorageAccounts[1].MountPath
Assert-AreEqual $azureStorageAccounts[1].MountPath $azureStorageAccountMountPath2
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-CreateNewWebAppOnAse
{
$rgname = "mnresourcegroup"
$wname = Get-WebsiteName
$location = "South Central US"
$whpName = "powershellasp"
$aseName = "mnASE"
$resourceType = "Microsoft.Web/sites"
try
{
$serverFarm = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName
$job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -AseName $aseName -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
Assert-AreEqual $wname $actual.Name
Assert-AreEqual $serverFarm.Id $actual.ServerFarmId
$result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname
Assert-AreEqual $wname $result.Name
Assert-AreEqual $serverFarm.Id $result.ServerFarmId
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force
}
}
function Test-SetWebApp
{
$rgname = Get-ResourceGroupName
$webAppName = Get-WebsiteName
$location = Get-WebLocation
$appServicePlanName1 = Get-WebHostPlanName
$appServicePlanName2 = Get-WebHostPlanName
$tier1 = "Shared"
$tier2 = "Standard"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$capacity = 2
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm1 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName1 -Location $location -Tier $tier1
$serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName2 -Location $location -Tier $tier2
$webApp = New-AzWebApp -ResourceGroupName $rgname -Name $webAppName -Location $location -AppServicePlan $appServicePlanName1
Write-Debug "DEBUG: Created the Web App"
Assert-AreEqual $webAppName $webApp.Name
Assert-AreEqual $serverFarm1.Id $webApp.ServerFarmId
Assert-Null $webApp.Identity
Assert-NotNull $webApp.SiteConfig.phpVersion
$job = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppServicePlan $appServicePlanName2 -HttpsOnly $true -AsJob
$job | Wait-Job
$webApp = $job | Receive-Job
Write-Debug "DEBUG: Changed service plan"
Assert-AreEqual $webAppName $webApp.Name
Assert-AreEqual $serverFarm2.Id $webApp.ServerFarmId
Assert-AreEqual $true $webApp.HttpsOnly
$webapp.SiteConfig.HttpLoggingEnabled = $true
$webapp.SiteConfig.RequestTracingEnabled = $true
$webApp = $webApp | Set-AzWebApp
Write-Debug "DEBUG: Changed site properties"
Assert-AreEqual $webAppName $webApp.Name
Assert-AreEqual $serverFarm2.Id $webApp.ServerFarmId
Assert-AreEqual $true $webApp.SiteConfig.HttpLoggingEnabled
Assert-AreEqual $true $webApp.SiteConfig.RequestTracingEnabled
$appSettings = @{ "setting1" = "valueA"; "setting2" = "valueB"}
$connectionStrings = @{ connstring1 = @{ Type="MySql"; Value="string value 1"}; connstring2 = @{ Type = "SQLAzure"; Value="string value 2"}}
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppSettings $appSettings -AssignIdentity $true
Assert-NotNull $webApp.Identity
Assert-AreEqual ($appSettings.Keys.Count) $webApp.SiteConfig.AppSettings.Count
Assert-NotNull $webApp.Identity
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppSettings $appSettings -ConnectionStrings $connectionStrings -NumberofWorkers $capacity -PhpVersion "off"
Assert-AreEqual $webAppName $webApp.Name
foreach($nvp in $webApp.SiteConfig.AppSettings)
{
Assert-True { $appSettings.Keys -contains $nvp.Name }
Assert-True { $appSettings[$nvp.Name] -match $nvp.Value }
}
Assert-AreEqual $connectionStrings.Keys.Count $webApp.SiteConfig.ConnectionStrings.Count
foreach($connStringInfo in $webApp.SiteConfig.ConnectionStrings)
{
Assert-True { $connectionStrings.Keys -contains $connStringInfo.Name }
}
Assert-AreEqual $capacity $webApp.SiteConfig.NumberOfWorkers
Assert-AreEqual "" $webApp.SiteConfig.PhpVersion
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $webAppName -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName1 -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName2 -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-RemoveWebApp
{
$rgname = Get-ResourceGroupName
$appName = Get-WebsiteName
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Shared"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName
Assert-AreEqual $appName $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
$webapp | Remove-AzWebApp -Force -AsJob | Wait-Job
$webappNames = (Get-AzWebApp -ResourceGroupName $rgname) | Select -Property Name
Assert-False { $webappNames -contains $appName }
}
finally
{
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-WebAppPublishingProfile
{
$rgname = Get-ResourceGroupName
$appName = Get-WebsiteName
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Shared"
$apiversion = "2015-08-01"
$resourceType = "Microsoft.Web/sites"
$profileFileName = "profile.xml"
try
{
New-AzResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName
Assert-AreEqual $appName $webapp.Name
Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId
[xml]$profile = Get-AzWebAppPublishingProfile -ResourceGroupName $rgname -Name $appName -OutputFile $profileFileName
$msDeployProfile = $profile.publishData.publishProfile | ? { $_.publishMethod -eq 'MSDeploy' } | Select -First 1
$pass = $msDeployProfile.userPWD
Assert-True { $msDeployProfile.msdeploySite -eq $appName }
$newPass = $webapp | Reset-AzWebAppPublishingProfile
Assert-False { $pass -eq $newPass }
[xml]$profile = $webapp | Get-AzWebAppPublishingProfile -OutputFile $profileFileName -Format FileZilla3
$fileZillaProfile = $profile.FileZilla3.Servers.Server
Assert-True { $fileZillaProfile.Name -eq $appName }
[xml]$profile = Get-AzWebAppPublishingProfile -ResourceGroupName $rgname -Name $appName
Assert-NotNull $profile
}
finally
{
Remove-AzWebApp -ResourceGroupName $rgname -Name $appName -Force
Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force
Remove-AzResourceGroup -Name $rgname -Force
}
}
function Test-PublishAzureWebAppFromZip
{
$rgname = Get-ResourceGroupName
$appName = Get-WebsiteName
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Shared"
try
{
New-AzureRmResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzureRmAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzureRmWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName
$zipPath = Join-Path $ResourcesPath "nodejs-sample.zip"
$publishedApp = Publish-AzWebApp -ResourceGroupName $rgname -Name $appName -ArchivePath $zipPath -Force
Assert-NotNull $publishedApp
}
finally
{
Remove-AzureRmResourceGroup -Name $rgname -Force
}
}
function Test-PublishAzureWebAppFromWar
{
$rgname = Get-ResourceGroupName
$appName = Get-WebsiteName
$location = Get-WebLocation
$planName = Get-WebHostPlanName
$tier = "Shared"
try
{
New-AzureRmResourceGroup -Name $rgname -Location $location
$serverFarm = New-AzureRmAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier
$webapp = New-AzureRmWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName
$warPath = Join-Path $ResourcesPath "HelloJava.war"
$publishedApp = Publish-AzWebApp -ResourceGroupName $rgname -Name $appName -ArchivePath $warPath -Force
Assert-NotNull $publishedApp
}
finally
{
Remove-AzureRmResourceGroup -Name $rgname -Force
}
}
function Test-CreateNewWebAppSimple
{
$appName = Get-WebsiteName
try
{
$webapp = New-AzWebApp -Name $appName
Assert-AreEqual $appName $webapp.Name
}
finally
{
Remove-AzResourceGroup $appName
}
}
function Test-TagsNotRemovedBySetWebApp
{
$rgname = "lketmtestantps10"
$appname = "tagstestantps10"
$slot = "testslot"
$aspName = "tagstestAspantps10"
$aspToMove = "tagstestAsp2antps10"
$getApp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname
$getSlot = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot
Assert-notNull $getApp.Tags
Assert-notNull $getSlot.Tags
$webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $appname -HttpsOnly $true
$slot = Set-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot -HttpsOnly $true
Assert-AreEqual $true $webApp.HttpsOnly
Assert-AreEqual $true $slot.HttpsOnly
Assert-notNull $webApp.Tags
Assert-notNull $slot.Tags
$webapp = Set-AzWebApp -WebApp $getApp
Assert-notNull $webApp.Tags
$webapp = Set-AzWebApp -Name $appname -ResourceGroupName $rgname -AppServicePlan $aspToMove
$asp = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $aspToMove
Assert-AreEqual $webApp.ServerFarmId $asp.id
Assert-notNull $webApp.Tags
$webApp = Set-AzWebApp -Name $appname -ResourceGroupName $rgname -AppServicePlan $aspName
$asp = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $aspName
Assert-AreEqual $webApp.ServerFarmId $asp.id
Assert-notNull $webApp.Tags
}
|
combined_dataset/train/non-malicious/TabExpansion for V2CTP_4.ps1
|
TabExpansion for V2CTP_4.ps1
|
## Tab-Completion
#################
## For V2CTP3.
## This won't work on V1 and V2CTP and V2CTP2.
## Please dot souce this script file.
## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list.
##
## What this can do is:
##
## [datetime]::n<tab>
## [datetime]::now.d<tab>
## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell"
## $c = [ref]$a; $d = [ref]$b,$c
## $d[0].V<tab>[0][0].Get<tab>
## $d[1].V<tab>[0,0].tos<tab>
## $function:a<tab>
## $env:a<tab>
## [System.Type].a<tab>
## [datetime].Assembly.a<tab>
## ).a<tab> # shows System.Type properties and methods...
## #native command name expansion
## fsu<tab>
## #command option name expansion (for fsutil ipconfig net powershell only)
## fsutil <tab>
## ipconfig <tab>
## net <tab>
## powershell <tab>
## #TypeNames and Type accelerators expansion
## [Dec<tab>
## [system.Man<tab>.auto<tab>.p<tab>
## New-Object -TypeName IO.Dir<tab>
## New-Object System.win<tab>.for<tab>.bu<tab>
## #ProgIDs expansion
## New-Object -Com shel<tab>
## #Enum option expansion
## Set-ExecutionPolicy <tab>
## Set-ExecutionPolicy All<tab>
## Set-ExcusionPolisy -ex <tab>
## Get-TraceSource Inte<tab>
## iex -Errora <tab> -wa Sil<tab>
## #WmiClasses expansion
## Get-WmiObject -class Win32_<tab>
## gwmi __Instance<tab>
## #Encoding expansion
## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab>
## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab>
## #PSProvider name expansion
## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab>
## Get-PSProvider <tab>
## pwd -psp al<tab>
## #PSDrive name expansion
## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab>
## Get-PSDrive <tab>
## pwd -psd <tab>
## #PSSnapin name expansion
## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab>
## Get-Command -PSSnapin <tab>
## Remove-PSSnapin <tab>
## Get-PSSnapin M<tab>
## #Eventlog name and expansion
## Get-Eventlog -Log <tab>
## Get-Eventlog w<tab>
## #Eventlog's entrytype expansion
## Get-EventLog -EntryType <tab>
## Get-EventLog -EntryType Er<tab>
## Get-EventLog -Ent <tab>
## #Service name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab>
## New-Service -DependsOn <tab>
## New-Service -Dep e<tab>
## Get-Service -n <tab>
## Get-Service <tab>,a<tab>,p<tab>
## gsv <tab>
## #Service display name expansion
## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab>
## Get-Service -Dis <tab>
## gsv -Dis <tab>,w<tab>,b<tab>
## #Cmdlet and Topic name expansion (this also support default help function and man alias)
## Get-Help [-Name] about_<tab>
## Get-Help <tab>
## #Category name expansion (this also support default help function and man alias)
## Get-Help -Category c<tab>,<tab>
## #Command name expansion
## Get-Command [-Name] <tab>
## Get-Command -Name <tab>
## gcm a<tab>,<tab>
## #Scope expansion
## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias
## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab>
## Clear-Variable -Scope G<tab>
## Set-Alias -s <tab>
## #Process name expansion
## [Get-Process | Stop-Process] [-Name] <tab>
## Stop-Process -Name <tab>
## Stop-Process -N pow<tab>
## Get-Process <tab>
## ps power<tab>
## #Trace sources expansion
## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab>
## #Trace -ListenerOption expansion
## [Set-TraceSource | Trace-Command] -ListenerOption <tab>
## Set-TraceSource -Lis <tab>,n<tab>
## #Trace -Option expansion
## [Set-TraceSource | Trace-Command] -Option <tab>
## Set-TraceSource -op <tab>,con<tab>
## #ItemType expansion
## New-Item -Item <tab>
## ni -ItemType d<tab>
## #ErrorAction and WarningAction option expansion
## CMDLET [-ErrorAction | -WarningAction] <tab>
## CMDLET -Errora s<tab>
## CMDLET -ea con<tab>
## CMDLET -wa <tab>
## #Continuous expansion with comma when parameter can treat multiple option
## # if there are spaces, occur display bug in the line
## # if strings contains '$' or '-', not work
## Get-Command -CommandType <tab>,<tab><tab>,cm<tab>
## pwd -psp <tab>,f<tab>,va<tab>
## Get-EventLog -EntryType <tab>,i<tab>,s<tab>
## #Enum expansion in method call expression
## # this needs one or more spaces after left parenthesis or comma
## $str = "day night"
## $str.Split( " ",<space>rem<tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR
## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab>
## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success
## $type = [System.Type]
## $type.GetMembers(<space>Def<tab>
## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab>
## # this can do continuous enum expansion with comma and no spaces
## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>"
## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab>
## #Better '$_.' expansion when cmdlet output objects or method return objects
## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> }
## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB }
## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> }
## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" }
## $data = Get-Process
## $data[2,4,5] | % { $_.<tab>
## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type
## #Property name expansion by -Property parameter
## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object |
## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab>
## Select-Object -ExcludeProperty <tab>
## Select-Object -ExpandProperty <tab>
## gcm Get-Acl|select -exp Par<tab>
## ps |group na<tab>
## ls | ft A<tab>,M<tab>,L<tab>
## #Hashtable key expansion in the variable name and '.<tab>'
## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} }
## $hash.pow<tab>.pro<tab>
## #Parameter expansion for function, filter and script
## man -f<tab>
## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1
## .\\foobar.ps1 -<tab> -b<tab>
## #Enum expansion for function, filter and scripts
## # this can do continuous enum expansion with comma and no spaces
## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab>
## #Enum expansion for assignment expression
## #needs space(s) after '=' and comma
## #strongly-typed with -as operator and space(s)
## $ErrorActionPreference =<space><tab>
## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3
## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab>
## #Path expansion with variable and '\\' or '/'
## $PWD\\../../<tab>\\<tab>
## "$env:SystemDrive/pro<tab>/<tab>
## #Operator expansion which starts with '-'
## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2'
## 1..9 -co<tab> 5
## #Keyword expansion
## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } }
## #Variable name expansion (only global scope)
## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab>
## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab>
## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab>
## Tee-Object -Variable <tab>
## gv pro<tab>,<tab>
## Remove-Variable -Name out<tab>,<tab>,ps<tab>
## ... | ... | tee -v <tab>
## #Alias name expansion
## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab>
## Export-Alias -Name <tab>
## Get-Alias i<tab>,e<tab>,a<tab>
## epal -n for<tab>
## #Property name expansion with -groupBy parameter
## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab>
## ps | ft -g <tab>
## gcm | Format-Wide -GroupBy Par<tab>
## #Type accelerators expansion with no charactors
## [<tab>
## New-Object -typename <tab>
## New-Object <tab>
## # File glob expansion with '@'
## ls *.txt@<tab>
## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma
## ls * -Filter *.txt # 2 <tab> refactoring
## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern
## This can also use '^'(hat) or '~'(tilde) for Excluding
## ls <hat>*.txt@<tab>
## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma
## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring
## *.txt<tilde>foo*<tilde>bar*@<tab>
## ls file.txt # 1 <tab> expanding with comma
## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring
## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> )
## ls * -Filter * -Excluding foo*, bar*<Enter>
## #ls<tab>
## #1<tab>
## # Command buffer stack with ';'(semicolon)
## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1
## echo "PowerShell"<semicolon><tab> # push command2
## get-process<semicolon><tab> # push command3
## {COMMAND}<Enter> # execute another command
## get-process # Auto pop command3 from stack by LIFO
## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon)
## get-process; <semicolon><comma><tab>
## get-process; echo "PowerShell" # pop command2 from stack by LIFO
## # Function name expansion after 'function' or 'filter' keywords
## function cl<tab>
## #Switch syntax option expansion
## switch -w<tab> -f<tab>
## #Better powershell.exe option expansion with '-'
## powershell -no<tab> -<tab> -en<tab>
## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* )
## [par<tab>
## [cmd<tab>
## #Member expansion for CmdletBinding and Parameter attributes
## [Parameter(man<tab>,<tab>1,val<tab>$true)]
## [CmdletBinding( <tab>"foo", su<tab>$true)]
## #Several current date/time formats with Ctrl+D
## <Ctrl+D><tab><tab><tab><tab><tab>...
## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,')
## <command>;<tab> # push command
## <Ctrl+D><tab> # pop
## #Paste clipboard with Ctrl+V
## <Ctrl+V><tab>
### Generate ProgIDs list...
if ( Test-Path $PSHOME\\ProgIDs.txt )
{
$_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0
}
else
{
$_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\")
$_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_subkey in $_HKCR.GetSubKeyNames() )
{
foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") )
{
if ($_i -ne $null)
{
$_ProgID.Add($_i.GetValue(""))
}
}
}
'$_ProgID was updated...' | Out-Host
$_ProgID = $_ProgID|sort -Unique
Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose
}
### Generate TypeNames list...
if ( Test-Path $PSHOME\\TypeNames.txt )
{
$_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0
}
else
{
$_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() )
{
foreach ( $_type in $_asm.GetTypes() )
{
$_TypeNames.Add($_type.FullName)
}
}
'$_TypeNames was updated...' | Out-Host
$_TypeNames = $_TypeNames | sort -Unique
Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose
}
if ( Test-Path $PSHOME\\TypeNames_System.txt )
{
$_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0
}
else
{
$_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.'
'$_TypeNames_System was updated...' | Out-Host
Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose
}
### Generate WMIClasses list...
if ( Test-Path $PSHOME\\WMIClasses.txt )
{
$_WMIClasses = type $PSHOME\\WMIClasses.txt -ReadCount 0
}
else
{
$_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) )
foreach ( $_class in gwmi -List )
{
$_WMIClasses.Add($_class.Name)
}
$_WMIClasses = $_WMIClasses | sort -Unique
'$_WMIClasses was updated...' | Out-Host
Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose
}
[Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null
$global:_cmdstack = New-Object Collections.Stack
$global:_snapin = $null
$global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort
iex (@'
function prompt {
if ($_cmdstack.Count -gt 0) {
$line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}'
[System.Windows.Forms.SendKeys]::SendWait($line)
}
'@ + @"
${function:prompt}
}
"@)
function Write-ClassNames ( $data, $i, $prefix='', $sep='.' )
{
$preItem = ""
foreach ( $class in $data -like $_opt )
{
$Item = $class.Split($sep)
if ( $preItem -ne $Item[$i] )
{
if ( $i+1 -eq $Item.Count )
{
if ( $prefix -eq "[" )
{
$suffix = "]"
}
elseif ( $sep -eq "_" )
{
$suffix = ""
}
else
{
$suffix = " "
}
}
else
{
$suffix = ""
}
$prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix
$preItem = $Item[$i]
}
}
}
function Get-PipeLineObject {
$i = -2
$property = $null
do {
$str = $line.Split("|")
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1]
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
if ( $_cmdlet -eq "?" )
{
$_cmdlet = "Where-Object"
}
$global:_exp = $_cmdlet
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0]
}
if ( "Select-Object" -eq $_cmdlet )
{
if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' )
{
$property = $Matches[1] + ";" + $property
}
}
$i--
} while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet )
if ( $global:_forgci -eq $null )
{
$a = @(ls "Alias:\\")[0]
$e = @(ls "Env:\\")[0]
$f = @(ls "Function:\\")[0]
$h = @(ls "HKCU:\\")[0]
$v = @(ls "Variable:\\")[0]
$c = @(ls "cert:\\")[0]
$global:_forgci = gi $PSHOME\\powershell.exe |
Add-Member 'NoteProperty' CommandType $f.CommandType -P |
Add-Member 'NoteProperty' Definition $a.Definition -P |
Add-Member 'NoteProperty' Description $a.Description -P |
Add-Member 'NoteProperty' Key $e.Key -P |
Add-Member 'NoteProperty' Location $c.Location -P |
Add-Member 'NoteProperty' LocationName $c.LocationName -P |
Add-Member 'NoteProperty' Options $a.Options -P |
Add-Member 'NoteProperty' ReferencedCommand $a.ReferencedCommand -P |
Add-Member 'NoteProperty' ResolvedCommand $a.ResolvedCommand -P |
Add-Member 'NoteProperty' ScriptBlock $f.ScriptBlock -P |
Add-Member 'NoteProperty' StoreNames $c.StoreNames -P |
Add-Member 'NoteProperty' SubKeyCount $h.SubKeyCount -P |
Add-Member 'NoteProperty' Value $e.Value -P |
Add-Member 'NoteProperty' ValueCount $h.ValueCount -P |
Add-Member 'NoteProperty' Visibility $a.Visibility -P |
Add-Member 'NoteProperty' Property $h.Property -P |
Add-Member 'NoteProperty' ResolvedCommandName $a.ResolvedCommandName -P |
Add-Member 'ScriptMethod' Close {} -P |
Add-Member 'ScriptMethod' CreateSubKey {} -P |
Add-Member 'ScriptMethod' DeleteSubKey {} -P |
Add-Member 'ScriptMethod' DeleteSubKeyTree {} -P |
Add-Member 'ScriptMethod' DeleteValue {} -P |
Add-Member 'ScriptMethod' Flush {} -P |
Add-Member 'ScriptMethod' GetSubKeyNames {} -P |
Add-Member 'ScriptMethod' GetValue {} -P |
Add-Member 'ScriptMethod' GetValueKind {} -P |
Add-Member 'ScriptMethod' GetValueNames {} -P |
Add-Member 'ScriptMethod' IsValidValue {} -P |
Add-Member 'ScriptMethod' OpenSubKey {} -P |
Add-Member 'ScriptMethod' SetValue {} -P
}
if ( $global:_mix -eq $null )
{
$f = gi $PSHOME\\powershell.exe
$t = [type]
$s = ""
$global:_mix = `
Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Mode $f.Mode -P |
Add-Member 'NoteProperty' Assembly $t.Assembly -P |
Add-Member 'NoteProperty' AssemblyQualifiedName $t.AssemblyQualifiedName -P |
Add-Member 'NoteProperty' Attributes $f.Attributes -P |
Add-Member 'NoteProperty' BaseType $t.BaseType -P |
Add-Member 'NoteProperty' ContainsGenericParameters $t.ContainsGenericParameters -P |
Add-Member 'NoteProperty' CreationTime $f.CreationTime -P |
Add-Member 'NoteProperty' CreationTimeUtc $f.CreationTimeUtc -P |
Add-Member 'NoteProperty' DeclaringMethod $t.DeclaringMethod -P |
Add-Member 'NoteProperty' DeclaringType $t.DeclaringType -P |
Add-Member 'NoteProperty' Exists $f.Exists -P |
Add-Member 'NoteProperty' Extension $f.Extension -P |
Add-Member 'NoteProperty' FullName $f.FullName -P |
Add-Member 'NoteProperty' GenericParameterAttributes $t.GenericParameterAttributes -P |
Add-Member 'NoteProperty' GenericParameterPosition $t.GenericParameterPosition -P |
Add-Member 'NoteProperty' GUID $t.GUID -P |
Add-Member 'NoteProperty' HasElementType $t.HasElementType -P |
Add-Member 'NoteProperty' IsAbstract $t.IsAbstract -P |
Add-Member 'NoteProperty' IsAnsiClass $t.IsAnsiClass -P |
Add-Member 'NoteProperty' IsArray $t.IsArray -P |
Add-Member 'NoteProperty' IsAutoClass $t.IsAutoClass -P |
Add-Member 'NoteProperty' IsAutoLayout $t.IsAutoLayout -P |
Add-Member 'NoteProperty' IsByRef $t.IsByRef -P |
Add-Member 'NoteProperty' IsClass $t.IsClass -P |
Add-Member 'NoteProperty' IsCOMObject $t.IsCOMObject -P |
Add-Member 'NoteProperty' IsContextful $t.IsContextful -P |
Add-Member 'NoteProperty' IsEnum $t.IsEnum -P |
Add-Member 'NoteProperty' IsExplicitLayout $t.IsExplicitLayout -P |
Add-Member 'NoteProperty' IsGenericParameter $t.IsGenericParameter -P |
Add-Member 'NoteProperty' IsGenericType $t.IsGenericType -P |
Add-Member 'NoteProperty' IsGenericTypeDefinition $t.IsGenericTypeDefinition -P |
Add-Member 'NoteProperty' IsImport $t.IsImport -P |
Add-Member 'NoteProperty' IsInterface $t.IsInterface -P |
Add-Member 'NoteProperty' IsLayoutSequential $t.IsLayoutSequential -P |
Add-Member 'NoteProperty' IsMarshalByRef $t.IsMarshalByRef -P |
Add-Member 'NoteProperty' IsNested $t.IsNested -P |
Add-Member 'NoteProperty' IsNestedAssembly $t.IsNestedAssembly -P |
Add-Member 'NoteProperty' IsNestedFamANDAssem $t.IsNestedFamANDAssem -P |
Add-Member 'NoteProperty' IsNestedFamily $t.IsNestedFamily -P |
Add-Member 'NoteProperty' IsNestedFamORAssem $t.IsNestedFamORAssem -P |
Add-Member 'NoteProperty' IsNestedPrivate $t.IsNestedPrivate -P |
Add-Member 'NoteProperty' IsNestedPublic $t.IsNestedPublic -P |
Add-Member 'NoteProperty' IsNotPublic $t.IsNotPublic -P |
Add-Member 'NoteProperty' IsPointer $t.IsPointer -P |
Add-Member 'NoteProperty' IsPrimitive $t.IsPrimitive -P |
Add-Member 'NoteProperty' IsPublic $t.IsPublic -P |
Add-Member 'NoteProperty' IsSealed $t.IsSealed -P |
Add-Member 'NoteProperty' IsSerializable $t.IsSerializable -P |
Add-Member 'NoteProperty' IsSpecialName $t.IsSpecialName -P |
Add-Member 'NoteProperty' IsUnicodeClass $t.IsUnicodeClass -P |
Add-Member 'NoteProperty' IsValueType $t.IsValueType -P |
Add-Member 'NoteProperty' IsVisible $t.IsVisible -P |
Add-Member 'NoteProperty' LastAccessTime $f.LastAccessTime -P |
Add-Member 'NoteProperty' LastAccessTimeUtc $f.LastAccessTimeUtc -P |
Add-Member 'NoteProperty' LastWriteTime $f.LastWriteTime -P |
Add-Member 'NoteProperty' LastWriteTimeUtc $f.LastWriteTimeUtc -P |
Add-Member 'NoteProperty' MemberType $t.MemberType -P |
Add-Member 'NoteProperty' MetadataToken $t.MetadataToken -P |
Add-Member 'NoteProperty' Module $t.Module -P |
Add-Member 'NoteProperty' Name $t.Name -P |
Add-Member 'NoteProperty' Namespace $t.Namespace -P |
Add-Member 'NoteProperty' Parent $f.Parent -P |
Add-Member 'NoteProperty' ReflectedType $t.ReflectedType -P |
Add-Member 'NoteProperty' Root $f.Root -P |
Add-Member 'NoteProperty' StructLayoutAttribute $t.StructLayoutAttribute -P |
Add-Member 'NoteProperty' TypeHandle $t.TypeHandle -P |
Add-Member 'NoteProperty' TypeInitializer $t.TypeInitializer -P |
Add-Member 'NoteProperty' UnderlyingSystemType $t.UnderlyingSystemType -P |
Add-Member 'NoteProperty' PSChildName $f.PSChildName -P |
Add-Member 'NoteProperty' PSDrive $f.PSDrive -P |
Add-Member 'NoteProperty' PSIsContainer $f.PSIsContainer -P |
Add-Member 'NoteProperty' PSParentPath $f.PSParentPath -P |
Add-Member 'NoteProperty' PSPath $f.PSPath -P |
Add-Member 'NoteProperty' PSProvider $f.PSProvider -P |
Add-Member 'NoteProperty' BaseName $f.BaseName -P |
Add-Member 'ScriptMethod' Clone {} -P |
Add-Member 'ScriptMethod' CompareTo {} -P |
Add-Member 'ScriptMethod' Contains {} -P |
Add-Member 'ScriptMethod' CopyTo {} -P |
Add-Member 'ScriptMethod' Create {} -P |
Add-Member 'ScriptMethod' CreateObjRef {} -P |
Add-Member 'ScriptMethod' CreateSubdirectory {} -P |
Add-Member 'ScriptMethod' Delete {} -P |
Add-Member 'ScriptMethod' EndsWith {} -P |
Add-Member 'ScriptMethod' FindInterfaces {} -P |
Add-Member 'ScriptMethod' FindMembers {} -P |
Add-Member 'ScriptMethod' GetAccessControl {} -P |
Add-Member 'ScriptMethod' GetArrayRank {} -P |
Add-Member 'ScriptMethod' GetConstructor {} -P |
Add-Member 'ScriptMethod' GetConstructors {} -P |
Add-Member 'ScriptMethod' GetCustomAttributes {} -P |
Add-Member 'ScriptMethod' GetDefaultMembers {} -P |
Add-Member 'ScriptMethod' GetDirectories {} -P |
Add-Member 'ScriptMethod' GetElementType {} -P |
Add-Member 'ScriptMethod' GetEnumerator {} -P |
Add-Member 'ScriptMethod' GetEvent {} -P |
Add-Member 'ScriptMethod' GetEvents {} -P |
Add-Member 'ScriptMethod' GetField {} -P |
Add-Member 'ScriptMethod' GetFields {} -P |
Add-Member 'ScriptMethod' GetFiles {} -P |
Add-Member 'ScriptMethod' GetFileSystemInfos {} -P |
Add-Member 'ScriptMethod' GetGenericArguments {} -P |
Add-Member 'ScriptMethod' GetGenericParameterConstraints {} -P |
Add-Member 'ScriptMethod' GetGenericTypeDefinition {} -P |
Add-Member 'ScriptMethod' GetInterface {} -P |
Add-Member 'ScriptMethod' GetInterfaceMap {} -P |
Add-Member 'ScriptMethod' GetInterfaces {} -P |
Add-Member 'ScriptMethod' GetLifetimeService {} -P |
Add-Member 'ScriptMethod' GetMember {} -P |
Add-Member 'ScriptMethod' GetMembers {} -P |
Add-Member 'ScriptMethod' GetMethod {} -P |
Add-Member 'ScriptMethod' GetMethods {} -P |
Add-Member 'ScriptMethod' GetNestedType {} -P |
Add-Member 'ScriptMethod' GetNestedTypes {} -P |
Add-Member 'ScriptMethod' GetObjectData {} -P |
Add-Member 'ScriptMethod' GetProperties {} -P |
Add-Member 'ScriptMethod' GetProperty {} -P |
Add-Member 'ScriptMethod' GetTypeCode {} -P |
Add-Member 'ScriptMethod' IndexOf {} -P |
Add-Member 'ScriptMethod' IndexOfAny {} -P |
Add-Member 'ScriptMethod' InitializeLifetimeService {} -P |
Add-Member 'ScriptMethod' Insert {} -P |
Add-Member 'ScriptMethod' InvokeMember {} -P |
Add-Member 'ScriptMethod' IsAssignableFrom {} -P |
Add-Member 'ScriptMethod' IsDefined {} -P |
Add-Member 'ScriptMethod' IsInstanceOfType {} -P |
Add-Member 'ScriptMethod' IsNormalized {} -P |
Add-Member 'ScriptMethod' IsSubclassOf {} -P |
Add-Member 'ScriptMethod' LastIndexOf {} -P |
Add-Member 'ScriptMethod' LastIndexOfAny {} -P |
Add-Member 'ScriptMethod' MakeArrayType {} -P |
Add-Member 'ScriptMethod' MakeByRefType {} -P |
Add-Member 'ScriptMethod' MakeGenericType {} -P |
Add-Member 'ScriptMethod' MakePointerType {} -P |
Add-Member 'ScriptMethod' MoveTo {} -P |
Add-Member 'ScriptMethod' Normalize {} -P |
Add-Member 'ScriptMethod' PadLeft {} -P |
Add-Member 'ScriptMethod' PadRight {} -P |
Add-Member 'ScriptMethod' Refresh {} -P |
Add-Member 'ScriptMethod' Remove {} -P |
Add-Member 'ScriptMethod' Replace {} -P |
Add-Member 'ScriptMethod' SetAccessControl {} -P |
Add-Member 'ScriptMethod' Split {} -P |
Add-Member 'ScriptMethod' StartsWith {} -P |
Add-Member 'ScriptMethod' Substring {} -P |
Add-Member 'ScriptMethod' ToCharArray {} -P |
Add-Member 'ScriptMethod' ToLower {} -P |
Add-Member 'ScriptMethod' ToLowerInvariant {} -P |
Add-Member 'ScriptMethod' ToUpper {} -P |
Add-Member 'ScriptMethod' ToUpperInvariant {} -P |
Add-Member 'ScriptMethod' Trim {} -P |
Add-Member 'ScriptMethod' TrimEnd {} -P |
Add-Member 'ScriptMethod' TrimStart {} -P |
Add-Member 'NoteProperty' Chars $s.Chars -P
}
if ( "Add-Member" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Compare-Object" -eq $_cmdlet )
{
$global:_dummy = (Compare-Object 1 2)[0]
}
if ( "ConvertFrom-SecureString" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "ConvertTo-SecureString" -eq $_cmdlet )
{
$global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force
}
if ( "ForEach-Object" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Acl" -eq $_cmdlet )
{
$global:_dummy = Get-Acl
}
if ( "Get-Alias" -eq $_cmdlet )
{
$global:_dummy = (Get-Alias)[0]
}
if ( "Get-AuthenticodeSignature" -eq $_cmdlet )
{
$global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe
}
if ( "Get-ChildItem" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-Command" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-Content" -eq $_cmdlet )
{
$global:_dummy = (type $PSHOME\\profile.ps1)[0]
}
if ( "Get-Credential" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Culture" -eq $_cmdlet )
{
$global:_dummy = Get-Culture
}
if ( "Get-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( "Get-Event" -eq $_cmdlet )
{
$global:_dummy = (Get-Event)[0]
}
if ( "Get-EventLog" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Get-ExecutionPolicy" -eq $_cmdlet )
{
$global:_dummy = Get-ExecutionPolicy
}
if ( "Get-Help" -eq $_cmdlet )
{
$global:_dummy = Get-Help Add-Content
}
if ( "Get-History" -eq $_cmdlet )
{
$global:_dummy = Get-History -Count 1
}
if ( "Get-Host" -eq $_cmdlet )
{
$global:_dummy = Get-Host
}
if ( "Get-Item" -eq $_cmdlet )
{
$global:_dummy = $global:_forgci
}
if ( "Get-ItemProperty" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Location" -eq $_cmdlet )
{
$global:_dummy = Get-Location
}
if ( "Get-Member" -eq $_cmdlet )
{
$global:_dummy = (1|Get-Member)[0]
}
if ( "Get-Module" -eq $_cmdlet )
{
$global:_dummy = (Get-Module)[0]
}
if ( "Get-PfxCertificate" -eq $_cmdlet )
{
$global:_dummy = $null
}
if ( "Get-Process" -eq $_cmdlet )
{
$global:_dummy = ps powershell
}
if ( "Get-PSBreakpoint" -eq $_cmdlet )
{
$global:_dummy =
Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Action '' -P |
Add-Member 'NoteProperty' Command '' -P |
Add-Member 'NoteProperty' Enabled '' -P |
Add-Member 'NoteProperty' HitCount '' -P |
Add-Member 'NoteProperty' Id '' -P |
Add-Member 'NoteProperty' Script '' -P
}
if ( "Get-PSCallStack" -eq $_cmdlet )
{
$global:_dummy = Get-PSCallStack
}
if ( "Get-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Function
}
if ( "Get-PSProvider" -eq $_cmdlet )
{
$global:_dummy = Get-PSProvider FileSystem
}
if ( "Get-PSSnapin" -eq $_cmdlet )
{
$global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core
}
if ( "Get-Service" -eq $_cmdlet )
{
$global:_dummy = (Get-Service)[0]
}
if ( "Get-TraceSource" -eq $_cmdlet )
{
$global:_dummy = Get-TraceSource AddMember
}
if ( "Get-UICulture" -eq $_cmdlet )
{
$global:_dummy = Get-UICulture
}
if ( "Get-Variable" -eq $_cmdlet )
{
$global:_dummy = Get-Variable _
}
if ( "Get-WmiObject" -eq $_cmdlet )
{
$global:_dummy = @(iex $str[$i+1])[0]
}
if ( "Group-Object" -eq $_cmdlet )
{
$global:_dummy = 1 | group
}
if ( "Measure-Command" -eq $_cmdlet )
{
$global:_dummy = Measure-Command {}
}
if ( "Measure-Object" -eq $_cmdlet )
{
$global:_dummy = Measure-Object
}
if ( "New-PSDrive" -eq $_cmdlet )
{
$global:_dummy = Get-PSDrive Alias
}
if ( "New-TimeSpan" -eq $_cmdlet )
{
$global:_dummy = New-TimeSpan
}
if ( "Resolve-Path" -eq $_cmdlet )
{
$global:_dummy = $PWD
}
if ( "Select-String" -eq $_cmdlet )
{
$global:_dummy = " " | Select-String " "
}
if ( "Set-Date" -eq $_cmdlet )
{
$global:_dummy = Get-Date
}
if ( $property -ne $null)
{
foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) )
{
$global:_dummy = @($global:_dummy.$name)[0]
}
}
}
function TabExpansion {
# This is the default function to use for tab expansion. It handles simple
# member expansion on variables, variable name expansion and parameter completion
# on commands. It doesn't understand strings so strings containing ; | ( or { may
# cause expansion to fail.
param($line, $lastWord)
& {
# Helper function to write out the matching set of members. It depends
# on dynamic scoping to get $_base, _$expression and $_pat
function Write-Members ($sep='.')
{
# evaluate the expression to get the object to examine...
Invoke-Expression ('$_val=' + $_expression)
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
$_method = [Management.Automation.PSMemberTypes] `
'Method,CodeMethod,ScriptMethod,ParameterizedProperty'
if ($sep -eq '.')
{
$params = @{view = 'extended','adapted','base'}
}
else
{
$params = @{static=$true}
}
if ( $_val -is [Hashtable] )
{
[Object[]]$_keys = $null
foreach ( $_name in $_val.Keys )
{
$_keys += `
New-Object Microsoft.PowerShell.Commands.MemberDefinition `
[int],$_name,"Property",0
}
}
if ( $_keys -ne $null )
{
$_members = [Object[]](Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat})
} else {
$_members = (Get-Member @params -InputObject $_val $_pat)
}
foreach ($_m in $_members | Sort-Object membertype,name)
{
if ($_m.MemberType -band $_method)
{
# Return a method...
$_base + $_expression + $sep + $_m.name + '('
}
else {
# Return a property...
$_base + $_expression + $sep + $_m.name
}
}
}
$host.UI.RawUI.WindowTitle = "Windows PowerShell V2 (CTP2)" + $lastword
switch ([int]$line[-1])
{
# Ctrl+D several date/time formats
4 {
"[DateTime]::Now"
[DateTime]::Now
[DateTime]::Now.ToString("yyyyMMdd")
[DateTime]::Now.ToString("MMddyyyy")
[DateTime]::Now.ToString("yyyyMMddHHmmss")
[DateTime]::Now.ToString("MMddyyyyHHmmss")
'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) }
break;
}
# Ctrl+P hand-operated pop from command buffer stack
16 {
$_base = $lastword.SubString(0, $lastword.Length-1)
$_base + $global:_cmdstack.Pop()
break;
}
# Ctrl+R $Host.UI.RawUI.
18 {
'$Host.UI.RawUI.'
'$Host.UI.RawUI'
break;
}
# Ctrl+V paste clipboard
22 {
$_base = $lastword.SubString(0, $lastword.Length-1)
$global:_clip = New-Object System.Windows.Forms.TextBox
$global:_clip.Multiline = $true
$global:_clip.Paste()
$_base + $global:_clip.Text
break;
}
}
switch -regex ($lastWord)
{
# Handle property and method expansion at '$_'
'(^.*)(\\$_\\.)(\\w*)$' {
$_base = $matches[1]
$_expression = '$global:_dummy'
$_pat = $matches[3] + '*'
$global:_dummy = $null
Get-PipeLineObject
if ( $global:_dummy -eq $null )
{
if ( $global:_exp -match '^\\$.*\\(.*$' )
{
$type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' )
{
$tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1]
$type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type]
if ( $_expression -match '^\\$global:_dummy' )
{
$temp = $_expression -replace '^\\$global:_dummy(.*)','$1'
$_expression = '$_' + $temp
}
foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } )
{
if ($_m.MemberType -eq "Method")
{
$_base + $_expression + '.' + $_m.name + '('
}
else {
$_base + $_expression + '.' + $_m.name
}
}
break;
}
elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' )
{
$global:_dummy = @(iex $Matches[1])[0]
}
else
{
$global:_dummy = $global:_mix
}
}
Write-Members
break;
}
# Handle property and method expansion rooted at variables...
# e.g. $a.b.<tab>
'(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle simple property and method expansion on static members...
# e.g. [datetime]::n<tab>
'(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' {
$_base = $matches[1]
$_expression = $matches[2]
$_pat = $matches[4] + '*'
Write-Members '::'
break;
}
# Handle complex property and method expansion on static members
# where there are intermediate properties...
# e.g. [datetime]::now.d<tab>
'(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' {
$_base = $matches[1] # everything before the expression
$_expression = $matches[2].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[5] + '*' # the member to look for...
Write-Members
break;
}
# Handle variable name expansion...
'(^.*\\$)(\\w+)$' {
$_prefix = $matches[1]
$_varName = $matches[2]
foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*'))
{
$_prefix + $_v.name
}
break;
}
# Handle env&function drives variable name expansion...
'(^.*\\$)(.*\\:)(\\w+)$' {
$_prefix = $matches[1]
$_drive = $matches[2]
$_varName = $matches[3]
if ($_drive -eq "env:" -or $_drive -eq "function:")
{
foreach ($_v in Get-ChildItem ($_drive + $_varName + '*'))
{
$_prefix + $_drive + $_v.name
}
}
break;
}
# Handle array's element property and method expansion
# where there are intermediate properties...
# e.g. foo[0].n.b<tab>
'(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$'
{
$_base = $matches[1]
$_expression = $matches[2].TrimEnd('.')
$_pat = $Matches[8] + '*'
[void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock]
if ( $_expression -match '^\\$_\\.' )
{
$_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1')
}
Write-Members
break;
}
# Handle property and method expansion rooted at type object...
# e.g. [System.Type].a<tab>
'(^\\[(\\w|\\.)+\\])\\.(\\w*)$'
{
if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; }
$_expression = $Matches[1]
$_pat = $Matches[$matches.Count-1] + '*'
Write-Members
break;
}
# Handle complex property and method expansion on type object members
# where there are intermediate properties...
# e.g. [datetime].Assembly.a<tab>
'^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' {
$_expression = $matches[1].TrimEnd('.') # expression less trailing '.'
$_pat = $matches[4] + '*' # the member to look for...
if ( $(iex $_expression) -eq $null ) { break; }
Write-Members
break;
}
# Handle property and method expansion rooted at close parenthes...
# e.g. (123).a<tab>
'^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' {
$_base = $Matches[1] + ")"
if ( $matches[3] -eq $null) { $_expression = '[System.Type]' }
else { $_expression = '[System.Type]' + $Matches[2] }
$_pat = $matches[4] + '*'
iex "$_expression | Get-Member $_pat | sort MemberType,Name" |
% {
if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" }
if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes }
else { $_base + $Matches[2] + "." + $_.Name + $parenthes }
}
break;
}
# Handle .NET type name expansion ...
# e.g. [Microsoft.PowerShell.Com<tab>
'^\\[(\\w+(\\.\\w*)*)$' {
$_opt = $matches[1] + '*'
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
}
else
{
$_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]'
"CmdletBinding", "Parameter", "Alias",
"ValidateArguments", "ValidateCount", "ValidateEnumeratedArguments", "ValidateLength",
"ValidateNotNull", "ValidateNotNullOrEmpty", "ValidatePattern", "ValidateRange",
"ValidateScript", "ValidateSet", "AllowEmptyCollection", "AllowEmptyString", "AllowNull" `
-like $_opt -replace '^(.*)$', '[$1('
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '['
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '['
}
break;
}
# Handle file/directory name which contains $env: variable
# e.g. $env:windir\\<tab>
'^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' {
$path = iex ('"' + $Matches[0] + '"')
if ( $Matches[2].Length -gt 1 )
{
$parent = Split-Path $path -Parent
$leaf = (Split-Path $path -Leaf) + '*'
}
else
{
$parent = $path
$leaf = '*'
}
if ( Test-Path $parent )
{
$i = $Matches[0].LastIndexOfAny("/\\")
$_base = $Matches[0].Substring(0,$i+1)
[IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') }
}
}
# Handle file glob expansion ...
# e.g. *.txt~about*@<tab>
'^(\\^?([^~]+))(~(.*))*@$' {
if ( $Matches[1] -notlike "^*" )
{
$include = $Matches[2] -replace '``','`'
if ( $Matches[3] )
{
$exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`'
}
}
else
{
$include = "*"
$exclude = $Matches[2] -replace '``','`'
}
$fse = [IO.Directory]::GetFileSystemEntries($PWD)
$fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1'
% -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } }
$fse = $fse -replace '^.*\\s.*$', ("'`$0'")
$fse = $fse -replace '([\\[\\]])', '``$1' -replace '^.*([\\[\\]]).*$', ("'`$0'")
$fse = $fse -replace "''", "'"
$OFS = ", "; "$fse"
$OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"})
$Matches[0].Substring(0, $Matches[0].Length-1)
break;
}
# Handle command buffer stack...
'(.*);(.?)$' {
$_base = $Matches[1]
if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," )
{
if ( $_cmdstack.Count -gt 0 )
{
$_base + $global:_cmdstack.Pop()
}
else
{
""; break;
}
}
elseif ( $Matches[2] -eq "" )
{
$global:_cmdstack.Push($line.SubString(0,$line.Length-1))
[System.Windows.Forms.SendKeys]::SendWait("{ESC}")
""; break;
}
}
# Do completion on parameters...
'^-([\\w0-9]*)' {
$_pat = $matches[1] + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_command = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_command -match '\\{([^\\{\\}]*)$')
{
$_command = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_command -match '\\(([^()]*)$')
{
$_command = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_command = $_command.Trim().Split()[0]
# now get the info object for it...
$_command = @(Get-Command -type 'All' $_command)[0]
# loop resolving aliases...
while ($_command.CommandType -eq 'alias')
{
$_command = @(Get-Command -type 'All' $_command.Definition)[0]
}
if ( $_command.name -eq "powershell.exe" )
{
if ( $global:_PSexeOption )
{
$global:_PSexeOption -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort
}
else
{
($global:_PSexeOption = powershell.exe -?) -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort
}
break;
}
if ( $_command -ne $null )
{
# expand the parameter sets and emit the matching elements
foreach ($_n in $_command.Parameters.Keys | sort)
{
if ($_n -like $_pat) { '-' + $_n }
}
}
elseif ( $line -match 'switch\\s+(-\\w+\\s+)*-(\\w*)$')
{
$_pat = $Matches[2] + '*'
"regex", "wildcard", "exact", "casesensitive", "file" -like $_pat -replace '^(.*)$', '-$1'
break;
}
else
{
"-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt",
"-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge",
"-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike",
"-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains",
"-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat"
}
break;
}
# Tab complete against history either #<pattern> or #<id>
'^#(\\w*)' {
$_pattern = $matches[1]
if ($_pattern -match '^[0-9]+$')
{
Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine }
}
else
{
$_pattern = '*' + $_pattern + '*'
Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern }
}
break;
}
# try to find a matching command...
default {
# parse the script...
$_tokens = [System.Management.Automation.PSParser]::Tokenize($line, [ref] $null)
if ( $_tokens )
{
$_lastToken = $_tokens[$_tokens.count - 1]
if ($_lastToken.Type -eq 'Member')
{
$_pat = $_lastToken.Content + '*'
$i=$_tokens.count; do { $i-- } until ( $_tokens[$i].Type -eq "Attribute")
if ( $lastWord -match "^(.*)([\\(,])\\w*$" )
{
$_base = $matches[1] + $matches[2]
}
switch ( $_tokens[$i].Content )
{
'Parameter' {
[System.Management.Automation.ParameterAttribute].GetProperties() | ? { $_.Name -like $_pat -and $_.Name -ne "TypeId" } | % { $_base + $_.Name + "=" }
}
'CmdletBinding' {
[System.Management.Automation.CmdletBindingAttribute].GetProperties() | ? { $_.Name -like $_pat -and $_.Name -ne "TypeId" } | % { $_base + $_.Name + "=" }
}
}
break;
}
if ( $_tokens[1].Type -eq "Attribute")
{
if ( $line.Split("(").Count -gt $line.Split(")").Count )
{
if ( $lastWord -match "^(.*)([\\(,])\\w*$" )
{
$_base = $matches[1] + $matches[2]
}
switch ( $_tokens[1].Content )
{
'Parameter' {
[System.Management.Automation.ParameterAttribute].GetProperties() | % { $_base + $_.Name + "=" }
}
'CmdletBinding' {
[System.Management.Automation.CmdletBindingAttribute].GetProperties() | % { $_base + $_.Name + "=" }
}
}
}
break;
}
}
$lastex = [regex]::Split($line, '[|;]')[-1]
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' )
{
if ( $Matches[6] -ne $nul )
{
$brackets = "[]"
}
'['+ $global:_enum + $brackets + ']'
break;
}
if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' )
{
$_pat = $Matches[7] + '*'
$_type = @(iex $Matches[1])[0].GetType()
if ( $_type.IsEnum )
{
$global:_enum = $_type.FullName
[Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"'
break;
}
}
$lastex = [regex]::Split($line, '[|;=]')[-1]
if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$')
{
'['+ $global:_enum + ']'
}
elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' )
{
$_method = $Matches[1]
if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" )
{
$continuous = $true
$_opt = $Matches[5] + '*'
$_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1'
$position = $Matches[1].Split(",").Length
}
else
{
$continuous = $false
$_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*"
$position = $Matches[3].Split(",").Length
}
if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null )
{
$tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions])
$_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }')
}
foreach ( $def in $_mdefs )
{
[void] ($def -match '\\((.*)\\)')
foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] )
{
if ($param -eq $null -or $param -eq "")
{
continue;
}
$type = $param.split()[0]
if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" )
{
continue;
}
$fullname = @($_typenames -like "*$type*")
foreach ( $name in $fullname )
{
if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum )
{
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1')
$output | sort
}
elseif ( ( $name -as [System.Type] ).IsEnum )
{
$global:_enum = $name
$output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"'
$output | sort
}
}
}
}
if ( $output -ne $null )
{
break;
}
}
if ( $line -match '(function|filter)\\s+(\\w*)$')
{
$_pat = 'function:\\' + $Matches[2] + '*'
Get-ChildItem $_pat| % { $_.Name }
break;
}
if ( $line[-1] -eq " " )
{
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource | % { $_.Name } | sort -Unique
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
$_WMIClasses
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process | % { $_.Name } | sort
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive | sort
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name )
{
Get-Help -Category all | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | gm -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line[-1] -eq " " )
{
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0]
if ( $_cmdlet.Name -eq "powershell.exe" )
{
"-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive",
"-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort
break;
}
if ( $_cmdlet.Name -eq "fsutil.exe" )
{
"behavior query", "behavior set", "dirty query", "dirty set",
"file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew",
"fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics",
"hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create",
"quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query",
"reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange",
"usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort
break;
}
if ( $_cmdlet.Name -eq "net.exe" )
{
"ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ",
"HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ",
"SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort
break;
}
if ( $_cmdlet.Name -eq "ipconfig.exe" )
{
"/?", "/all", "/renew", "/release", "/flushdns", "/displaydns",
"/registerdns", "/showclassid", "/setclassid"
break;
}
}
if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' )
{
#$_opt = $Matches[1] + '*'
$_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2]
$_opt = $Matches[1].Split(" ,")[-1] + '*'
$_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length)
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0]
}
if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name )
{
"Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name )
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -eq $_cmdlet.Name )
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
break;
}
if ( $_cmdlet.Name -like "*WMI*" )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
if ( "Get-Process" -eq $_cmdlet.Name )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSProvider" -eq $_cmdlet.Name )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name )
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( $line -match '(-(\\w+))\\s+([^-]*$)' )
{
$_param = $matches[2] + '*'
$_opt = $Matches[3].Split(" ,")[-1] + '*'
$_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length)
#$_opt = ($Matches[3] -replace '(^.*\\s*,?\\s*)\\w*$','$1') + '*'
# extract the command name from the string
# first split the string into statements and pipeline elements
# This doesn't handle strings however.
$_cmdlet = [regex]::Split($line, '[|;=]')[-1]
# Extract the trailing unclosed block e.g. ls | foreach { cp
if ($_cmdlet -match '\\{([^\\{\\}]*)$')
{
$_cmdlet = $matches[1]
}
# Extract the longest unclosed parenthetical expression...
if ($_cmdlet -match '\\(([^()]*)$')
{
$_cmdlet = $matches[1]
}
# take the first space separated token of the remaining string
# as the command to look up. Trim any leading or trailing spaces
# so you don't get leading empty elements.
$_cmdlet = $_cmdlet.Trim().Split()[0]
# now get the info object for it...
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet)[0]
# loop resolving aliases...
while ($_cmdlet.CommandType -eq 'alias')
{
$_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet.Definition)[0]
}
if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" )
{
"SilentlyContinue", "Stop", "Continue", "Inquire" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name `
-and "groupBy" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or
"ErrorVariable" -like $_param -or "OutVariable" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param )
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort
break;
}
if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name `
-and "Encoding" -like $_param)
{
"Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" |
? { $_ -like $_opt } | sort -Unique
break;
}
if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name `
-and "Name" -like $_param)
{
Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "New-Object" -like $_cmdlet.Name )
{
if ( "ComObject" -like $_param )
{
$_ProgID -like $_opt | % { $_ -replace '\\s','` ' }
break;
}
if ( "TypeName" -like $_param )
{
if ( $_opt -eq "*" )
{
$_TypeAccelerators -like $_opt
}
else
{
$_TypeAccelerators -like $_opt
Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1)
Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1)
}
break;
}
}
if ( "New-Item" -eq $_cmdlet.Name )
{
if ( "ItemType" -like $_param )
{
"directory", "file" -like $_opt
break;
}
}
if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name `
-and "PSProvider" -like $_param )
{
Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param)
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
}
if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" `
-contains $_cmdlet.Name -and "Name" -like $_param )
{
if ( $global:_snapin -ne $null )
{
$global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') }
break;
}
else
{
$global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique;
$global:_snapin -like $_opt | % { $_base + $_ }
break;
}
}
if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias",
"New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" `
-contains $_cmdlet.Name -and "Scope" -like $_param )
{
"Global", "Local", "Script" -like $_opt
break;
}
if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param )
{
Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') }
break;
}
if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param )
{
Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') }
break;
}
if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique
break;
}
if ( "Category" -like $_param )
{
"Alias", "Cmdlet", "Provider", "General", "FAQ",
"Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ }
break;
}
}
if ( "Get-Service", "Restart-Service", "Resume-Service",
"Start-Service", "Stop-Service", "Suspend-Service" `
-contains $_cmdlet.Name )
{
if ( "Name" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "DisplayName" -like $_param )
{
Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') }
break;
}
}
if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param )
{
Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param )
{
"Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ }
break;
}
if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param )
{
Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( $_cmdlet.Noun -like "*WMI*" )
{
if ( "Class" -like $_param )
{
Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_'
break;
}
}
if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object",
"ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" `
-contains $_cmdlet.Name -and "Property" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "Select-Object" -eq $_cmdlet.Name )
{
if ( "ExcludeProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') }
break;
}
if ( "ExpandProperty" -like $_param )
{
Get-PipeLineObject
$_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name }
break;
}
}
select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters |
? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } |
% { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ }
}
if ($_tokens)
{
$_lastToken = $_tokens[$_tokens.count - 1]
if ($_lastToken.Type -eq 'Command')
{
$_cmd = $_lastToken.Content
# don't look for paths...
if ($_cmd.IndexOfAny('/\\') -eq -1)
{
# handle parsing errors - the last token string should be the last
# string in the line...
if ($lastword.substring($lastword.length-$_cmd.length) -eq $_cmd)
{
$_pat = $_cmd + '*'
$_base = $lastword.substring(0, $lastword.length-$_cmd.length)
"begin {", "break", "catch {", "continue", "data {", "do {", "dynamicparam (", "else {", "elseif (",
"end {", "exit", "filter ", "finally {", "for (", "foreach ", "from", "function ", "if (", "in ",
"param (", "process {", "return", "switch ", "throw ", "trap ", "try {", "until (", "while (" `
-like $_pat | % {'{0}{1}' -f $_base,$_ }
$ExecutionContext.InvokeCommand.GetCommandName($_pat,$true, $false) |
Sort-Object -Unique | ForEach-Object {'{0}{1}' -f $_base,$_ }
}
}
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/2783.ps1
|
2783.ps1
|
if (Get-Command logparser.exe) {
$lpquery = @"
SELECT
COUNT(Protocol,
substr(ForeignAddress, 0, last_index_of(substr(ForeignAddress, 0, last_index_of(ForeignAddress, '.')), '.')),
State,
Component,
Process) as Cnt,
Protocol,
substr(ForeignAddress, 0, last_index_of(substr(ForeignAddress, 0, last_index_of(ForeignAddress, '.')), '.')) as IP/16,
State,
Component,
Process
FROM
*netstat.csv
WHERE
ConPid not in ('0'; '4') and
ForeignAddress not like '10.%' and
ForeignAddress not like '169.254%' and
ForeignAddress not in ('*'; '0.0.0.0';
'127.0.0.1'; '[::]'; '[::1]')
GROUP BY
Protocol,
IP/16,
State,
Component,
Process
ORDER BY
Cnt, Process desc
"@
& logparser -stats:off -i:csv -dtlines:0 -rtp:-1 $lpquery
} else {
$ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName)
"${ScriptName} requires logparser.exe in the path."
}
|
combined_dataset/train/non-malicious/sample_25_69.ps1
|
sample_25_69.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $Force,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $NoCleanupOnFailure,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $BypassUpgradeStateValidation,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $FabricIsPreInstalled,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[int] $TimeoutInSeconds,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`""
# special case for older powershell versions < 5
if ($PSVersionTable.PSVersion.Major -lt 5)
{
$DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`""
}
Write-Host "running autoextractor command: $DCAutoExtractorCommand"
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if ((Test-Path variable:FabricRuntimePackagePath) `
-and ![string]::IsNullOrEmpty($FabricRuntimePackagePath))
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath"
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath"
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
if (!(Test-Path variable:TimeoutInSeconds) `
-or ($TimeoutInSeconds -le 0))
{
$TimeoutInSeconds = 300
Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds."
}
$parentVerbosePreference = $VerbosePreference
# Invoke in separate AppDomain
if($X509Credential)
{
Write-Verbose "X509Credential: $X509Credential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $false;
"X509Credential" = $true;
"ServerCertThumbprint" = $ServerCertThumbprint;
"StoreLocation" = $StoreLocation;
"StoreName" = $StoreName;
"FindValueThumbprint" = $FindValueThumbprint;
}
}
else
{
if($WindowsCredential)
{
Write-Verbose "WindowsCredential: $WindowsCredential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $true;
}
}
else
{
Write-Verbose "Not X509Credential nor WindowsCredential."
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
}
}
}
if ($parentVerbosePreference -ne "SilentlyContinue")
{
$argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" }
}
$standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt"
if (Test-Path $standaloneArgsFilepath)
{
Remove-Item $standaloneArgsFilepath -Force 2> $null
}
$argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" }
$standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath
$shelloutArgs = @( $standaloneArgsFilepath )
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $ParamFilepath
)
Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object {
$var = $_.Split('=')
if ($var.Length -eq 2)
{
New-Variable -Name $var[0] -Value $var[1] -Force
}
}
Remove-Item $ParamFilepath -Force 2> $null
if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false}
if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false}
if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false}
if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false}
if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false}
if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false}
if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); }
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint"
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
}
Catch
{
Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
if ($ClusterConnection -eq $null) {
Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($FabricIsPreInstalled)
{
Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine."
}
elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) `
-or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath))
{
Try
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
}
Catch
{
Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
if ($BypassUpgradeStateValidation)
{
Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red
}
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
Try
{
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if (!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if ($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
}
#Add Node to an existing cluster
Try
{
$AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds)
$AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration
Get-ServiceFabricNode | ft
$VerbosePreference = $parentVerbosePreference
$params = @{
'NodeName' = $NodeName;
'NodeType' = $NodeType;
'IpAddressOrFQDN' = $NodeIpAddressOrFQDN;
'UpgradeDomain' = $UpgradeDomain;
'FaultDomain' = $FaultDomain;
'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath;
'NoCleanupOnFailure' = $NoCleanupOnFailure;
'Force' = $Force;
'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation;
'FabricIsPreInstalled' = $FabricIsPreInstalled;
}
if ((Test-Path variable:TimeoutInSeconds) `
-and ($TimeoutInSeconds -gt 0))
{
$params += @{'TimeoutSec' = $TimeoutInSeconds;}
}
Write-Host "Adding Node $NodeName"
Add-ServiceFabricNode @params
Write-Host "Waiting for node to join cluster." -NoNewline
$nodeJoined=$false
$firstRun=$true
do
{
if (!$nodeJoined -and !$firstRun)
{
Write-Host "." -NoNewline
Start-Sleep -s 10
}
$result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 }
$nodeJoined=$result.Count -gt 0
$firstRun=$false
} while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout))
Write-Host "" # Newline
if(-not $nodeJoined)
{
Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red
exit 1
}
Get-ServiceFabricNode | ft
Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green
}
Catch
{
if($VerbosePreference -eq "SilentlyContinue")
{
Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red
}
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $shelloutArgs -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr
# XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF
# cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAd907ALwOFz+0066D2KBDUMbSKEoiRB+FPi9NTiYmG0UF2TEruWymfGb2
# LvNdYA3CyRrokT6Ob7RyJcxExpdSjC7NGHtrrnM12f3k0mDVKXYC38xRoXxBZmV8
# f8cNjg0CFFCqVv5hWq5XoGDgJY1GR6hwq2WCU8yWyQ3dooH6kvlgwkgC7scTjAFh
# 8RXE7Mty1KDDfW0ab34oPrYDZ4O9wa4U8zcjHxnkXFscmvlNGudcr787FNzGIIrk
# G0UYXbh1eA1aASAXMcbIiPL6/uJwFr2NOPrazyWeeX7/ID578XgJI82KQGd8hwxk
# XF3kMnMFTx81GneYWWhWviue7iCnF6GCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC
# F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCknY32Zz9RgMMmrp2e08tIikHcxjgKrRHYDwgfXUfzbwIGZc31LGZQ
# GBMyMDI0MDIxNTIxNDg0Ni4yODJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHpMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM
# MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XhzqjAiGA8yMDI0MDIxNTExMjcz
# OFoYDzIwMjQwMjE2MTEyNzM4WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDpeHOq
# AgEAMAYCAQACAQgwBwIBAAICEqwwCgIFAOl5xSoCAQAwNgYKKwYBBAGEWQoEAjEo
# MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG
# 9w0BAQsFAAOCAQEApMLbViYv2jdbOvOHgDGzHJHhT3R9Z6poCpm1/YGd93AfQK0I
# ZAgVCGf/Gedb1FilWG49hKpxfS4O9Wn9Q8TotFpIejY91Tz9M6D1H5T/zBQ1huNo
# eCQrgkwwZ9ysO+DOQ3U3M3yzJoSjx1KwhD9eZtDEibRtZ9Mnj+1xNHZDPvEAmbvC
# mjpYhJSwTkjYcIip7SqMwEsYnBxSXzI+mMashrmBPWDkm94Gt0gtHdJl+MzkxLRy
# DskP9rjCzXWhxhddYJXSh3J3MpITjwFMdPL3dL33W0/lCPiVK/IERNLv5qybzL0Z
# DZH/Dk1Tl3gHKzEkyKaI7ffLUDlQQtA75tSHozGCBA0wggQJAgEBMIGTMHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHsMA0G
# CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ
# KoZIhvcNAQkEMSIEIJPqaljP1LO/KMtiJjxSHN2W4Wo2z2bE8a/FrJVicMKqMIH6
# BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgJwnm9Wp9N8iHHbVAEFsrKj/FyJAh
# dqgxZQt6MATVCoMwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAezgK6SC0JFSgAABAAAB7DAiBCBjKxcCuQDR64mXkyxZr022uyJUZzw7
# zxEL8Rn/VworzTANBgkqhkiG9w0BAQsFAASCAgCuiIN6vXrYjRtAlsIHOWjr6wa2
# 13YcGw+QW0ogvFwC5l5l8PRGr8h8niVXsx2SRQSG9xqVjhO0cZ5ZnSnPv/dXjVwq
# HewCouEYYEG0T9jY2QNiiFWL4cE0oaC88G4tS4XldvbbdRa8TjDEKWrinITeO2qT
# wjlD6rptPcpaV41riku2IpZZWaThVKKzcz3UmTIQTRKHU+WnJ3xg38FgGhDlNRxl
# AsDUYPY6GpEMaVCphmcSTK+LFR0OhqJoXymxY/Qp7T2BDzLuO/gy/h5rmepyVZPz
# EBmE79K7TnWiu1lcfciq3I2YcW3Vy9sfqIXrhkbUBm5ACxeuX2cloRJAntvbwPPw
# xNR3UvOBSfs1F8ci1RAjQ/jGe8ijBarHkFC6EY08MLjOLvVlhA3NmVRu+GfjNSBD
# YDvGXTdlJZUl9o7K0h+kyNByIbRG6vtGeJRVP20zHVOv7wKx0Ns6s55PuaBnXRn0
# NUkvvYPxy+G+DCQYm0eNr7w56p/YFWsshunuP7UjJcKZYqJtoLeoaQ/WM8cnTtMD
# 8DTQKjkd/da6Ng/kzrKCHcBcmU+KhvbS7Fs6EdtvxhYDpWTuPNhS6p9IMgFZAkPh
# SIlKwRZo+tK8T1oABZa8meLAmxRPVoC+jxqbTjLrme7PEhkBdkjjEOQsBrN4fEwl
# w2qMh2SFr0RnHAwjWg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_21_63.ps1
|
sample_21_63.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Set-AMTSystemDefense {
<#
.Synopsis
Enables Intel Active Management Technology System Defense
.Description
This CmdLet disables network access using Intel Active Management Technology (AMT) System Defense from clients that have Intel AMT Firmware version 3.0 and Higher.
.Notes
Supported AMT Firmware Versions: 3.0 and higher
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This Cmdlet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Set-AMTSystemDefense vproclient.vprodemo.com -TLS
ComputerName Port Status EnabledOnInterfaces
------------ ---- ------ -------------------
vproclient.vprodemo.com 16993 Successful Wireless1, Wired
.Example
Set-AMTSystemDefense vproclient 16992 -username:amtuser
Will prompt for digest username password.
ComputerName Port Status EnabledOnInterfaces
------------ ---- ------ -------------------
vproclient 16992 Successful Wireless1, Wired0
.Example
Get-Content computers.txt | Set-AMTSystemDefense -TLS
Will pull the list of amt clients from a text file and pipe them into Set-AMTSystemDefense
ComputerName Port Status EnabledOnInterfaces
------------ ---- ------ -------------------
Computer1.vprodemo.com 16993 Successful Wireless1, Wired0
Computer2.vprodemo.com 16993 Successful Wired0
.Example
Set-AMTSystemDefense vproclient.vprodemo.com -TLS -XMLConfig xmlfile.xml
Here is the outline of the xml format, see 'System Defense' in the AMT SDK for more details.
http://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide/default.htm
<?xml version="1.0"?>
<SystemDefensePolicySet>
<ArrayOfFilter xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<Filter xsi:type="AMT_Hdr8021Filter">
<Name/>
<PolicyName/>
<CreationClassName/>
<SystemName/>
<SystemCreationClassName/>
<FilterProfile/>
<FilterDirection/>
<ActionEventOnMatch/>
<HdrProtocolID8021/>
</Filter>
<Filter xsi:type="AMT_IPHeadersFilter">
<Name/>
<PolicyName/>
<CreationClassName/>
<SystemName/>
<SystemCreationClassName/>
<HdrIPVersion/>
<HdrProtocolID/>
<FilterProfile/>
<FilterDirection/>
<ActionEventOnMatch/>
<HdrDestAddress/>
<HdrDestMask/>
<HdrDestPortStart/>
<HdrDestPortEnd/>
</Filter>
</ArrayOfFilter>
<ArrayOfPolicies xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<Policy xsi:type="AMT_systemDefensePolicy">
<PolicyName/>
<PolicyPrecedence/>
<AntiSpoofingSupport/>
<TxDefaultDrop/>
<TxDefaultMatchEvent/>
<TxDefaultCount/>
<RxDefaultDrop/>
<RxDefaultMatchEvent/>
<RxDefaultCount/>
<Active/>
</Policy>
</ArrayOfPolicies>
</SystemDefensePolicySet>
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Path to XMl configuration file")] [string] $XMLConfig
)
PROCESS {
$defaultXML = @'
<?xml version="1.0"?>
<SystemDefensePolicySet>
<ArrayOfFilter xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<Filter xsi:type="AMT_Hdr8021Filter">
<Name>defaultBlock</Name>
<PolicyName>defaultPolicy</PolicyName>
<CreationClassName>n/a</CreationClassName>
<SystemName>n/a</SystemName>
<SystemCreationClassName>n/a</SystemCreationClassName>
<FilterProfile>1</FilterProfile>
<FilterDirection>0</FilterDirection>
<ActionEventOnMatch>false</ActionEventOnMatch>
<HdrProtocolID8021>2048</HdrProtocolID8021>
</Filter>
</ArrayOfFilter>
<ArrayOfPolicies xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema">
<Policy xsi:type="AMT_systemDefensePolicy">
<PolicyName>defaultPolicy</PolicyName>
<PolicyPrecedence>0</PolicyPrecedence>
<AntiSpoofingSupport>3</AntiSpoofingSupport>
<TxDefaultDrop>false</TxDefaultDrop>
<TxDefaultMatchEvent>false</TxDefaultMatchEvent>
<TxDefaultCount>true</TxDefaultCount>
<RxDefaultDrop>false</RxDefaultDrop>
<RxDefaultMatchEvent>true</RxDefaultMatchEvent>
<RxDefaultCount>false</RxDefaultCount>
<Active>true</Active>
</Policy>
</ArrayOfPolicies>
</SystemDefensePolicySet>
'@
if($XMLConfig) {
[xml]$data = get-content $XMLConfig
} else {
[xml]$data = $defaultXML
}
$filterList = $data.selectnodes("/SystemDefensePolicySet/ArrayOfFilter/Filter")
$Results = @()
try
{
$Obj = new-object psobject
$Connection = New-Object Intel.Management.Wsman.WsmanConnection
if ($credential.username.Length -gt 0)
{
$Connection.SetCredentials($credential.Username, $credential.Password)
}
elseif ($username.length -gt 0)
{
if ($password.length -gt 0)
{
$Connection.SetCredentials($username, $password)
}
else
{
$cred = Get-Credential $username
$Connection.SetCredentials($cred.Username, $cred.Password)
}
}
if ($Port.Length -lt 1) {
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
}
Foreach ($comp in $ComputerName)
{
$Connection.SetHost($comp, $port)
# Enable
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name Port -value $port
$EnabledInterfaces = ""
$cport = $Connection.NewReference("http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_EthernetPort")
try
{
$cportEnumeration = $cport.Enumerate($null, $null)
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed"
$Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value ""
$Results += $Obj
continue
}
Write-Output $Results
$filterTable = @{}
foreach($filter in $filterList)
{
if($filter.type -eq "AMT_Hdr8021Filter")
{
$AMT_Hdr8021Filter = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_Hdr8021Filter")
$AMT_Hdr8021Filter.AddProperty("InstanceID","0")
if($filter.Name)
{
$AMT_Hdr8021Filter.AddProperty("Name",$filter.Name)
}
if($filter.CreationClassName)
{
$AMT_Hdr8021Filter.AddProperty("CreationClassName",$filter.CreationClassName)
}
if($filter.SystemName)
{
$AMT_Hdr8021Filter.AddProperty("SystemName", $filter.SystemName)
}
if($filter.SystemCreationClassName)
{
$AMT_Hdr8021Filter.AddProperty("SystemCreationClassName", $filter.SystemCreationClassName)
}
if($filter.HdrProtocolID8021)
{
$AMT_Hdr8021Filter.AddProperty("HdrProtocolID8021", $filter.HdrProtocolID8021)
}
if($filter.FilterProfile)
{
$AMT_Hdr8021Filter.AddProperty("FilterProfile", $filter.FilterProfile)
}
if($filter.FilterDirection)
{
$AMT_Hdr8021Filter.AddProperty("FilterDirection", $filter.FilterDirection)
}
if($filter.ActionEventOnMatch)
{
$AMT_Hdr8021Filter.AddProperty("ActionEventOnMatch", $filter.ActionEventOnMatch)
}
if($filter.FilterProfileData)
{
$AMT_Hdr8021Filter.AddProperty("FilterProfileData", $filter.FilterProfileData)
}
$ID = $AMT_Hdr8021Filter.Create().Get().GetProperty("InstanceID").ToString()
$filterTable[$ID] = $filter.PolicyName
}
if($filter.type -eq "AMT_IPHeadersFilter")
{
$AMT_IPHeadersFilter = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_IPHeadersFilter")
$AMT_IPHeadersFilter.AddProperty("InstanceID","0")
if($filter.Name)
{
$AMT_IPHeadersFilter.AddProperty("Name",$filter.Name)
}
if($filter.CreationClassName)
{
$AMT_IPHeadersFilter.AddProperty("CreationClassName",$filter.CreationClassName)
}
if($filter.SystemName)
{
$AMT_IPHeadersFilter.AddProperty("SystemName", $filter.SystemName)
}
if($filter.SystemCreationClassName)
{
$AMT_IPHeadersFilter.AddProperty("SystemCreationClassName", $filter.SystemCreationClassName)
}
if($filter.FilterProfile)
{
$AMT_IPHeadersFilter.AddProperty("FilterProfile", $filter.FilterProfile)
}
if($filter.FilterDirection)
{
$AMT_IPHeadersFilter.AddProperty("FilterDirection", $filter.FilterDirection)
}
if($filter.ActionEventOnMatch)
{
$AMT_IPHeadersFilter.AddProperty("ActionEventOnMatch", $filter.ActionEventOnMatch)
}
if($filter.HdrIPVersion)
{
$AMT_IPHeadersFilter.AddProperty("HdrIPVersion", $filter.HdrIPVersion)
}
if($filter.HdrSrcAddress)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestAddress", $filter.HdrDestAddress)
}
if($filter.HdrSrcMask)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestMask", $filter.HdrDestMask)
}
if($filter.HdrDestAddress)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestAddress", $filter.HdrDestAddress)
}
if($filter.HdrDestMask)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestMask", $filter.HdrDestMask)
}
if($filter.HdrProtocolID)
{
$AMT_IPHeadersFilter.AddProperty("HdrProtocolID", $filter.HdrProtocolID)
}
if($filter.HdrSrcPortStart)
{
$AMT_IPHeadersFilter.AddProperty("HdrSrcPortStart", $filter.HdrSrcPortStart)
}
if($filter.HdrSrcPortEnd)
{
$AMT_IPHeadersFilter.AddProperty("HdrSrcPortEnd", $filter.HdrSrcPortEnd)
}
if($filter.HdrDestPortStart)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestPortStart", $filter.HdrDestPortStart)
}
if($filter.HdrDestPortEnd)
{
$AMT_IPHeadersFilter.AddProperty("HdrDestPortEnd", $filter.HdrDestPortEnd)
}
if($filter.TCPFlagsOn)
{
$AMT_IPHeadersFilter.AddProperty("TCPFlagsOn ", $filter.TCPFlagsOn)
}
if($filter.TCPFlagsOff)
{
$AMT_IPHeadersFilter.AddProperty("TCPFlagsOff ", $filter.TCPFlagsOff)
}
if($filter.FilterProfileData)
{
$AMT_IPHeadersFilter.AddProperty("FilterProfileData ", $filter.FilterProfileData)
}
$ID = $AMT_IPHeadersFilter.Create().Get().GetProperty("InstanceID").ToString()
$filterTable[$ID] = $filter.PolicyName
}
}
$policyList= $data.selectnodes("/SystemDefensePolicySet/ArrayOfPolicies/Policy")
foreach($policy in $policyList)
{
$AMT_SystemDefensePolicy = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SystemDefensePolicy")
$AMT_SystemDefensePolicy.AddProperty("InstanceID","n/a")
if($policy.PolicyName)
{
$AMT_SystemDefensePolicy.AddProperty("PolicyName", $policy.PolicyName)
}
if($policy.PolicyPrecedence)
{
$AMT_SystemDefensePolicy.AddProperty("PolicyPrecedence", $policy.PolicyPrecedence)
}
if($policy.AntiSpoofingSupport)
{
$AMT_SystemDefensePolicy.AddProperty("AntiSpoofingSupport", $policy.AntiSpoofingSupport)
}
if($policy.TxDefaultDrop)
{
$AMT_SystemDefensePolicy.AddProperty("TxDefaultDrop", $policy.TxDefaultDrop)
}
if($policy.TxDefaultMatchEvent)
{
$AMT_SystemDefensePolicy.AddProperty("TxDefaultMatchEvent", $policy.TxDefaultMatchEvent)
}
if($policy.TxDefaultCount)
{
$AMT_SystemDefensePolicy.AddProperty("TxDefaultCount", $policy.TxDefaultCount)
}
if($policy.RxDefaultDrop)
{
$AMT_SystemDefensePolicy.AddProperty("RxDefaultDrop", $policy.RxDefaultDrop)
}
if($policy.RxDefaultMatchEvent)
{
$AMT_SystemDefensePolicy.AddProperty("RxDefaultMatchEvent", $policy.RxDefaultMatchEvent)
}
if($policy.RxDefaultCount)
{
$AMT_SystemDefensePolicy.AddProperty("RxDefaultCount", $policy.RxDefaultCount)
}
foreach($filterID in $filterTable.GetEnumerator())
{
if($filterID.Value -eq $policy.policyName)
{
$AMT_SystemDefensePolicy.AddProperty("FilterCreationHandles", $FilterID.Name)
}
}
$Policy_EPR = $AMT_SystemDefensePolicy.Create()
if($policy.Active)
{
$ActivePolicy_EPR = $Policy_EPR
}
}
if($ActivePolicy_EPR)
{
while($cportEnumeration.HasNext)
{
$portReference = $cportEnumeration.Next().Object
[System.String[]] $EthernetPort_KeyNames = "CreationClassName", "DeviceID", "SystemCreationClassName", "SystemName"
$EthernetPort_EPR = $portReference.ToReference($EthernetPort_KeyNames)
$NetworkPolicy = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_NetworkPortSystemDefensePolicy")
$NetworkPolicy.AddProperty("Antecedent",$EthernetPort_EPR)
$NetworkPolicy.AddProperty("Dependent",$ActivePolicy_EPR)
$NetworkPolicy.AddProperty("Enabled","true")
$NetworkPolicy.AddProperty("Active","true")
$NetoworkPolicyObject = $NetworkPolicy.Create()
$EthernetPortName = $portReference.GetProperty("Description").ToString()
if($EnabledInterfaces -eq "")
{
$EnabledInterfaces = $EthernetPortName
}
else
{
$EnabledInterfaces = $EnabledInterfaces +", " + $EthernetPortName
}
}
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful"
$Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value $EnabledInterfaces
$Results += $Obj
}
}
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed"
$Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value $EnabledInterfaces
$Obj | Add-Member -MemberType noteproperty -Name "Reason" -value $_.Exception.Message
$Results += $Obj
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCACUNhrCKc7XPr8
# i909xe/EcFLpM5ZkevbwXYuwkm/ddKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgk4meK33fYzeHVKaX
# SqOGxb7ce3AMqN8PLyI9vyBGCU0wDQYJKoZIhvcNAQEBBQAEggGAxv0bn5ogoz4+
# VVEln+wb2HbAulpb9uEuwxidPco0ndgK8bnzzWoInmwNAyTsij8PVitthcYykZOc
# ot6viV2TAjP0vjTg1T5GntEp8WrPvUs4TwFSvYIy0EH++ScGICVSuIQ6ROiykcQx
# aDUU2w8pYA5cbo6qP6y6coMoqNc5kf40UOFjBKgyQ9fCGlsNBYe2SqC0EtPzlkCs
# HESqM34dhxk1szh8edNspPC7nZIk/oeViM2oa1ue+cAxYPmFVvePTegAfQF/HmVM
# Cw+TSp6+lCbJ6QVOZKDtJPsbYk282TYay2Rt8mZw8Vq63t2XXJFN31pJuyEsaUHd
# q776VPtJUBz9XoOSDApElJCx0V2SqjPY0+HH7m2WwSGcy5PO0qilAEJTX9U9ralz
# NnWZ3Y3bbmEJLbq4znxve1JMqtvMbBiiNzJekcZKPLjYkZUfKKcXbpDrdwgpnYxJ
# I9SqK9sMaVD8CSSpRWQRW6XgX19/1UtxOS0g3YAkK4Fj2M5Bs8TgoYITgDCCE3wG
# CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIEffwjL4YXT30mMAC4YBOGPJ21rmJ/ubkL1/
# ADg8/78SAhUA6NxX+vb7Hc/mDRYpooR+Jam0B0QYDzIwMjEwNzE5MTYzMTI5WqCB
# iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl
# cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww
# KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw
# ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN
# MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg
# TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l
# ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T
# B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi
# Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL
# GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q
# BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8
# 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG
# 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy
# 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK
# 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K
# ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb
# LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U
# Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa
# ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu
# 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI
# KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC
# ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js
# MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv
# LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo
# dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz
# 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX
# VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu
# k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA
# 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g
# XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA
# iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f
# XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC
# A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg
# no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q
# uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p
# sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY
# dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo
# ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0
# aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5
# NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx
# EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG
# A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN
# AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na
# wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV
# cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc
# 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh
# e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI
# jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w
# ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5
# VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT
# IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo
# RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr
# t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB
# eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm
# yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG
# MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g
# BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy
# dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2
# BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0
# LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0
# cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd
# FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A
# w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh
# RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4
# OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv
# WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH
# HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL
# nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf
# tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p
# oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq
# /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi
# Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD
# VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT
# YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp
# Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG
# SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI
# hvcNAQkFMQ8XDTIxMDcxOTE2MzEyOVowPwYJKoZIhvcNAQkEMTIEMJSLohN22yTd
# ilzyab3FpJKt2IS30elZ+vUfApqZHFB31Eli4c7vW+S33I7MWBlT7zCB7QYLKoZI
# hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW
# W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT
# FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD
# ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG
# 9w0BAQEFAASCAgAs7ESry0rR0oGZ9494mnnnfxXIfZqEyiOO0hOwc8ePSNXHZvBw
# SPDfB67Vv921UaHPlyH+BgE+nNLDxRcNBLUPLs6VXFSUjw5PU653/PtwCOvGiT+a
# dcKrVIE3tVUA0TndBcWvsRdgFXb4NIU2f7+B3E7aJeqBDhb9LgzjDgSoNlX0CdsD
# PORTfg0e62Dfulua3oBJ6C5nLvwiH4Ve8sYF8tmn5zfh/AQqH5D6xGjYoJVTYj9a
# D+hzUKtfB+4ANeB8rd8kV6x+kextpOFMewRcObeOjdcpRXsKwd+UJ/PSWJ1OuCud
# ySawmeysWiaZhFdrnk+yiLEF/4ddwWRMmTqZD/Eo4mIVXyeByKvMVNN5Hvtn0mju
# PjviynJruume3jLKsy4qx+nAOkTHrrbMR/rXqXWG6k49D17cQZtxV1EqU7pV2JNL
# TRMiorZB2+ejttqduup3a05y12rTBbnwZhBuCcjBge5LaWh4E3RWJUIEhwQh7I1D
# 1sTh4xqir+4uZdcnkiFhsUTEttrfvcJzANr6wATxH68S6565onHGM5ly2SHs4Fit
# zkhBfoCTdTAB3qSusU+6aXU3Y7QOr0SfbkKWZwCbAylNTiQxMqr7JGXl7dDfCNRp
# UmMxtEnmFmwa7JvL3ZtZaPT2+k5J71s0FKN1KrMOzp/kMEe28hKcZLy9rg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_33_81.ps1
|
sample_33_81.ps1
|
@{
GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Copyright (C) Microsoft Corporation. All rights reserved."
ModuleVersion = '1.0'
NestedModules = @( 'MSFT_MpComputerStatus.cdxml',
'MSFT_MpPreference.cdxml',
'MSFT_MpThreat.cdxml',
'MSFT_MpThreatCatalog.cdxml',
'MSFT_MpThreatDetection.cdxml',
'MSFT_MpScan.cdxml',
'MSFT_MpSignature.cdxml',
'MSFT_MpWDOScan.cdxml',
'MSFT_MpRollback.cdxml'
)
FunctionsToExport = @( 'Get-MpPreference',
'Set-MpPreference',
'Add-MpPreference',
'Remove-MpPreference',
'Get-MpComputerStatus',
'Get-MpThreat',
'Get-MpThreatCatalog',
'Get-MpThreatDetection',
'Start-MpScan',
'Update-MpSignature',
'Remove-MpThreat',
'Start-MpWDOScan',
'Start-MpRollback'
)
HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762"
PowerShellVersion = '3.0'
}
# SIG # Begin signature block
# MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7
# MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl
# RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT
# Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5
# eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW
# AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1
# PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD
# s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX
# ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w
# S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
# aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO
# 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j
# cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV
# HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf
# E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L
# fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t
# ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH
# g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1
# et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG
# azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz
# WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw
# DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+
# DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS
# cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/
# OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU
# pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA
# vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA
# AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY
# mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g
# BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH
# AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl
# AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC
# lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz
# /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b
# jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9
# TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b
# 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9
# pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj
# ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol
# Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ
# 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN
# Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w
# 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB
# IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ
# KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB
# gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq
# aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa
# gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy
# QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs
# 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6
# 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf
# L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4
# XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V
# pyexP/sw9u51ejlEtaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3
# DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB
# BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8
# TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZbqiZwUPGBMyMDI0MDIx
# NzIxMDgzMi44MjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJC
# MC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR
# eDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQEL
# BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5
# WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM
# aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjEl
# MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgd
# LaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrA
# Brfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879
# lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahN
# kFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoF
# Y1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCS
# baFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA
# 0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLq
# GwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvH
# Vp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2
# xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T
# 1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDS
# mdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU
# oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB
# BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w
# cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j
# cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B
# Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yV
# A1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1
# iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr
# /kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCe
# RBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZ
# tbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukH
# o16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KO
# uKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kau
# x9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7
# Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y
# 0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R
# 3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN
# BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y
# aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC
# AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi
# vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G
# awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm
# ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks
# UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr
# g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B
# mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR
# c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR
# RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR
# lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS
# xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd
# MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa
# voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD
# VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud
# JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR
# PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy
# bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z
# b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G
# CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix
# BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY
# Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5
# 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU
# hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM
# vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A
# PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN
# n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs
# c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1
# 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g
# MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm
# 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0
# aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAt
# ODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB
# MAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOl7iP0wIhgP
# MjAyNDAyMTgwMzM1MjVaGA8yMDI0MDIxOTAzMzUyNVowdDA6BgorBgEEAYRZCgQB
# MSwwKjAKAgUA6XuI/QIBADAHAgEAAgIa5TAHAgEAAgIS4zAKAgUA6XzafQIBADA2
# BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB
# AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFtYlpEGtEyeVRC9n4FJXnGlonWiBlIU
# gK5OMO1jPhddE2nOVMkta740zRACOGDBhSUxfsK1AZTfffdGxNjkNEDXGkHPVjsU
# JtTJOe+wrEDXpEytL2m8l+YqTLtYuY/VHNG6lNe8pQuFBdGARzLHoRRUk96UY1uD
# HvUqebJaSTLvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg4crXMZf5
# gXJ8mACDpj77PtaJMhA/vdTGmXR0UDGo99IwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEA
# AAHgMCIEIK+uByFerfFXIOYHXUGMvWUxa2sANq0pAaxyz0zcIn7UMA0GCSqGSIb3
# DQEBCwUABIICAEQQEZu9z1nrZxuBTTn/uFosxi3/+XjK3ZncBmJ6/5SoyabdV+Hf
# OKwJ7Th5riDFJToBXkTo5Xpb/cbpvv6WEAl496MTUCEuh9paxQHJf31jh8ISSr92
# kf7gMlGqlNIRtQHX/UooczrX1hbpLUg8TAr+FOBmZ+uS2HUu62dKKMksrDzQLiXZ
# A8M+V/RPMHqV3d3JrpZudhMIdhcI4Kk6x12YVU2c3SKk6ns1B6x8pLQua+0SN/VV
# Oxlmm6RLfUYzOpc7k3ZJQTBHePux7aNEyGnrfTm/ehlqdGXjTee8LluzgCSKJLIt
# 54YglQHv1ivWJDGEiJplV2G5kwL5xNBfGCUAmjjHRKvoowRYTtoAxr9WI6qHBIPc
# eKUaS3cPMNLO+fFuvJ5Y12+MYmU58/WIAAG9OQdq/OmjCGr7+AEDiHshDnwPGJ9s
# 4vuG0pnmFcYigRPwuTgfnRascUxzPiE6i5mZfKei9/u+LEKrO7+71nk46qv+IT3h
# Hzlioh9uehW8Qank711Bfpi8gI6e2GYApCrUSBjfRV35ztVK//FHXOHQalTzUS73
# JsnDJEAotNaCAofeUkPNlM6hMCXXG2EqkZlljuvdj34ZjxzjKVLdpEzBIhysOZF+
# twAQYCLmlehgafOfKXwuHhlDuk1PMKCa8UiOzKSIC2QkSeTQDphEwgvc
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_19_80.ps1
|
sample_19_80.ps1
|
---
title: Powershell
description: Powershell snippets on the rocks.
---
## [cotrWhileLoop](/snippets/cotrwhileloop)
PowerShell While Loop
```powershell
while (${1:condition}) {
# Your code here
}
```
## [cotrEqual](/snippets/cotrequal)
PowerShell Equal To
```powershell
-eq
```
## [cotrNotEqual](/snippets/cotrnotequal)
PowerShell Not Equal To
```powershell
-ne
```
## [cotrTypesBoolTrue](/snippets/cotrtypesbooltrue)
PowerShell Boolean True
```powershell
$true
```
## [cotrVarStringMulti](/snippets/cotrvarstringmulti)
PowerShell Create Multi-Line String Variable
```powershell
$${1:myString} = @"
${2:Line 1}
${3:Line 2}
${4:Line 3}
"@;
```
## [cotrTypeCompare](/snippets/cotrtypecompare)
PowerShell Type Comparison
```powershell
# Check if two variables have the same type:
if (${1:variable1}.GetType() -eq ${2:variable2}.GetType()) {
# Your code here
}
```
## [cotrTypes](/snippets/cotrtypes)
PowerShell Types
```powershell
$BLOCK_COMMENT_START
PowerShell is a dynamically typed language.
Some common types in PowerShell include:
- [int]: Integer
- [double]: Double-precision floating-point number
- [string]: String
- [bool]: Boolean
- [array]: Array
- [hashtable]: Hash table (associative array)
- [datetime]: Date and time
- [PSCustomObject]: Custom object
- [System.Collections.Hashtable]: .NET Hashtable
- [System.Collections.Generic.List[T]]: .NET Generic List
- [System.Management.Automation.PSObject]: PowerShell object
$BLOCK_COMMENT_END
```
## [cotrTypesNum](/snippets/cotrtypesnum)
PowerShell Double Type
```powershell
[double]
```
## [cotrPrintMulti](/snippets/cotrprintmulti)
PowerShell Print Multi
```powershell
Write-Host @"
${1:Line 1}
${2:Line 2}
${3:Line 3}
"@;
```
## [cotrOperators](/snippets/cotroperators)
PowerShell Mathematical Operators
```powershell
# PowerShell Mathematical Operators
# Addition: +
# Subtraction: -
# Multiplication: *
# Division: /
# Modulus (Remainder): %
# Exponentiation: Not directly supported, use [Math]::Pow(base, exponent)
# Increment: Use += 1
# Decrement: Use -= 1
# Assignment: =
# Addition assignment: +=
# Subtraction assignment: -=
# Multiplication assignment: *=
# Division assignment: /=
# Modulus assignment: %=
```
## [cotrVar](/snippets/cotrvar)
PowerShell Create Variable
```powershell
$${1:myVar} = $2
```
## [cotrConst](/snippets/cotrconst)
PowerShell Create Constant
```powershell
$${1:myConst} = $2
```
## [cotrInfo](/snippets/cotrinfo)
PowerShell Info
```powershell
# Typing: Dynamically typed
# Paradigm: Object-oriented, imperative, scripting
# Compilation: Interpreted
# Concurrency: Supports multi-threading with the System.Threading namespace
```
## [cotrConcat](/snippets/cotrconcat)
PowerShell Concatenate Strings
```powershell
"${1:string1}" + "${2:string2}"
```
## [cotrFuncLambda](/snippets/cotrfunclambda)
PowerShell Lambda Function (Script Block)
```powershell
# PowerShell does not have a 'lambda' keyword.
# Instead, script blocks are used as anonymous functions.
$lambda = {
param(${1:parameters})
${2:# Your code here}
}
# Usage
$result = $lambda.Invoke(${3:arguments})
Write-Host "Result: $result"
```
## [cotrFuncArrow](/snippets/cotrfuncarrow)
PowerShell Arrow Function
```powershell
{${1:parameters} ->
${2:# Your code here}
}
```
## [cotrVarBool](/snippets/cotrvarbool)
PowerShell Create Boolean Variable
```powershell
$${1:myBool} = ${2:$true}
```
## [cotrVarList](/snippets/cotrvarlist)
PowerShell Create Array Variable
```powershell
$${1:myArray} = @(${2:items})
```
## [cotrForLoop](/snippets/cotrforloop)
PowerShell For Loop
```powershell
for ($${1:i} = 0; $1 -lt ${2:10}; $1++) {
# Your code here
}
```
## [cotrOperatorsBool](/snippets/cotroperatorsbool)
PowerShell Boolean Operators
```powershell
# PowerShell Boolean Operators
# Logical AND: -and
# Logical OR: -or
# Logical NOT: -not
# Equality: -eq
# Inequality: -ne
# Greater than: -gt
# Less than: -lt
# Greater than or equal to: -ge
# Less than or equal to: -le
```
## [cotrNow](/snippets/cotrnow)
PowerShell Date Now
```powershell
Get-Date
```
## [cotrIf](/snippets/cotrif)
PowerShell If Statement
```powershell
if (${1:condition}) {
# Your code here
}
```
## [cotrFuncArgs](/snippets/cotrfuncargs)
PowerShell Function Args
```powershell
# In PowerShell, functions can have arguments with default values.
function ${2:myFunction} {
param (
[${3:Type}] $${4:arg1},
[${5:Type}] $${6:arg2} = ${7:defaultValue}
)
${8:# Your code here}
}
```
## [cotrThrow](/snippets/cotrthrow)
PowerShell Throw Exception
```powershell
throw '${1:Your message here}'
```
## [cotrTernary](/snippets/cotrternary)
PowerShell Ternary Operator
```powershell
${1:condition} ? ${2:trueValue} : ${3:falseValue}
```
## [cotrFuncSyntax](/snippets/cotrfuncsyntax)
PowerShell Function Syntax
```powershell
# PowerShell Function Syntax
# Basic function:
# function functionName {
# param (
# parameters
# )
# # Your code here
# }
# Function with arguments:
# function functionName {
# param (
# [Type] $arg1,
# [Type] $arg2,
# ...
# )
# # Your code here
# }
```
## [cotrStructure](/snippets/cotrstructure)
PowerShell Project Structure (High-Level)
```powershell
# Recommended High-Level PowerShell Project Structure:
# - /
# - README.md: Documentation about the project.
# - .ps1 files: Individual PowerShell script files.
# - /src
# - Contains PowerShell modules or scripts organized by functionality.
# - /tests
# - Contains Pester tests for testing your PowerShell scripts and modules.
# - /lib
# - Optional: Contains third-party libraries or scripts used in the project.
# - /docs
# - Optional: Additional documentation, help files, or related documents.
# - /tools
# - Optional: Utility and helper scripts that assist with project tasks.
# - /output
# - Optional: A location to store output files generated by scripts.
# Note:
# - Organize .ps1 script files and modules in the src folder for clarity.
# - Use descriptive names for script files to indicate their purpose or function.
```
## [cotrTypesDate](/snippets/cotrtypesdate)
PowerShell Date Type
```powershell
[datetime]
```
## [cotrVarNullable](/snippets/cotrvarnullable)
PowerShell Create Nullable Variable
```powershell
$${1:myVar} = $null
```
## [cotrVarDate](/snippets/cotrvardate)
PowerShell Create Date Variable
```powershell
$${1:myDate} = Get-Date -Year ${2:year} -Month ${3:month} -Day ${4:day}
```
## [cotrVarSyntax](/snippets/cotrvarsyntax)
PowerShell Variable Declaration Syntax
```powershell
# PowerShell Variable Declaration Syntax:
# - $: (Scope: Global or Function)
# - Variables start with a dollar sign.
# - Can be reassigned and redeclared within their scope.
# - Use with caution due to potential scoping issues.
# - const: (Scope: Global)
# - Cannot be reassigned or redeclared.
# - Use for values that should remain constant.
# Note:
# - PHP does not have a direct equivalent to 'let'.
# - Use '$' for most variable declarations.
# - Use 'const' for values that are known at compile time.
```
## [cotrFuncArgsNamed](/snippets/cotrfuncargsnamed)
PowerShell Named Arguments Function
```powershell
function ${2:MyFunction} {
param(
[Parameter(Mandatory)]
[${3:type}] ${4:$arg1},
[Parameter(Mandatory)]
[${5:type}] ${6:$arg2}
)
${7:# Your code here}
}
```
## [cotrClass](/snippets/cotrclass)
PowerShell Class
```powershell
class ${1:MyClass} {
# Your code here
}
```
## [cotrTypesString](/snippets/cotrtypesstring)
PowerShell String Type
```powershell
[string]
```
## [cotrForEachLoop](/snippets/cotrforeachloop)
PowerShell For Each Loop
```powershell
foreach ($${1:item} in ${2:iterable}) {
# Your code here
}
```
## [cotrFunc](/snippets/cotrfunc)
PowerShell Function
```powershell
function ${2:myFunction} {
param (
${3:parameters}
)
${4:# Your code here}
}
```
## [cotrInterpolate](/snippets/cotrinterpolate)
PowerShell Interpolate String
```powershell
"Your string here $${1:variable}"
```
## [cotrVarMap](/snippets/cotrvarmap)
PowerShell Create Hash Table Variable
```powershell
$${1:myHashTable} = @{
${2:key1} = ${3:value1}
${4:key2} = ${5:value2}
# Add more key-value pairs here
}
```
## [cotrFuncAnon](/snippets/cotrfuncanon)
PowerShell Anonymous Function
```powershell
{
param(${1:parameters})
${2:# Your code here}
}
```
## [cotrTypesBool](/snippets/cotrtypesbool)
PowerShell Boolean Type
```powershell
[bool]
```
## [cotrTypesBoolFalse](/snippets/cotrtypesboolfalse)
PowerShell Boolean False
```powershell
$false
```
## [cotrTypesDynamic](/snippets/cotrtypesdynamic)
PowerShell Dynamic Type
```powershell
# PowerShell is a dynamically typed language.
```
## [cotrTypesInt](/snippets/cotrtypesint)
PowerShell Integer Type
```powershell
[int]
```
## [cotrVarNum](/snippets/cotrvarnum)
PowerShell Create Double Variable
```powershell
$${1:myDouble} = ${2:0.0}
```
## [cotrIfElse](/snippets/cotrifelse)
PowerShell If Else Statement
```powershell
if (${1:condition}) {
# Your code here
} else {
# Your code here
}
```
## [cotrVarStatic](/snippets/cotrvarstatic)
PowerShell Static Variable
```powershell
# PowerShell does not have static variables in the same way as some other languages.
# You can use class variables or module variables to achieve similar functionality.
```
## [cotrTypesList](/snippets/cotrtypeslist)
PowerShell List Type
```powershell
[array]
```
## [cotrTypesNull](/snippets/cotrtypesnull)
PowerShell Null Type
```powershell
$null
```
## [cotrVarTyped](/snippets/cotrvartyped)
PowerShell Create Typed Variable
```powershell
[${1:Type}] $${2:myVar} = $3
```
## [cotrFuncArgs](/snippets/cotrfuncargs)
PowerShell Function Arguments
```powershell
# In PowerShell, functions can have arguments with default values.
function ${2:myFunction} {
param (
[${3:Type}] $${4:arg1},
[${5:Type}] $${6:arg2} = ${7:defaultValue}
)
${8:# Your code here}
}
```
## [cotrTypeCheck](/snippets/cotrtypecheck)
PowerShell Type Check
```powershell
${1:variable}.GetType()
```
## [cotrVarString](/snippets/cotrvarstring)
PowerShell Create String Variable
```powershell
$${1:myString} = "${2:Your string here}"
```
## [cotrVarInt](/snippets/cotrvarint)
PowerShell Create Integer Variable
```powershell
$${1:myInt} = ${2:0}
```
## [cotrSwitch](/snippets/cotrswitch)
PowerShell Switch Statement
```powershell
switch (${1:variable}) {
${2:value1} {
# Your code here
break
}
${3:value2} {
# Your code here
break
}
default {
# Your code here
}
}
```
## [cotrGenMap](/snippets/cotrgenmap)
PowerShell Generate Map
```powershell
# PowerShell does not have a built-in way to generate a map with a specific number of key-value pairs.
# You can use a loop or a custom function to achieve this.
```
## [cotrTypeConvert](/snippets/cotrtypeconvert)
PowerShell Type Conversion
```powershell
# PowerShell Type Conversion:
# Explicit conversions:
# - [Type]variable // Type casting (can throw an error if conversion fails)
# - variable.ToString() // Converts to string
# - [int]variable // Converts to integer
# - [double]variable // Converts to double
# - ... (Various conversion methods and type accelerators)
# Note:
# - Be cautious with type casting, as it can lead to errors if the conversion is not valid.
```
## [cotrTypesMap](/snippets/cotrtypesmap)
PowerShell Map Type
```powershell
[hashtable]
```
## [cotrEntry](/snippets/cotrentry)
PowerShell Entry Point
```powershell
# PowerShell Entry Point
# To run this script, use: `powershell filename.ps1`
Write-Host 'Hello, World!'
```
## [cotrComment](/snippets/cotrcomment)
PowerShell Comment
```powershell
# ${1:Your comment here}
```
## [cotrGenList](/snippets/cotrgenlist)
PowerShell Generate List
```powershell
1..${1:length} | ForEach-Object { ${2:'item'} + $_ }
```
## [cotrPrint](/snippets/cotrprint)
PowerShell Print
```powershell
Write-Host ${1:'Your message here'}
```
## [cotrCommentMulti](/snippets/cotrcommentmulti)
PowerShell Multi-Line Comment
```powershell
<#
${1:Your comment here}
#>
```
## [cotrTryCatch](/snippets/cotrtrycatch)
PowerShell Try Catch
```powershell
try {
# Your code here
} catch {
# Your code here
}
```
|
combined_dataset/train/non-malicious/Add-ObjectCollector.ps1
|
Add-ObjectCollector.ps1
|
##############################################################################\n##\n## Add-ObjectCollector\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nAdds a new Out-Default command wrapper to store up to 500 elements from\nthe previous command. This wrapper stores output in the $ll variable.\n\n.EXAMPLE\n\nPS >Get-Command $pshome\\powershell.exe\n\nCommandType Name Definition\n----------- ---- ----------\nApplication powershell.exe C:\\Windows\\System32\\Windo...\n\nPS >$ll.Definition\nC:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\n\n.NOTES\n\nThis command builds on New-CommandWrapper, also included in the Windows\nPowerShell Cookbook.\n\n#>\n\nSet-StrictMode -Version Latest\n\nNew-CommandWrapper Out-Default `\n -Begin {\n $cachedOutput = New-Object System.Collections.ArrayList\n } `\n -Process {\n ## If we get an input object, add it to our list of objects\n if($_ -ne $null) { $null = $cachedOutput.Add($_) }\n while($cachedOutput.Count -gt 500) { $cachedOutput.RemoveAt(0) }\n } `\n -End {\n ## Be sure we got objects that were not just errors (\n ## so that we don't wipe out the saved output when we get errors\n ## trying to work with it.)\n ## Also don't caputre formatting information, as those objects\n ## can't be worked with.\n $uniqueOutput = $cachedOutput | Foreach-Object {\n $_.GetType().FullName } | Select -Unique\n $containsInterestingTypes = ($uniqueOutput -notcontains `\n "System.Management.Automation.ErrorRecord") -and\n ($uniqueOutput -notlike `\n "Microsoft.PowerShell.Commands.Internal.Format.*")\n\n ## If we actually had output, and it was interesting information,\n ## save the output into the $ll variable\n if(($cachedOutput.Count -gt 0) -and $containsInterestingTypes)\n {\n $GLOBAL:ll = $cachedOutput | % { $_ }\n }\n }
|
combined_dataset/train/non-malicious/sample_43_77.ps1
|
sample_43_77.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vault'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vault.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vault Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList',
'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList',
'Invoke-OCIVaultRotateSecret',
'Invoke-OCIVaultScheduleSecretDeletion',
'Invoke-OCIVaultScheduleSecretVersionDeletion',
'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret',
'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretRotation',
'Stop-OCIVaultSecretVersionDeletion', 'Update-OCIVaultSecret'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_35_31.ps1
|
sample_35_31.ps1
|
# <copyright>
# INTEL CONFIDENTIAL
#
# Copyright 2022 Intel Corporation
#
# This software and the related documents are Intel copyrighted materials, and your use of
# them is governed by the express license under which they were provided to you ("License").
# Unless the License provides otherwise, you may not use, modify, copy, publish, distribute,
# disclose or transmit this software or the related documents without Intel's prior written
# permission.
#
# This software and the related documents are provided as is, with no express or implied
# warranties, other than those that are expressly stated in the License.
#
# <copyright>
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")]
[Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "", Scope="function")] Param()
#.ExternalHelp IntelEthernetCmdlets.dll-Help.xml
function Set-IntelEthernetSetting
{
[CmdletBinding()]
Param(
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$Name = '',
[parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)]
[ValidateNotNullOrEmpty()]
[object[]]
$Adapter = $null,
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$DisplayName = '',
[parameter(Mandatory = $false)]
[ValidateNotNullOrEmpty()]
[object]
$DisplayValue = $null,
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$RegistryKeyword = '',
[parameter(Mandatory = $false)]
[ValidateNotNullOrEmpty()]
[object]
$RegistryValue = $null,
[parameter(Mandatory = $false)]
[ValidateNotNullOrEmpty()]
[object[]]
$Setting = $null,
[parameter(Mandatory = $false)]
[switch]
$Reset
)
Begin
{
$AdapterName = $Name
$script:ErrorMessagesSet = @()
$script:WarningMessagesSet = @()
$FinalObject = @()
GetIntelEthernetDevices @('icei*', 'i40ei*')
if ($script:SupportedAdapters)
{
$script:MSNetAdapters = Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue
}
$script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue)
}
Process
{
$Adapters = $Adapter
if (IsSettingObject $Adapters)
{
$Setting = $Adapters
$Adapters = $null
}
do
{
if (!(ValidateParams $DisplayName $DisplayValue $RegistryKeyword $RegistryValue $Setting $AdapterName $Adapters))
{
break
}
if ($null -ne $Setting)
{
$PreProcessedAdapterNames = ValidateSetAdapterNameParams $Setting.Name $null ([ref]$script:ErrorMessagesSet)
$AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesSet) | Get-Unique)
}
else
{
$PreProcessedAdapterNames = ValidateSetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesSet)
$AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesSet))
}
try
{
$PreErrorActionPreference = $global:ErrorActionPreference
$global:ErrorActionPreference = 'SilentlyContinue'
foreach ($a in $AdapterNamesArray)
{
$TmpStatusMsg = CheckDeviceError $a
if (-not [string]::IsNullOrEmpty($TmpStatusMsg))
{
$script:ErrorMessagesSet += $TmpStatusMsg
}
$script:isProfileSetting = $false
$AdapterSettings = @()
if ($null -ne $Setting)
{
$AdapterSettings = GetSetSettings $null $Setting.RegistryKeyword $a
}
else
{
$AdapterSettings = GetSetSettings $DisplayName $RegistryKeyword $a
}
if ($AdapterSettings.RegistryKeyword -Contains 'NetworkAddress' -and -not $Reset)
{
if ($false -eq (ValidateLAASetting $DisplayValue $RegistryValue))
{
break
}
}
if ($script:isProfileSetting)
{
$FinalObject += SetProfileSettings $a $DisplayValue $RegistryValue
}
foreach ($adapterSetting in $AdapterSettings)
{
if ($null -ne $DisplayValue)
{
Set-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName -DisplayValue $DisplayValue
$FinalObject += ValidateSetting $adapterSetting $DisplayValue $null $a
}
elseif ($null -ne $RegistryValue)
{
Set-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName -RegistryValue $RegistryValue
$FinalObject += ValidateSetting $adapterSetting $null $RegistryValue $a
}
elseif ($Reset)
{
Reset-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName
$FinalObject += ValidateSetting $adapterSetting $adapterSetting.DefaultDisplayValue $null $a
}
}
}
}
finally
{
$global:ErrorActionPreference = $PreErrorActionPreference
}
} while ($false)
}
End
{
$FinalObject
foreach ($WarningMessage in $script:WarningMessagesSet)
{
Write-Warning $WarningMessage
}
foreach ($ErrorMessage in $script:ErrorMessagesSet)
{
Write-Error $ErrorMessage
}
}
}
function ValidateParams($DisplayName, $DisplayValue, $RegistryKeyword, $RegistryValue, $Setting, $AdapterName, $Adapters)
{
$bContinue = $true
do
{
# if DisplayName, RegistryKeyword, & Setting are not used, or both DisplayName & RegistryKeyword are used - stop execution
if (([string]::IsNullOrEmpty($DisplayName) -and [string]::IsNullOrEmpty($RegistryKeyword) -and $null -eq $Setting) -or
(-not [string]::IsNullOrEmpty($DisplayName) -and -not [string]::IsNullOrEmpty($RegistryKeyword)))
{
$bContinue = $false
break
}
# if both DisplayValue & RegistryValue are not used & Reset isn't used, or both DisplayValue & RegistryValue are used - stop exection
if (([string]::IsNullOrEmpty($DisplayValue) -and [string]::IsNullOrEmpty($RegistryValue) -and -not $Reset) -or
(-not [string]::IsNullOrEmpty($DisplayValue) -and -not [string]::IsNullOrEmpty($RegistryValue)))
{
$bContinue = $false
break
}
# if either DisplayValue & RegistryValue are used and $Reset is used - stop execution
if (-not [string]::IsNullOrEmpty($DisplayValue) -or -not [string]::IsNullOrEmpty($RegistryValue) -and $Reset)
{
$bContinue = $false
break
}
# if Setting is used and either DisplayName, RegistryKeyword are used - stop execution
if ($null -ne $Setting -and (-not [string]::IsNullOrEmpty($DisplayName) -or -not [string]::IsNullOrEmpty($RegistryKeyword)))
{
$bContinue = $false
break
}
# if Setting is used and either $AdapterName or $Adapters is used - stop execution
if ($null -ne $Setting -and (-not [string]::IsNullOrEmpty($AdapterName) -or $Adapters))
{
$bContinue = $false
break
}
} while ($false)
if ($false -eq $bContinue)
{
$script:ErrorMessagesSet += $Messages.InvalidParams
}
return $bContinue
}
function GetSetSettings($DisplayName, $RegistryKeyword, $AdapterName)
{
$SettingArray = @()
if (-not [string]::IsNullOrEmpty($DisplayName))
{
foreach ($TmpDisplayName in $DisplayName)
{
if ($TmpDisplayName -eq 'Profile')
{
$script:isProfileSetting = $true
}
else
{
$TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.DisplayName -like $TmpDisplayName})
if (-not $TmpSetting)
{
$script:ErrorMessagesSet += $Messages.InvalidSetting -f $AdapterName, $TmpDisplayName
}
else
{
$SettingArray += $TmpSetting
}
}
}
}
if (-not [string]::IsNullOrEmpty($RegistryKeyword))
{
foreach ($TmpRegistryKeyword in $RegistryKeyword)
{
if ($TmpRegistryKeyword -eq 'PerformanceProfile')
{
$script:isProfileSetting = $true
}
else
{
$TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -like $TmpRegistryKeyword})
if (-not $TmpSetting)
{
$script:ErrorMessagesSet += $Messages.InvalidSetting -f $AdapterName, $TmpRegistryKeyword
}
else
{
$SettingArray += $TmpSetting
}
}
}
}
return $SettingArray
}
function ValidateSetting($Setting, $DisplayValue = $null, $RegistryValue = $null, $AdapterName)
{
$IntelEthernetSetting = Get-IntelEthernetSetting -Name $a -DisplayName $Setting.DisplayName -WarningAction:SilentlyContinue
# setting type 'int'
if ($null -ne $IntelEthernetSetting.PSTypeNames -and $IntelEthernetSetting.PSTypeNames[0] -eq "IntelEthernetSettingInt")
{
if ($null -ne $DisplayValue)
{
$SettingIntValue = $DisplayValue
}
else
{
$SettingIntValue = $RegistryValue
}
$bValidIntValue = $false
# check if numeric value
if ($SettingIntValue -match "^[\d]+$")
{
if ([int]$SettingIntValue -ge $IntelEthernetSetting.Min -and [int]$SettingIntValue -le $IntelEthernetSetting.Max)
{
if (($SettingIntValue % $IntelEthernetSetting.Step) -eq 0)
{
$bValidIntValue = $true
}
}
}
if (-not $bValidIntValue)
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $SettingIntValue, $Setting.RegistryKeyword
}
elseif ($SettingIntValue -ne $IntelEthernetSetting.DisplayValue)
{
$script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.RegistryKeyword
}
else
{
return $IntelEthernetSetting
}
}
else
{
$bValidEnumValue = $false
if ($null -ne $DisplayValue)
{
if ($IntelEthernetSetting.DescriptionMap -notcontains $DisplayValue -and $IntelEthernetSetting.RegistryKeyword -ne "NetworkAddress")
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $DisplayValue, $Setting.RegistryKeyword
}
elseif ($DisplayValue.ToString() -ne $IntelEthernetSetting.DisplayValue)
{
$script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.DisplayName
}
else
{
$bValidEnumValue = $true
}
}
elseif ($null -ne $RegistryValue)
{
if ($IntelEthernetSetting.PossibleValues -notcontains $RegistryValue -and $IntelEthernetSetting.RegistryKeyword -ne "NetworkAddress")
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $RegistryValue, $Setting.RegistryKeyword
}
elseif (($RegistryValue.ToString() -ne $IntelEthernetSetting.RegistryValue))
{
$script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.DisplayName
}
else
{
$bValidEnumValue = $true
}
}
if ($bValidEnumValue)
{
return $IntelEthernetSetting
}
}
}
function ValidateLAASetting($DisplayValue, $RegistryValue)
{
$Valid = $False
do
{
if (-not [string]::IsNullOrEmpty($DisplayValue))
{
$Value = $DisplayValue
}
else
{
$Value = $RegistryValue
}
# first check if the string has correct length
if ($Value.Length -eq $NETWORK_ADDRESS_LEN)
{
# filter out all non-hexadecimal numbers
try
{
$ValueInt = [Convert]::ToUInt64($Value, 16)
}
catch
{
break
}
# check for reserved and multicast addresses
if ($ValueInt -band 0x010000000000 -or $ValueInt -eq 0 -or $ValueInt -eq 0xFFFFFFFFFFFF)
{
break
}
$Valid = $True
}
} while($false)
if ($false -eq $Valid)
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValueGeneric
}
return $Valid
}
function IsSettingObject($PipedObject)
{
$bSettingObject = $false
if ($null -ne $PipedObject -and $null -ne $PipedObject[0].PSTypeNames -and
($PipedObject[0].PSTypeNames[0]).Contains("IntelEthernetSetting"))
{
$bSettingObject = $true
}
return $bSettingObject
}
function SetProfileSettings($AdapterName, $DisplayValue, $RegistryValue)
{
$ProfileSetting = InitializeProfileSetting $AdapterName
if ($null -ne $DisplayValue)
{
if ($ProfileSetting.DescriptionMap -notcontains $DisplayValue)
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $DisplayValue, $ProfileSetting.RegistryKeyword
}
else
{
$ProfileRegValue = $PROFILE_VALUE_TO_NAME.GetEnumerator().Where({ $_.Value -eq $DisplayValue}).Name
}
}
elseif ($null -ne $RegistryValue)
{
if ($ProfileSetting.PossibleValues -notcontains $RegistryValue)
{
$script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $RegistryValue, $ProfileSetting.RegistryKeyword
}
else
{
$ProfileRegValue = $RegistryValue
}
}
elseif ($Reset)
{
$ProfileRegValue = $ProfileSetting.DefaultValue
}
if ($null -ne $ProfileRegValue)
{
SetAdapterPropertyInRegistry $AdapterName 'PerformanceProfile' $ProfileRegValue
$DriverFamily = $script:SupportedAdapters.Where({ $_.Name -eq $AdapterName }).Service
$ProfileCmdletValName = $PROFILE_VALUE_TO_NAME[$ProfileRegValue.ToString()]
$tmp = GetProfileSettingsFromXml $ProfileCmdletValName $DriverFamily
$tmp.GetEnumerator().ForEach(
{
Set-NetAdapterAdvancedProperty -InterfaceDescription $AdapterName -RegistryKeyword $_.Key -RegistryValue $_.Value
})
$script:MSNetAdvProperty = Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue
return InitializeProfileSetting $AdapterName
}
}
# SIG # Begin signature block
# MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCLN5FwYb/sNfWG
# 5Obua/HWn5GcYyrg0JLLeysq+NyofKCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU
# jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM
# EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy
# dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG
# EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv
# IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s
# hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD
# J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7
# P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme
# me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz
# T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q
# RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz
# mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc
# QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T
# OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/
# AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID
# AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD
# VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV
# HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE
# VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v
# ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE
# KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI
# hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF
# OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC
# J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ
# pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl
# d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH
# +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio
# kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD
# VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv
# ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5
# NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs
# BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi
# MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw
# hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl
# wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo
# PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND
# brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62
# 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME
# Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx
# G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6
# zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud
# IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE
# osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT
# BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw
# SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv
# UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI
# KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv
# ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl
# Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS
# /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3
# ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT
# s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp
# GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr
# OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb
# MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN
# r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt
# CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF
# 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG
# 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim
# VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ
# KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt
# aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW
# IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF
# EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT
# CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv
# cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN
# AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8
# FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR
# MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA
# tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9
# HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB
# wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b
# H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD
# jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr
# hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS
# QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj
# MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF
# BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0
# dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG
# Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n
# Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v
# Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu
# Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE
# JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG
# 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh
# NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa
# UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw
# FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP
# Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M
# c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ
# YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV
# k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB
# XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE
# ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl
# IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC
# AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEINiKB+8wp2n1Rs0gY2wRzNPt
# tiMQzH/P+J7mPNFw/vOhMA0GCSqGSIb3DQEBAQUABIIBgD1qErMehAXGSBBhXHmB
# YIz2PrMmt9rAsvAXLR3/5q2jDyqBMolpI1YyOCH0wki3Y7WliPHz/GzlsRo4vOmS
# K+zv3yff2GAmNaUZwNZSOtG0p22ac4L+yreh3874AIpTupfDLr3pzD6gh+3ECx7Y
# iW5ZO4+wjgXDPUf5bW90FJg4i60VU/Z1qCJlGN/g3NTRKcGfuUYbZi923v8zq9iS
# UXNO9KAnICjPlpqWsbyTLyvbrsO6vm6PG0Co58c3D7S0W+I4v0H2zgKzKDJ/OvMK
# szvkkvFC6CctnlO0ftATZG6gSQfOtOh9HheFNtWG53N9T9lP+ijNcmBsoFIOLqk9
# rqaMdhruPP1yTJwhxTUEv6qJX2DCTJxzwBud8p2MQCxk1oYzVFMN00wCVZbZRnyR
# uZWDb33UGaFSAPZVV3QyxOx6DWuk9U7jIbWQ0gjVveeTTC1nmCSIVggV8jYGd2+I
# bkEJ3OYklkfv4/v5nB9xQVrM04NF+35It+9fMz3DB32XoaGCE08wghNLBgorBgEE
# AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD
# BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw
# DQYJYIZIAWUDBAIBBQAEIJ11Mo1LX5NzhCshrkMchH/J5X9lkObcPmQ8GK4Gv3+O
# AhUAgT+x5PqWp+vSV3Ri5wT2AaynSrMYDzIwMjQwMzE4MTgyNDA1WqBupGwwajEL
# MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp
# Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT
# aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq
# hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j
# aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0
# ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw
# NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE
# CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD
# DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk
# is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB
# IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc
# rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN
# 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7
# HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl
# TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY
# B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re
# DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE
# qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT
# cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP
# 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf
# BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD
# AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g
# BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0
# aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j
# cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr
# BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v
# U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov
# L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD
# Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf
# +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66
# kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s
# IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1
# RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T
# jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01
# 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA
# bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP
# jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV
# Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8
# KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2
# p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l
# dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF
# UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh
# dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9
# MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD
# VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT
# HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE
# pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0
# RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray
# cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv
# f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi
# nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1
# r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F
# GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs
# dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm
# /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA
# V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID
# AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD
# VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV
# HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw
# BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j
# b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB
# BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v
# VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v
# Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB
# kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk
# VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w
# QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb
# sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB
# c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah
# c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M
# 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0
# PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x
# uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx
# py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu
# tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC
# R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y
# ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT
# QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC
# AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF
# MQ8XDTI0MDMxODE4MjQwNVowPwYJKoZIhvcNAQkEMTIEMPp728MiFIMIov1uREdq
# Vr7lCLZEmPxjsnPMaJyqTpwJTAnXXK66NfLNag6o9h+kNTCB7QYLKoZIhvcNAQkQ
# Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB
# VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV
# U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp
# Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF
# AASCAgCKoZmAI/TyR5Z54SeozGxPczqwiJ4SSN01Y/cgjaxeUrC22iHgv2Tk2vGU
# 7FeeXrJupqrnErRiQfA43J3rS24xSIgLsSw8JctyiRFkKUDuC0E1N3+SUOA8eu0J
# IiFaz1BniqaTLZTigNZbb5suJ/GnviWIMLt45M7xbeqeKkjI7bBGO1NHcUcM69g1
# cNyMl9w+2+SjbAtLUm7WFArjwsItXkZTSkoCfM5iWxi3u2ZOF/g2lkDV5gkwfn6d
# SBVKHhMcEx/hbU+ahk4x39VmatfxxTYGrtwL0UPzW0sr6JuidJSGyIkPNWlr7BWO
# oNLgJr6XT6lgTBSnETJBPXzBuIR4SRiPpuKWqupFFQ9xvVZgnJ0hlqgkudzZzTx0
# MscdIXAQugggOXR6mMKv1fQEFD36Jv1pWt6Xxea4xIsTUwTIjvkctluXyTCtKa21
# fQWsj/vK6md+rExpGL2Pj3xlMDx9tyO92I+851ncDgAKdj91C9sCf7zi7G1Xm/Ad
# erthSv2CszcI6HQBJkiwLJXVFe2pATABykQVoif4R8eoIr0RaIieJQKVQ3KKqXs2
# BxNHeOFWbV/C+fvZ4T2UGPdzXCmP7RMXe2XOHAtZ/KNL65jWruZFWeQE6o8vHL5g
# zonGZNG+UeXeL1kh4B8LJU13i31Ga02VCacH481ZsPGOUvvyow==
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-Choice.ps1
|
New-Choice.ps1
|
function New-Choice {
<#
.SYNOPSIS
The New-Choice function is used to provide extended control to a script author who writing code
that will prompt a user for information.
.PARAMETER Choices
An Array of Choices, ie Yes, No and Maybe
.PARAMETER Caption
Caption to present to end user
.EXAMPLE
PS C:\\> New-Choice -Choices 'Yes','No' -Caption "PowerShell makes choices easy"
.NOTES
Author: Andy Schneider
Date: 5/6/2011
#>
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$True, ValueFromPipeline=$True)]
$Choices,
[Parameter(Position=1)]
$Caption,
[Parameter(Position=2)]
$Message
)
process {
$resulthash += @{}
for ($i = 0; $i -lt $choices.count; $i++)
{
$ChoiceDescriptions += @(New-Object System.Management.Automation.Host.ChoiceDescription $choices[$i])
$resulthash.$i = $choices[$i]
}
$AllChoices = [System.Management.Automation.Host.ChoiceDescription[]]($ChoiceDescriptions)
$result = $Host.UI.PromptForChoice($Caption,$Message, $AllChoices, 1)
$resulthash.$result
}
}
|
combined_dataset/train/non-malicious/2923.ps1
|
2923.ps1
|
task default -depends Test
task Test -depends Compile, Clean {
Assert $false "This fails."
}
task Compile -depends Clean {
"Compile"
}
task Clean {
"Clean"
}
taskTearDown {
param($task)
Assert ($task.Name -eq $psake.context.Peek().currentTaskName) 'TaskName should match'
if ($task.Success) {
"'$($task.Name)' Tear Down: task passed!"
} else {
"'$($task.Name)' Tear Down: task failed with '$($task.ErrorMessage)'"
"-------------------"
"- ErrorMessage: '$($task.ErrorMessage)'"
"- ErrorDetail: $($task.ErrorDetail)"
"- ErrorFormatted: $($task.ErrorFormatted)"
"-------------------"
}
}
|
combined_dataset/train/non-malicious/2984.ps1
|
2984.ps1
|
Set-StrictMode -Version Latest
$os = InModuleScope -ModuleName Pester { GetPesterOs }
if ("Windows" -ne $os) {
return
}
Describe "General" {
It "creates a drive location called TestRegistry:" {
"TestRegistry:\" | Should -Exist
}
It "is located in Pester key in HKCU" {
$testRegistryPath = (Get-PSDrive TestRegistry).Root
$testRegistryPath | Should -BeLike "HKEY_CURRENT_USER\Software\Pester*"
}
}
$script:drivePath = $null
Describe "TestRegistry scoping" {
$script:drivePath = (Get-PSDrive "TestRegistry").Root -replace "HKEY_CURRENT_USER", "HKCU:"
$describeKey = New-Item -Path "TestRegistry:\" -Name "DescribeKey"
$describeValue = New-ItemProperty -Path "TestRegistry:\DescribeKey" -Name "DescribeValue" -Value 1
$script:contextKey = $null
$script:contextValue = $null
Context "Describe file is available in context" {
$script:contextKey = New-Item -Path "TestRegistry:\" -Name "ContextKey"
$script:contextValue = New-ItemProperty -Path "TestRegistry:\ContextKey" -Name "ContextValue" -Value 2
It "Finds the everything that was setup so far" {
$itKey = New-Item -Path "TestRegistry:\ContextKey" -Name "ItKey"
$itValue = New-ItemProperty -Path "TestRegistry:\ContextKey\ItKey" -Name "ItValue" -Value 3
$describeKey.PSPath | Should -Exist
$describeValue.PSPath | Should -Exist
$contextKey.PSPath | Should -Exist
$contextValue.PSPath | Should -Exist
$itKey.PSPath | Should -Exist
$itValue.PSPath | Should -Exist
}
}
It "Context key and value removed when returning to Describe" {
$script:contextKey.PSPath | Should -Not -Exist
$script:contextValue.PSPath | Should -Not -Exist
}
It "Describe key and value are still available in Describe" {
$describeKey.PSPath | Should -Exist
$describeValue.PSPath | Should -Exist
}
}
$registryKeyVariableHasValue = $null -ne $script:drivePath
$registryKeyWasRemoved = $registryKeyVariableHasValue -and -not (Test-Path $script:drivePath)
$testRegistryDriveWasRemoved = -not (Test-Path "TestRegistry:\")
Describe "cleanup" {
It "Removed the key used in the previous Describe" {
$registryKeyWasRemoved | Should -BeTrue
}
It "Removed the drive" {
$testRegistryDriveWasRemoved | Should -BeTrue
}
}
|
combined_dataset/train/non-malicious/767.ps1
|
767.ps1
|
function Invoke-MyCommand {
Write-Output "My command's function was executed!"
}
Register-EditorCommand -Verbose `
-Name "MyModule.MyCommandWithFunction" `
-DisplayName "My command with function" `
-Function Invoke-MyCommand
Register-EditorCommand -Verbose `
-Name "MyModule.MyCommandWithScriptBlock" `
-DisplayName "My command with script block" `
-ScriptBlock { Write-Output "My command's script block was executed!" }
function Invoke-MyEdit([Microsoft.PowerShell.EditorServices.Extensions.EditorContext]$context) {
$context.CurrentFile.InsertText(
"`r`n
35, 1);
}
Register-EditorCommand -Verbose `
-Name "MyModule.MyEditCommand" `
-DisplayName "Apply my edit!" `
-Function Invoke-MyEdit `
-SuppressOutput
|
combined_dataset/train/non-malicious/sample_6_67.ps1
|
sample_6_67.ps1
|
#************************************************
# TS_PowerCFG.ps1
# Version 3.0
# Date: 14/03/2013
# Author: v-kaw
# Description: Running powercfg.exe to obtain power settings information
# Note: This is the third edition of this file. Ideal ID for this edition is 6292.
# Ideal ID for second edition is 4735. The original ideal id is 1103
#************************************************
#Rule ID 4735,6292
#-----------
# http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4735
# http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6292
#Description
#-----------
# Running powercfg.exe to obtain power settings information
#Related KB
#----------
# https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=KB;EN-US;980869
#Script Author
#-------------
# kate wang(v-kaw)
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_PowerCFG -Status $ScriptStrings.ID_PowerCFGDesc
#********************
#Data gathering
#********************
$fileDescription = "PowerCFG Output"
$sectionDescription = "Power Settings"
function Header($Command, $file)
{
"-" * ($Command.Length + 35) + "`r`n $Command`r`n" + "-" * ($Command.Length + 35) | Out-File -FilePath $file -Append
"`n" | Out-File -FilePath $OutputFile -append
}
if ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -ge 2)) -or ($OSVersion.Major -eq 10)) #Win 8, Win10
{
if($null -ne (Get-CimInstance -Class Win32_Battery )) #if system has a battery
{
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_BatteryReport.htm"
$CommandToExecute = "powercfg -batteryreport -duration 28 -output $OutputFile"
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG Battery Report"
}
#
# PowerCFG /sleepstudy cannot be run if ConnectedStandby -ne 1.
# Creating an output file called _PowerCFG_SleepstudyReport.TXT with contents indicating that Powercfg /sleepstudy failed to run, etc.
# Check for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power "CsEnabled" = dword:00000000
#
# Run this first with no checks so that non-ConnectedStandby machines are not affected.
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_SleepstudyReport.htm"
$CommandToExecute = "powercfg -sleepstudy -duration 28 -output $OutputFile"
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG SleepStudy Report"
# Now checking for the ConnectedStandby machines
$regkeyPower = "HKLM:\SYSTEM\CurrentControlSet\Control\Power"
If (test-path $regkeyPower)
{
"[info] Power regkey exists" | WriteTo-StdOut
$regvaluePowerCsEnabled = Get-ItemProperty -path $regkeyPower -name "CsEnabled" -ErrorAction SilentlyContinue
if ($null -ne $regvaluePowerCsEnabled)
{
$regvaluePowerCsEnabled = $regvaluePowerCsEnabled.CsEnabled
"[info] Connected Standby registry value exists: $regvaluePowerCsEnabled" | WriteTo-StdOut
if ($regvaluePowerCsEnabled -ne 1)
{
$fileDescription = "PowerCFG Output"
$sectionDescription = "Power Settings"
$outputFile = $Computername + "_PowerCFG_SleepStudyReport.TXT"
"====================================================" | Out-File -FilePath $OutputFile -append
"PowerCFG /Sleepstudy" | Out-File -FilePath $OutputFile -append
"====================================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
"Connected Standby has been DISABLED." | Out-File -FilePath $outputFile -Append
"The PowerCFG_Sleepstudyreport.htm cannot be generated." | Out-File -FilePath $outputFile -Append
"PowerCFG /sleepstudy outputs the following message when Connected Standby is disabled:" | Out-File -FilePath $outputFile -Append
" `"Connected Standby is not supported on this machine. Cannot run tool.`"" | Out-File -FilePath $outputFile -Append
"`n`n`n" | Out-File -FilePath $OutputFile -append
CollectFiles -filesToCollect $outputFile -fileDescription "$fileDescription" -SectionDescription $sectionDescription
}
}
}
}
if( (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win 7/ R2
(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -ge 2)) ) #Win 8/8.1
{
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_Energy_Report.htm"
$CommandToExecute = "powercfg -energy -duration 5 -output $OutputFile"
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG Energy Report" -BackgroundExecution
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt"
$CommandToExecute = "powercfg -list"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -qh"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -requests"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -lastwake"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -availablesleepstates"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
}
elseif(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) #Server 2008 / Vista
{
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt"
$CommandToExecute = "powercfg -list"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -query"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -devicequery all_devices_verbose"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
}
elseif((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 1)) -or
(($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2))) #XP/#Server 2003
{
$OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt"
$CommandToExecute = "powercfg -list"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false
$CommandToExecute = "powercfg -query"
header -Command $CommandToExecute -file $OutputFile
RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoGXjsiFzEBH5m
# fbxQAo3QVB+SULWpQ3SNrxvVyKdPuqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPoL
# EqFQBwqW32AKEvrFKWk1/bD56lW0dd+yy5scr6nCMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAkxhl02f8WYmZLNxNCxs0gU1vtKz7695ZTr7O
# bhICBsFKtMf2lwwRapsyCxIxVV1QX6zAKPhbJadZMb8oiI5ZxuwG4kh6EgNB2XUj
# VEsXZHEU+isMpodd+uZD/O0AV34hCxrKnX5AME2fKrn2NZUH+x4XD0nzH2flai7Y
# V9HhQKPaOudv5E35z6E3GN6CRUGrkpxAr6lz5n0//Ty+xofMbzEdZzeUpzh/PCKe
# dIRXz8Z+vZiwMzw6/lJemVvtakxavV4WCpx4FDw26RfsGvu0PcP52urFdszuPhvZ
# gsf5/hMujdg+x7m4rCaZ5+hP2IxpDVp671LD45Ep/fh0bf2gtKGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDWRANZsAYsW/xnqnkzx/9+jNL/Lzru2xg4
# G40Tqtu/LQIGZutLSANnGBMyMDI0MTAyODExNDAzOS4yNTlaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4
# fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d
# U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh
# hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn
# ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM
# KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L
# 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr
# 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf
# RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi
# aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA
# 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49
# tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA
# p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf
# OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG
# Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3
# kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU
# 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T
# y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd
# gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt
# uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3
# XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS
# Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl
# cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0
# MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA
# AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH
# yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq
# WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW
# cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a
# Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4
# swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgv+zd0wgr9BPM5e2LcWepOc40C0H4H13F83/EknofpTEwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj
# SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk
# D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAJnM9DeFzY6IqKIxmmdZUVc00a+0dzHj
# ljlDVk7n5BYA304KgztVzKL+ZMVAWj3dpvM4FpMSr7329fCoXjV7wlvQiXL3ex6x
# mbxgaHNtO0sfmu8zzKE7Xod/DpdEzsqhgOR8m16RaTSmvm5NnkPF3qMVxEAVPXTF
# vbcxY4mhpVDZxVzr1ydK2c5ppl8sWWoRGPMHKJXlEdAScXx8wuU+19NGMlVPfw+y
# /INqtHA+suE9FXbFP3/fosvbzmwpIE3R0MdC+W3V5ZW2rPB7WDc8ZDzyzHeYmEIO
# 08iwz0nVu4Lz1yh5vMsn5uons4H73kPJSXgCO7UbOGrpaly5FIua2vsHuQqXiyEK
# 8x/VzdGhO+7U+yec14ShTf0/4w2Um3sgFW6QS34WAs5WLYXzpGJnLMZJRDxIBb1b
# qJstN7RbQ+UVq/HWfJRBuWE9URHur9np9M6kzQma//CjMKuv0rGU+iOO+4zMSvNK
# 47cpgmH0+0zwX/XeBXHuSYZ/sU7icUhrvFlDFEkknsZ43wUIMNlrve0WhQmFHgvD
# NzCNJr5s9T0JbTnqLYgUPJHobS0myySDesN+47zYSWkSVSp7wyoO7jw8qVdIz6SL
# Vcg7PcT1owCKZ4JfzCvfeIb/Ut3RjIq6jOp2D3tO8rZOqXuluohCKTqK1JvHEc9S
# IJ4MZ3PXH7CP
# SIG # End signature block
|
combined_dataset/train/non-malicious/422.ps1
|
422.ps1
|
Register-PSFTeppScriptblock -Name 'PSFramework-config-validation' -ScriptBlock { [PSFramework.Configuration.ConfigurationHost]::Validation.Keys }
|
combined_dataset/train/non-malicious/3096.ps1
|
3096.ps1
|
function Verify-False {
param (
[Parameter(ValueFromPipeline = $true)]
$Actual
)
if ($Actual) {
throw [Exception]"Expected `$false but got '$Actual'."
}
$Actual
}
|
combined_dataset/train/non-malicious/lazywinadmin.com.ps1
|
lazywinadmin.com.ps1
|
Get-WmiObject Win32_Service -ComputerName . |`
where {($_.startmode -like "*auto*") -and `
($_.state -notlike "*running*")}|`
select DisplayName,Name,StartMode,State|ft -AutoSize
|
combined_dataset/train/non-malicious/2384.ps1
|
2384.ps1
|
function Invoke-SqlDatabaseBackupToFile
{
[CmdletBinding()]
param
(
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Database,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Connection -ComputerName $_ -Quiet -Count 1 })]
[string]$Server,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateSet('Full','Differential')]
[string]$Type = 'Full',
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ -not (Test-Path -Path $_ -PathType Leaf) })]
[string]$FilePath
)
$query = @"
BACKUP DATABASE $Database
TO DISK = '$FilePath'
"@
if ($Type -eq 'Differential')
{
$query += ' WITH DIFFERENTIAL'
}
Write-Verbose -Message "Running query: $($query)"
Invoke-SQLCmd -ServerInstance $Server -Database $Database -Query $query
}
|
combined_dataset/train/non-malicious/Get-StructFromMemory.ps1
|
Get-StructFromMemory.ps1
|
function Get-StructFromMemory
{
<#
.SYNOPSIS
Marshals data from an unmanaged block of memory in an arbitrary process to a newly allocated managed object of the specified type.
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
.DESCRIPTION
Get-StructFromMemory is similar to the Marshal.PtrToStructure method but will parse and return a structure from any process.
.PARAMETER Id
Process ID of the process whose virtual memory space you want to access.
.PARAMETER MemoryAddress
The address containing the structure to be parsed.
.PARAMETER StructType
The type (System.Type) of the desired structure to be parsed.
.EXAMPLE
C:\\PS> Get-Process | ForEach-Object { Get-StructFromMemory -Id $_.Id -MemoryAddress $_.MainModule.BaseAddress -StructType ([PE+_IMAGE_DOS_HEADER]) }
Description
-----------
Parses the DOS headers of every loaded process. Note: In this example, this assumes that [PE+_IMAGE_DOS_HEADER] is defined. You can get the code to define [PE+_IMAGE_DOS_HEADER] here: http://www.exploit-monday.com/2012/07/structs-and-enums-using-reflection.html
.NOTES
Be sure to enclose the StructType parameter with parenthesis in order to force PowerShell to cast it as a Type object.
Get-StructFromMemory does a good job with error handling however it will crash if the structure contains fields that attempt to marshal pointers. For example, if a field has a custom attribute of UnmanagedType.LPStr, when the structure is parsed, it will attempt to dererence a string pointer for virtual memory in another process and access violate.
.LINK
http://www.exploit-monday.com/
#>
[CmdletBinding()] Param (
[Parameter(Position = 0, Mandatory = $True)]
[Alias('ProcessId')]
[Alias('PID')]
[UInt16]
$Id,
[Parameter(Position = 1, Mandatory = $True)]
[IntPtr]
$MemoryAddress,
[Parameter(Position = 2, Mandatory = $True)]
[Alias('Type')]
[Type]
$StructType
)
Set-StrictMode -Version 2
$PROCESS_VM_READ = 0x0010 # The process permissions we'l ask for when getting a handle to the process
# Get a reference to the private GetProcessHandle method is System.Diagnostics.Process
$GetProcessHandle = [Diagnostics.Process].GetMethod('GetProcessHandle', [Reflection.BindingFlags] 'NonPublic, Instance', $null, @([Int]), $null)
try
{
# Make sure user didn't pass in a non-existent PID
$Process = Get-Process -Id $Id -ErrorVariable GetProcessError
# Get the default process handle
$Handle = $Process.Handle
}
catch [Exception]
{
throw $GetProcessError
}
if ($Handle -eq $null)
{
throw "Unable to obtain a handle for PID $Id. You will likely need to run this script elevated."
}
# Get a reference to MEMORY_BASIC_INFORMATION. I don't feel like making the structure myself
$mscorlib = [AppDomain]::CurrentDomain.GetAssemblies() | ? { $_.FullName.Split(',')[0].ToLower() -eq 'mscorlib' }
$Win32Native = $mscorlib.GetTypes() | ? { $_.FullName -eq 'Microsoft.Win32.Win32Native' }
$MEMORY_BASIC_INFORMATION = $Win32Native.GetNestedType('MEMORY_BASIC_INFORMATION', [Reflection.BindingFlags] 'NonPublic')
if ($MEMORY_BASIC_INFORMATION -eq $null)
{
throw 'Unable to get a reference to the MEMORY_BASIC_INFORMATION structure.'
}
# Get references to private fields in MEMORY_BASIC_INFORMATION
$ProtectField = $MEMORY_BASIC_INFORMATION.GetField('Protect', [Reflection.BindingFlags] 'NonPublic, Instance')
$AllocationBaseField = $MEMORY_BASIC_INFORMATION.GetField('BaseAddress', [Reflection.BindingFlags] 'NonPublic, Instance')
$RegionSizeField = $MEMORY_BASIC_INFORMATION.GetField('RegionSize', [Reflection.BindingFlags] 'NonPublic, Instance')
try { $NativeUtils = [NativeUtils] } catch [Management.Automation.RuntimeException] # Only build the assembly if it hasn't already been defined
{
# Build dynamic assembly in order to use P/Invoke for interacting with the following Win32 functions: ReadProcessMemory, VirtualQueryEx
$DynAssembly = New-Object Reflection.AssemblyName('MemHacker')
$AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly($DynAssembly, [Reflection.Emit.AssemblyBuilderAccess]::Run)
$ModuleBuilder = $AssemblyBuilder.DefineDynamicModule('MemHacker', $False)
$Attributes = 'AutoLayout, AnsiClass, Class, Public, SequentialLayout, Sealed, BeforeFieldInit'
$TypeBuilder = $ModuleBuilder.DefineType('NativeUtils', $Attributes, [ValueType])
$TypeBuilder.DefinePInvokeMethod('ReadProcessMemory', 'kernel32.dll', [Reflection.MethodAttributes] 'Public, Static', [Reflection.CallingConventions]::Standard, [Bool], @([IntPtr], [IntPtr], [IntPtr], [UInt32], [UInt32].MakeByRefType()), [Runtime.InteropServices.CallingConvention]::Winapi, 'Auto') | Out-Null
$TypeBuilder.DefinePInvokeMethod('VirtualQueryEx', 'kernel32.dll', [Reflection.MethodAttributes] 'Public, Static', [Reflection.CallingConventions]::Standard, [UInt32], @([IntPtr], [IntPtr], $MEMORY_BASIC_INFORMATION.MakeByRefType(), [UInt32]), [Runtime.InteropServices.CallingConvention]::Winapi, 'Auto') | Out-Null
$NativeUtils = $TypeBuilder.CreateType()
}
# Request a handle to the process in interest
try
{
$SafeHandle = $GetProcessHandle.Invoke($Process, @($PROCESS_VM_READ))
$Handle = $SafeHandle.DangerousGetHandle()
}
catch
{
throw $Error[0]
}
# Create an instance of MEMORY_BASIC_INFORMATION
$MemoryBasicInformation = [Activator]::CreateInstance($MEMORY_BASIC_INFORMATION)
# Confirm you can actually read the address you're interested in
$NativeUtils::VirtualQueryEx($Handle, $MemoryAddress, [Ref] $MemoryBasicInformation, [Runtime.InteropServices.Marshal]::SizeOf($MEMORY_BASIC_INFORMATION)) | Out-Null
$PAGE_EXECUTE_READ = 0x20
$PAGE_EXECUTE_READWRITE = 0x40
$PAGE_READONLY = 2
$PAGE_READWRITE = 4
$Protection = $ProtectField.GetValue($MemoryBasicInformation)
$AllocationBaseOriginal = $AllocationBaseField.GetValue($MemoryBasicInformation)
$GetPointerValue = $AllocationBaseOriginal.GetType().GetMethod('GetPointerValue', [Reflection.BindingFlags] 'NonPublic, Instance')
$AllocationBase = $GetPointerValue.Invoke($AllocationBaseOriginal, $null).ToInt64()
$RegionSize = $RegionSizeField.GetValue($MemoryBasicInformation).ToUInt64()
Write-Verbose "Protection: $Protection"
Write-Verbose "AllocationBase: $AllocationBase"
Write-Verbose "RegionSize: $RegionSize"
if (($Protection -ne $PAGE_READONLY) -and ($Protection -ne $PAGE_READWRITE) -and ($Protection -ne $PAGE_EXECUTE_READ) -and ($Protection -ne $PAGE_EXECUTE_READWRITE))
{
$SafeHandle.Close()
throw 'The address specified does not have read access.'
}
$StructSize = [Runtime.InteropServices.Marshal]::SizeOf($StructType)
$EndOfAllocation = $AllocationBase + $RegionSize
$EndOfStruct = $MemoryAddress.ToInt64() + $StructSize
if ($EndOfStruct -gt $EndOfAllocation)
{
$SafeHandle.Close()
throw 'You are attempting to read beyond what was allocated.'
}
try
{
# Allocate unmanaged memory. This will be used to store the memory read from ReadProcessMemory
$LocalStructPtr = [Runtime.InteropServices.Marshal]::AllocHGlobal($StructSize)
}
catch [OutOfMemoryException]
{
throw Error[0]
}
Write-Verbose "Memory allocated at 0x$($LocalStructPtr.ToString("X$([IntPtr]::Size * 2)"))"
# Zero out the memory that was just allocated. According to MSDN documentation:
# "When AllocHGlobal calls LocalAlloc, it passes a LMEM_FIXED flag, which causes the allocated memory to be locked in place. Also, the allocated memory is not zero-filled."
# http://msdn.microsoft.com/en-us/library/s69bkh17.aspx
$ZeroBytes = New-Object Byte[]($StructSize)
[Runtime.InteropServices.Marshal]::Copy($ZeroBytes, 0, $LocalStructPtr, $StructSize)
$BytesRead = [UInt32] 0
if ($NativeUtils::ReadProcessMemory($Handle, $MemoryAddress, $LocalStructPtr, $StructSize, [Ref] $BytesRead))
{
$SafeHandle.Close()
[Runtime.InteropServices.Marshal]::FreeHGlobal($LocalStructPtr)
throw ([ComponentModel.Win32Exception][Runtime.InteropServices.Marshal]::GetLastWin32Error())
}
Write-Verbose "Struct Size: $StructSize"
Write-Verbose "Bytes read: $BytesRead"
$ParsedStruct = [Runtime.InteropServices.Marshal]::PtrToStructure($LocalStructPtr, $StructType)
[Runtime.InteropServices.Marshal]::FreeHGlobal($LocalStructPtr)
$SafeHandle.Close()
Write-Output $ParsedStruct
}
|
combined_dataset/train/non-malicious/2201.ps1
|
2201.ps1
|
[CmdletBinding(SupportsShouldProcess)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")]
[ValidateScript({Test-Connection -ComputerName $_ -Count 2})]
[string]$SiteServer,
[parameter(Mandatory=$true, HelpMessage="Value in WQL query statement to look for")]
[string]$Locate,
[parameter(Mandatory=$true, HelpMessage="Value in WQL query statement to replace the matched value with")]
[string]$Replace,
[parameter(Mandatory=$false, HelpMessage="When specified a collection membership update cycle will be invoked for the current collection being processed if it's about to be amended")]
[switch]$UpdateMembership
)
Begin {
$CurrentLocation = Get-Location
try {
Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug "SiteCode: $($SiteCode)"
}
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
}
Process {
Write-Verbose -Message "Enumerating all Collections"
$Collections = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer
foreach ($Collection in $Collections) {
Write-Verbose -Message "Processing Collection: '$($Collection.Name)'"
$Collection.Get()
foreach ($Rule in $Collection.CollectionRules) {
if ($Rule.__CLASS -like "SMS_CollectionRuleQuery") {
if ($Rule.QueryExpression -match $Locate) {
Write-Verbose -Message "Rule '$($Rule.RuleName)' has been validated as a matched QueryRule"
$NewQueryExpression = $Rule.QueryExpression -replace "$($Locate)","$($Replace)"
$NewRuleName = $Rule.RuleName
Write-Verbose -Message "Stored the values from rule '$($Rule.RuleName)' in memory"
if ($PSCmdlet.ShouldProcess("RuleName: '$($Rule.RuleName)'","DeleteMembershipRule")) {
$RemoveRule = $Collection.DeleteMembershipRule($Rule)
}
if ($RemoveRule.ReturnValue -eq 0) {
Write-Verbose -Message "Rule '$($Rule.RuleName)' was successfully removed"
}
else {
Throw "Unable to remove current rule '$($Rule.RuleName)'"
}
Write-Verbose -Message "Stored QueryRule expression: `n$($Rule.QueryExpression)"
try {
if ($PSCmdlet.ShouldProcess("RuleName: '$($NewRuleName)'","CreateMembershipRule")) {
$NewRule = ([WmiClass]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_CollectionRuleQuery").CreateInstance()
$NewRule.QueryExpression = $NewQueryExpression
$NewRule.RuleName = $NewRuleName
$Collection.CollectionRules = $NewRule
$Collection.Put() | Out-Null
if (($Collection.CollectionRules | Where-Object { ($_.RuleName -like "$($NewRuleName)") -and ($_.__CLASS -like "SMS_CollectionRuleQuery") } | Measure-Object).Count -eq 1) {
Write-Verbose -Message "Amended QueryRule expression: `n$($NewQueryExpression)"
Write-Verbose -Message "Successfully created a new QueryRule named '$($NewRuleName)' on collection '$($Collection.Name)'"
if ($PSBoundParameters["UpdateMembership"]) {
$InvokeMethod = $Collection.RequestRefresh()
if ($InvokeMethod.ReturnValue -eq 0) {
Write-Verbose -Message "Invoking Collection Membership Update method for Collection: $($Collection.Name)"
}
else {
Write-Warning -Message "Failed to invoke Collection Membership Update method for Collection: $($Collection.Name)"
}
}
}
}
}
catch {
Throw "Failed to create a new QueryRule instance"
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_31_25.ps1
|
sample_31_25.ps1
|
# Localized 05/07/2022 02:58 AM (GMT) 303:7.0.30723 TestDtc.psd1
ConvertFrom-StringData @'
###PSLOC start localizing
FirewallRuleEnabled="{0}: Firewall rule for {1} is enabled."
FirewallRuleDisabled="{0}: Firewall rule for {1} is disabled. This computer cannot participate in network transactions."
CmdletFailed="The {0} cmdlet failed. Please make sure the {1} module is installed."
InvalidLocalComputer="{0} is not a valid local computer name."
RPCEndpointMapper="RPC Endpoint Mapper"
DtcIncomingConnection="DTC incoming connections"
DtcOutgoingConnection="DTC outgoing connections"
MatchingDtcNotFound="A DTC instance with VirtualServerName {0} does not exist."
InboundDisabled="{0}: Inbound transactions are not allowed and this computer cannot participate in network transactions."
OutboundDisabled="{0}: Outbound transactions are not allowed and this computer cannot participate in network transactions."
OSVersion="{0} Operating System Version: {1}."
OSQueryFailed="Failed to query operating system of {0}."
VersionNotSupported="Testing DTC on Windows versions below {0} is not supported with this cmdlet."
FailedToCreateCimSession="Failed to create a CIM Session to {0}."
NotARemoteComputer="{0} is not a remote computer."
PingingSucceeded="Pinging computer {0} from {1} succeeded."
PingingFailed="Pinging computer {0} from {1} failed."
SameCids="The {0} CID on {1} and {2} is the same. The CID should be unique to each computer."
DiagnosticTestPrompt="This diagnostic test will attempt to carry out a transaction propagation between {0} and {1}. It requires that a TCP port is opened on {0} so that a Test Resource Manager can participate in network transactions."
DefaultPortDescription="The default port is {0} and you can change it using the 'ResourceManagerPort' parameter and rerunning the test. "
PortDescription="You have specified {0} as the 'ResourceManagerPort'."
FirewallRequest="Please open port {0} in the firewall to proceed with the test."
QueryText="Do you want to proceed with the test?"
InvalidDefaultCluster="{0} is not the Virtual Server Name of the default DTC configured on this computer. You can use 'Set-DtcClusterDefault' cmdlet configure the default DTC on this computer."
InvalidDefault="{0} is not the Virtual Server Name of the default DTC configured on this computer. You can use 'Set-DtcDefault' cmdlet to configure the default DTC on this computer."
NeedDtcSecurityFix="DTC security settings and firewall settings should be fixed in order to complete the transactions propagation test."
StartResourceManagerFailed="Test resource manager creation failed."
ResourceManagerStarted="Test resource manager started."
PSSessionCreated="A new PSSession to {0} created."
TransactionPropagated="Transaction propagated from {0} to {1} using {2} propagation."
TransactionPropagationFailed="Transaction propagation {0} to {1} failed using {2} propagation."
TestRMVerboseLog="Test Resource Manager Verbose Log:"
TestRMWarningLog="Test Resource Manager Warning Log:"
InvalidParameters="At least one of LocalComputerName or RemoteComputerName parameters should be specified."
###PSLOC
'@
|
combined_dataset/train/non-malicious/3377.ps1
|
3377.ps1
|
[CmdletBinding()]
Param(
[Parameter(Mandatory = $True, Position = 0)]
[string]$ReleaseDate,
[Parameter(Mandatory = $True, Position = 1)]
[string]$ReleaseVersion,
[Parameter(Mandatory = $False, Position = 2)]
[string]$PathToRepo
)
function UpdateCurrentDoc([string]$PathToCurrentDoc, [string]$ModuleVersion)
{
$service = (Get-Item -Path "$PathToCurrentDoc\..\..").Name
$content = Get-Content $PathToCurrentDoc -Encoding UTF8
$found = $False
$changes = @()
for ($idx = 1; $idx -lt $content.Length; $idx++)
{
if ($found -and $content[$idx] -like "
{
$found = $False
}
elseif ($found -and $changes.Length -eq 0)
{
$changes += "
$changes += ""
$changes += $content[$idx]
}
elseif ($found)
{
$changes += $content[$idx]
}
if ($content[$idx - 1] -eq "
{
$found = $True
}
}
if ($changes.Length -gt 0)
{
$end = $ModuleVersion.IndexOf(".")
$ModuleVersion = "$($ModuleVersion.Substring(0, $end)).0.0"
$newContent = New-Object string[] ($content.Length + 2)
$buffer = 0
for ($idx = 0; $idx -lt $content.Length; $idx++)
{
if ($content[$idx] -eq "
{
$newContent[$idx] = "
$newContent[$idx + 1] = ""
$newContent[$idx + 2] = "
$buffer = 2
$idx++
}
$newContent[$idx + $buffer] = $content[$idx]
}
$result = $newContent -join "`r`n"
$tempFile = Get-Item $PathToCurrentDoc
[System.IO.File]::WriteAllText($tempFile.FullName, $result, [Text.Encoding]::UTF8)
}
return $changes
}
function GetModuleVersion([string]$PathToModule)
{
return (Test-ModuleManifest -Path $PathToModule).Version.ToString()
}
function UpdateARMBreakingChangeDocs([string]$PathToServices)
{
$docs = Get-ChildItem -Path $PathToServices -Recurse | Where { $_.Attributes -match "Directory" } | Where { $_.Name -eq "documentation" }
$allChanges = @()
foreach ($doc in $docs)
{
$currentDocPath = "$($doc.FullName)\current-breaking-changes.md"
$upcomingDocPath = "$($doc.FullName)\upcoming-breaking-changes.md"
$Service = Get-Item -Path "$($doc.FullName)\.."
$serviceName = $Service.Name
if ($serviceName -eq "AzureBackup") { $serviceName = "Backup" }
if ($serviceName -eq "AzureBatch") { $serviceName = "Batch" }
$modulePath = "$PathToRepo\artifacts\Debug\Az.$serviceName\Az.$serviceName.psd1"
$moduleVersion = GetModuleVersion -PathToModule $modulePath
$changes = UpdateCurrentDoc -PathToCurrentDoc $currentDocPath -ModuleVersion $moduleVersion
if ($changes.Length -gt 0)
{
$allChanges += $changes
}
}
return $allChanges
}
function UpdateBreakingChangeDoc([string]$PathToDoc, [string[]]$ChangesToAdd)
{
$content = Get-Content -Path $PathToDoc -Encoding UTF8
$size = $content.Length + $ChangesToAdd.Length + 2
$newContent = New-Object string[] $size
$newContent[0] = "
$newContent[1] = ""
$buffer = 2
for ($idx = 0; $idx -lt $ChangesToAdd.Length; $idx++)
{
$newContent[$idx + $buffer] = $ChangesToAdd[$idx]
}
$buffer += $ChangesToAdd.Length
for ($idx = 0; $idx -lt $content.Length; $idx++)
{
$newContent[$idx + $buffer] = $content[$idx]
}
$result = $newContent -join "`r`n"
$tempFile = Get-Item $PathToDoc
[System.IO.File]::WriteAllText($tempFile.FullName, $result, [Text.Encoding]::UTF8)
}
if (!$PathToRepo)
{
$PathToRepo = "$PSScriptRoot\.."
}
$ResourceManagerChanges = UpdateARMBreakingChangeDocs -PathToServices $PathToRepo\src
$allChanges = @()
if ($ResourceManagerChanges.Length -gt 0)
{
$allChanges += $ResourceManagerChanges
}
UpdateBreakingChangeDoc -PathToDoc $PathToDoc -ChangesToAdd $allChanges
|
combined_dataset/train/non-malicious/sample_64_31.ps1
|
sample_64_31.ps1
|
##########################################################################
# DELL PROPRIETARY INFORMATION
#
# This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this
# software to you under the terms of a license agreement,nondisclosure agreement or both.
# You may not copy, disclose, or use this software except in accordance with those terms.
#
# Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved.
#
# DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE,
# EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
# DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING,
# MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.
#
#
#
##########################################################################
function Get-DellBiosSettings {
<#
.Synopsis
retrieves all BIOS settings applicable to the system
.Description
This CmdLet retrieves the BIOS settings that are applicable to the system.
.Example
Get-DellBiosSettings
#>
BEGIN { }
PROCESS {
$DellBIOS = get-childitem -path DellSmbios:\ | select category |
foreach {
get-childitem -path @("DellSmbios:\" + $_.Category) | select attribute, currentvalue, possiblevalues, PSPath
}
$DellBIOS | Out-GridView
}
END{ }
}
# SIG # Begin signature block
# MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBgRpAvWg/3Tals
# Ic0Ie1oHgiTItaOHs13U1me04uUj8aCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m
# jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE
# ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s
# ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv
# ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx
# MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu
# MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq
# gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l
# OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr
# +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d
# vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1
# HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn
# DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig
# nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z
# HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK
# Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u
# DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC
# AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw
# FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG
# AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn
# MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp
# MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O
# BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp
# UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7
# BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+
# LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv
# 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF
# VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX
# bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG
# ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50
# cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My
# MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT
# MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB
# gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW
# RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6
# YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n
# aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW
# xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j
# R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk
# j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW
# FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg
# tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr
# 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3
# i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm
# Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC
# ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn
# +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB
# BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB
# BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG
# A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js
# MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX
# MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1
# YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3
# diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc
# VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw
# Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX
# 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY
# KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V
# HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL
# eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA
# S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM
# ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw
# HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500
# H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE
# CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg
# Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5
# MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv
# biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP
# RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG
# 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7
# 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv
# 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs
# 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29
# p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu
# 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH
# yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2
# +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7
# AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj
# ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi
# yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr
# BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0
# MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu
# Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE
# PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l
# dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT
# ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh
# 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj
# xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu
# AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c
# QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb
# fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq
# 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS
# zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ
# 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm
# DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF
# A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl
# ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm
# hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3
# AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx
# IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi
# BCBeKiwYbuiQH8aNByiGWveKqEp5FvNdn7bUMk1VLbfoBDANBgkqhkiG9w0BAQEF
# AASCAYBu5BwBKbQlT5JnsOKEYPAmYusThlEvWn9kyOMJN8Odo3IDJiaguKL8mEu6
# 8JLv/L0W4RqNE50p5NjquP1kS4x76NpKv4Czv6OMpnOkaeKMIMtcGLkLYiAP/5JZ
# F5PS1fyiHRiAMw18oouTl4iF/YMiv/QIimUuIwsQw0F8deeIcR6i5AmQvAoM5EoG
# 5ck8tqTqjs2cJSNAhUs/B0r1Ohs82wsdnkzQrD+thUwKxfojqcBnayMUzU2Xr0Vb
# gjQljG39DD/j+jhA1UYt1Cy6ANjyfcSwVEG8t+eNHnGqOwCv664MBzFrjS0+v5+t
# bEMHO4WMnBldDYOU47MEUaUnpoofQC5AsfKYI6AYnX1kTz2SMDcM7jgu5mTxPPwa
# MJBT/HdEcmXv53FKIY+aRBnlh8HZsLLM/Yi5YJJ6SaCuSLFuWsRA8MLlrwJJDlSW
# mzYxlKuALA8bSN/BS+B7I3/oU3O1OmNF/r1FUO0A7F9QFFOttsQsfbnVFqJ6FOw/
# tf7v0XShghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4
# MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C
# AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgzMXufUMA7//zYL6H8H0X
# IQdZExEkUirlCoUGvEP82O8CCGRBxRAOyRUvGA8yMDI0MDQxODA3MzI1MFowAwIB
# AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT
# Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz
# dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO
# QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0
# Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j
# LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv
# b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa
# Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0
# LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp
# ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm
# Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc
# Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN
# CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT
# SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV
# EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf
# e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM
# 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I
# H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp
# OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL
# XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB
# o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD
# VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo
# MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF
# BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG
# A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww
# HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ
# Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd
# ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU
# +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql
# z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G
# w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi
# e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6
# yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F
# ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE
# Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv
# cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL
# MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu
# dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg
# zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM
# GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG
# sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4
# yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI
# fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P
# 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0
# spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu
# 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W
# EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6
# l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB
# AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb
# zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV
# HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J
# +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5
# +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH
# lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2
# oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84
# CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f
# G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD
# DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c
# 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr
# JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h
# ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m
# 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2
# EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt
# IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT
# AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv
# cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4
# Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj
# C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I
# 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb
# Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s
# F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS
# h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo
# FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8
# 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad
# scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/
# BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue
# JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T
# AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw
# FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF
# BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov
# L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk
# oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE
# AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG
# +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh
# MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC
# S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI
# WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP
# EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk
# 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII
# 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz
# 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk
# uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK
# SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8
# a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF
# gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk
# +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD
# VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp
# bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa
# BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx
# ODA3MzI1MFowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN
# AQENME8GCSqGSIb3DQEJBDFCBEDRyVhidhHLPF9+N0gaRutDnSp0ceZ6Uon8Jh3W
# 4XsoanBD7SRCwMTcmz0aQkNEmeCZapeGNrzxxMx8CAQFyf5cMIHQBgsqhkiG9w0B
# CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS
# ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw
# ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl
# BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7
# hfYR9W27bjALBgkqhkiG9w0BAQ0EggIAVL83pGx/uTJyhbBnz7gOF8zJDLRVyFAU
# L7iKVQCe5pCBtXsHMznNoxQeZAWuf6RAHahRSN8uNCDO1+o3tYRo9Qa4GNohsF/x
# Ag0VfIqbwhgF6zXbT52vMpbr7E64+NrNBkYV+QtjAo9XJF7LmHnGfFYdZ2uNTWOy
# OJfsig8W7HU7tEzvrCWX2gb4h5AYGD4OQQ9rF3tXZR4q0osjQAUaM7ByYFLjgzzt
# +371yxfnXtmA2js7+z5e76PSzq6pJlH0+bHu+SwEPK22B1Y7MivqrglTShpfIj2z
# 8SHbl4u7ANYLbSNcBETxuOUoV2SHxlVnYwm87QvTab+FA/MakOiwjCn1JXI+ZL0l
# KnMAh5+BhQ+XXLfCWMBBxKjihDrFB9OFGlXpLSAQH/QPxYMe3QVQGEc2imHqE1e2
# GhNgZ+jfX7dNXYq48oJyHYaV5Q8wMBWSwg4lVLWeUDm/wvIRh8NoVGbBmARYxOqI
# dow0yS2h92sNpY1CgYh0Ng2h8WFGY3KJvdjvW2Ug78yxF2+sg3Egeh+5N8fz0fDr
# Lk5z527sa2hy2+1R0+Tn9zKqgtwcd2F2auPFp8zgNWKlIsmSvfkITrG9r8T4aQAw
# t+70VQduZGPQTZvhcLSWJCtqp4GKbgjnCWv/Cii8MBdhVq+l3d+IBcCAy2QuEtYF
# xNIruELFBGU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_53_63.ps1
|
sample_53_63.ps1
|
# region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ScheduledQueryRule.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ScheduledQueryRule.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWtylvi9zXfQsb
# FYuQI3Vr1RKjuHU/TtrPlNqx6gM93aCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDvx
# kBkuaWn1yjsj3AV662QmviJ/VicAzzWsAtNkBucAMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAWaaJlW/uzJfFLKKzo4oc/nRfFDg9HwTocHKI
# ZjjiDOPvqRwA9aSHuV4sm+GwhXAM9M5h4sSH6C13OE+r9Tg8QM3x8zIWc7P/2SVh
# hPXaPexGHtqrqml+fwPvm+3I4DQuqBfPI2Mjove8viNhSGyk1aCjUzZD616k+qTg
# q+lRwhcNXVC6F6RVu9fnKVOBrBlZAGe+jbsdWrGZh1/uPxCXisLkf3s6HpPEohOb
# 5WQk/Y/oc1gvC90BUIIT4TgfdR69KndRjeZIggtvoQ+mASEMgBSMj28w1IFIjO65
# LeHXNQZGuyGZnUvzFLUH8/iUPuF5FBUaQONRGoxcTTF8gznuv6GCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBnO/i/QPqfGRk4FdZjqonA8gdb99Ta7daF
# R/2i18blHgIGZjK/xO+ZGBMyMDI0MDUxNjA2NDIxMi45ODlaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB
# AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq
# YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz
# 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo
# mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI
# YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc
# QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x
# uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE
# 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL
# CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ
# wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF
# kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+
# cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM
# jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc
# 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15
# j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s
# gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA
# GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0
# SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B
# 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ
# n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v
# ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5
# aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ
# IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0
# 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e8JcjAi
# GA8yMDI0MDUxNTEwMTQxMFoYDzIwMjQwNTE2MTAxNDEwWjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDp7wlyAgEAMAoCAQACAhwfAgH/MAcCAQACAhK7MAoCBQDp8Fry
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKr1B/rLMsdEgXnXDh5Ie+HB
# Kw4SvHEicuCL/PcvkybJxi0a/BBFfOY2z6SPDMitqmzQ9fWRBbA1L/qMqS2/QCTy
# C/SlgJr6jyPJqMdksnvmWbW4vBigqIZxb7a0zAcQiCWsQFH5wu30w7O6390PzNrO
# EJ/xTdGO1e7ypgQA0f8/Zqp4AxkPMQ9PT+q3bQdyBJNNdBrUV39ysRxw6uYCm93Y
# 1fK1F14UIOPsZ0G1o5AyrdgfJ6PsJEenttQ+yQF6t41fZYQRD9mj8WEij61kJ7Yi
# UPO8RlNaTVvt8C86L3PtBJUen48Qz35tPpT4LO0lWPwdS+sqjv6Fi633rVOhbvsx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBvPX8lGmaZGq4RoOWvhjkf
# i9DeSdU/qrWwh6aXeRzSODCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8
# 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg2cCr
# DQIdbsf0+tyBTTuQrs/4PYHMxi7QbHuul90FSlYwDQYJKoZIhvcNAQELBQAEggIA
# Btkym8q+/RHBe3qTMlUU5DrzOKc8wOTMCtsm3b4NtXHMRzEU4MEyst9gKdfiFVKP
# r0cmMCe03Hp9A+fAvPcJRHazfvsV6q+38ew0Io6lvJhIBJ2gyQz4f+Z9ASSU24x8
# AiTO1S3vBS0q415gs0QrS0RrNUIXVmBQCIPnn60oBQNwebQoYSUOOxovhVgnsYvC
# PixGBf55bvhsDhdJlBf6C8t2LgJf5w/w5m67dShbuteZAkDBuAniyf06hd6kYTn2
# szpp+viagGVbRmAJnVCixIOgobnvz0N+mbZxtBxKujnjYgIIyTPjb4SijkABNKql
# 3ekOwSBevi1mfoh+egxYiJlLe1dGyErdhUTjznNpxa4JWmjAtKSgdOOsC8mZpRjh
# F1wYVVtQR925jDyUAaNMMzEBjnj6fco1kRVQqY3GrktX2Yw0hzlYZ5GjUjKQkx50
# qGg+aGmONP414NTx6+rV4KYJlS5U8DNk+PfOo6+xBb8hhmITSgeK0evvoS3Vjx1c
# 32lPa6uvRWyjQUcEWQqfZS+FYL7DkvV/F9h86Cdu+PxrSomlal4YT4Ihf9xq5j2f
# ZUyWx3Acl/mpJpBiz/ZeD2vIDMtHdF3PO9kOvZXZMFlLIfzDnABR7KV8zuND+RUe
# yprb5L3pZQQa2sL3tWsJtCKFhiNwWiAglWdyuR3pMGQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4109.ps1
|
4109.ps1
|
Clear-Host
Set-Variable -Name OS -Scope Global -Force
Set-Variable -Name RelativePath -Scope Global -Force
Function RenameWindow ($Title) {
Set-Variable -Name a -Scope Local -Force
$a = (Get-Host).UI.RawUI
$a.WindowTitle = $Title
Remove-Variable -Name a -Scope Local -Force
}
Function GetRelativePath {
$Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\"
}
Function GetOSArchitecture {
$Global:Architecture = Get-WMIObject win32_operatingsystem
$Global:Architecture = $Global:Architecture.OSArchitecture
}
Function ProcessRunning($Description,$Process) {
Set-Variable -Name ProcessActive -Scope Local -Force
Write-Host $Description"....." -NoNewline
$ProcessActive = Get-Process $Process -ErrorAction SilentlyContinue
if($ProcessActive -eq $null) {
Write-Host "Not Running" -ForegroundColor Yellow
} else {
Write-Host "Running" -ForegroundColor Red
}
Remove-Variable -Name ProcessActive -Scope Local -Force
}
Function KillProcess($Description,$Process) {
Set-Variable -Name ProcessActive -Scope Local -Force
Write-Host $Description"....." -NoNewline
$ProcessActive = Stop-Process -Name $Process -Force
If ($ProcessActive -eq $null) {
Write-Host "Killed" -ForegroundColor Yellow
} else {
Write-Host "Still Running" -ForegroundColor Red
}
}
Function CopyFile($FileName,$SourceDir,$DestinationDir,$NewFileName) {
If ($SourceDir.SubString($SourceDir.length-1) -ne "\") {
$SourceDir = $SourceDir+"\"
}
If ((Test-Path -Path $SourceDir$FileName) -eq $true) {
Write-Host "Copying"$FileName"....."
Copy-Item -Path $SourceDir$FileName -Destination $DestinationDir -Force
If ($NewFileName -ne "") {
If ($DestinationDir.SubString($DestinationDir.length-1) -ne "\") {
$DestinationDir = $DestinationDir+"\"
}
Rename-Item -Path $DestinationDir$FileName -NewName $NewFileName -Force
}
}
}
Function BalloonTip($ApplicationName, $Status, $DisplayTime) {
Set-Variable -Name balloon -Scope Local -Force
Set-Variable -Name icon -Scope Local -Force
Set-Variable -Name path -Scope Local -Force
[system.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms') | Out-Null
$balloon = New-Object System.Windows.Forms.NotifyIcon
$path = Get-Process -id $pid | Select-Object -ExpandProperty Path
$icon = [System.Drawing.Icon]::ExtractAssociatedIcon($path)
$balloon.Icon = $icon
$balloon.BalloonTipIcon = 'Info'
$balloon.BalloonTipTitle = "Gresham, Smith and Partners"
$balloon.BalloonTipText = $ApplicationName+[char]13+[char]13+$Status
$balloon.Visible = $true
$balloon.ShowBalloonTip($DisplayTime)
Remove-Variable -Name balloon -Scope Local -Force
Remove-Variable -Name icon -Scope Local -Force
Remove-Variable -Name path -Scope Local -Force
}
Function UninstallOldMSIApplication($Description) {
Set-Variable -Name AppName -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Set-Variable -Name Desc -Scope Local -Force
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name GUID -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
Set-Variable -Name Output1 -Scope Local -Force
$Desc = [char]34+"description like"+[char]32+[char]39+[char]37+$Description+[char]37+[char]39+[char]34
$Output1 = wmic product where $Desc get Description
cls
$Output1 | ForEach-Object {
$_ = $_.Trim()
if(($_ -ne "Description")-and($_ -ne "")){
$AppName = $_
}
}
If ($AppName -eq $null) {
return
}
Write-Host "Uninstalling"$AppName"....." -NoNewline
$Output = wmic product where $Desc get IdentifyingNumber
$Output | ForEach-Object {
$_ = $_.Trim()
if(($_ -ne "IdentifyingNumber")-and($_ -ne "")){
$GUID = $_
}
}
$Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart"
$ErrCode = (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
$Result = (AppInstalled $Description)
If ($Result) {
Write-Host "Failed with error code"$ErrCode -ForegroundColor Red
} else {
Write-Host "Uninstalled" -ForegroundColor Yellow
}
Remove-Variable -Name AppName -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
Remove-Variable -Name Desc -Scope Local -Force
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name GUID -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
Remove-Variable -Name Output1 -Scope Local -Force
}
Function InstallMSIApplication($App,$Switches,$Transforms,$Desc) {
Set-Variable -Name App -Scope Local -Force
Set-Variable -Name Arguments -Scope Local -Force
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name Result -Scope Local -Force
Write-Host "Installing"$Desc"....." -NoNewline
$App = [char]32+[char]34+$RelativePath+$App+[char]34
$Switches = [char]32+$Switches
If ($Transforms -ne $null) {
$Transforms = [char]32+"TRANSFORMS="+$RelativePath+$Transforms
$Arguments = "/I"+$App+$Transforms+$Switches
} else {
$Arguments = "/I"+$App+$Switches
}
$ErrCode = (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode
$Result = (AppInstalled $Desc)
If ($Result) {
Write-Host "Installed" -ForegroundColor Yellow
} else {
Write-Host "Failed with error"$ErrCode -ForegroundColor Red
}
Remove-Variable -Name App -Scope Local -Force
Remove-Variable -Name Arguments -Scope Local -Force
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name Result -Scope Local -Force
}
Function InstallEXEApplication($App,$Switches,$Desc) {
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name Result -Scope Local -Force
Write-Host "Installing <Application>....." -NoNewline
$App = [char]32+[char]34+$RelativePath+$App+[char]34
$ErrCode = (Start-Process -FilePath $App -ArgumentList $Switches -Wait -Passthru).ExitCode
$Result = (AppInstalled $Desc)
If ($Result) {
Write-Host "Installed" -ForegroundColor Yellow
} else {
Write-Host "Failed with error"$ErrCode -ForegroundColor Red
}
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name Result -Scope Local -Force
}
Function AppInstalled($Description) {
Set-Variable -Name AppName -Scope Local -Force
Set-Variable -Name Output -Scope Local -Force
$Description = [char]34+"description like"+[char]32+[char]39+[char]37+$Description+[char]37+[char]39+[char]34
$Output = wmic product where $Description get Description
$Output | ForEach-Object {
$_ = $_.Trim()
if(($_ -ne "Description")-and($_ -ne "")){
$AppName = $_
}
}
If ($AppName -eq $null) {
return $false
} else {
return $true
}
Remove-Variable -Name AppName -Scope Local -Force
Remove-Variable -Name Output -Scope Local -Force
}
Function ExecuteDCSU($App,$Switches) {
Set-Variable -Name ErrCode -Scope Local -Force
$App = [char]34+"C:\Program Files (x86)\Dell\ClientSystemUpdate\"+$App+[char]34
$Switches = "/policy"+[char]32+$RelativePath+$Switches
$ErrCode = (Start-Process -FilePath $App -ArgumentList $Switches -Wait -Passthru).ExitCode
If ($ErrCode -eq 0) {
Write-Host "Drivers Updated" -ForegroundColor Yellow
} else {
Write-Host "Failed with error"$ErrCode -ForegroundColor Red
}
Remove-Variable -Name ErrCode -Scope Local -Force
}
RenameWindow "Install Dell Client System Update"
GetRelativePath
GetOSArchitecture
BalloonTip "Dell Client System Update" "Updating Drivers...." 10000
InstallMSIApplication "Dell Client System Update.msi" "/qb- /norestart" $null "Dell Client System Update"
ExecuteDCSU "dcsu-cli.exe" "BuildPolicy.xml"
UninstallOldMSIApplication "Dell Client System Update"
BalloonTip "Dell Client System Update" "Driver Update Complete" 30000
Remove-Variable -Name OS -Scope Global -Force
Remove-Variable -Name RelativePath -Scope Global -Force
|
combined_dataset/train/non-malicious/Get-Parameter_5.ps1
|
Get-Parameter_5.ps1
|
function Get-Parameter ( $Cmdlet, [switch]$ShowCommon ) {
foreach ($paramset in (Get-Command $Cmdlet).ParameterSets){
$Output = @()
foreach ($param in $paramset.Parameters) {
if ( !$ShowCommon ) {
if ($param.aliases -match "vb|db|ea|wa|ev|wv|ov|ob") { continue }
}
$process = "" | Select-Object Name, ParameterSet, Aliases, Position, IsMandatory
$process.Name = $param.Name
if ( $paramset.name -eq "__AllParameterSets" ) { $process.ParameterSet = "Default" }
else { $process.ParameterSet = $paramset.Name }
$process.Aliases = $param.aliases
if ( $param.Position -lt 0 ) { $process.Position = $null }
else { $process.Position = $param.Position }
$process.IsMandatory = $param.IsMandatory
$output += $process
}
Write-Output $Output
}
}
|
combined_dataset/train/non-malicious/2004.ps1
|
2004.ps1
|
Describe "ProviderIntrinsics Tests" -tags "CI" {
BeforeAll {
setup -d TestDir
}
It 'If a childitem exists, HasChild method returns $true' {
$ExecutionContext.InvokeProvider.ChildItem.HasChild("$TESTDRIVE") | Should -BeTrue
}
It 'If a childitem does not exist, HasChild method returns $false' {
$ExecutionContext.InvokeProvider.ChildItem.HasChild("$TESTDRIVE/TestDir") | Should -BeFalse
}
It 'If the path does not exist, HasChild throws an exception' {
{ $ExecutionContext.InvokeProvider.ChildItem.HasChild("TESTDRIVE/ThisDirectoryDoesNotExist") } |
Should -Throw -ErrorId 'ItemNotFoundException'
}
}
|
combined_dataset/train/non-malicious/New-GenericObject.ps1
|
New-GenericObject.ps1
|
##############################################################################\n##\n## New-GenericObject\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nCreates an object of a generic type:\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.ObjectModel.Collection System.Int32\nCreates a simple generic collection\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.Generic.Dictionary `\n System.String,System.Int32\nCreates a generic dictionary with two types\n\n.EXAMPLE\n\nPS >$secondType = New-GenericObject System.Collections.Generic.List Int32\nPS >New-GenericObject System.Collections.Generic.Dictionary `\n System.String,$secondType.GetType()\nCreates a generic list as the second type to a generic dictionary\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.Generic.LinkedListNode `\n System.String "Hi"\nCreates a generic type with a non-default constructor\n\n#>\n\nparam(\n ## The generic type to create\n [Parameter(Mandatory = $true)]\n [string] $TypeName,\n\n ## The types that should be applied to the generic object\n [Parameter(Mandatory = $true)]\n [string[]] $TypeParameters,\n\n ## Arguments to be passed to the constructor\n [object[]] $ConstructorParameters\n)\n\nSet-StrictMode -Version Latest\n\n## Create the generic type name\n$genericTypeName = $typeName + '`' + $typeParameters.Count\n$genericType = [Type] $genericTypeName\n\nif(-not $genericType)\n{\n throw "Could not find generic type $genericTypeName"\n}\n\n## Bind the type arguments to it\n[type[]] $typedParameters = $typeParameters\n$closedType = $genericType.MakeGenericType($typedParameters)\nif(-not $closedType)\n{\n throw "Could not make closed type $genericType"\n}\n\n## Create the closed version of the generic type\n,[Activator]::CreateInstance($closedType, $constructorParameters)
|
combined_dataset/train/non-malicious/sample_35_91.ps1
|
sample_35_91.ps1
|
#
# Module manifest for module 'OCI.PSModules'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
# RootModule = ''
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '5ee167f1-0abc-4d85-b9b3-6d354fcaaa35'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Oracle Cloud Infrastructure (OCI) PowerShell Modules - Cmdlets to manage resources in OCI.
For more information, please visit: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/powershell.htm'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Accessgovernancecp'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Adm'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Aianomalydetection'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Aidocument'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Ailanguage'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Aispeech'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Aivision'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Analytics'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Announcementsservice'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Apigateway'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmconfig'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmcontrolplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmsynthetics'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmtraces'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Applicationmigration'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Appmgmtcontrol'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Artifacts'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Audit'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Autoscaling'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Bastion'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Bds'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Blockchain'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Budget'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Capacitymanagement'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Certificates'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Certificatesmanagement'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Cims'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudbridge'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudguard'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudmigrations'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Computecloudatcustomer'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Computeinstanceagent'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Containerengine'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Containerinstances'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Core'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Dashboardservice'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Database'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasemanagement'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasemigration'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasetools'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Datacatalog'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Dataflow'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Dataintegration'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Datalabelingservice'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Datalabelingservicedataplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Datasafe'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Datascience'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Desktops'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Devops'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Disasterrecovery'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Dns'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Dts'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Email'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Emaildataplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Emwarehouse'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Events'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Filestorage'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Fleetsoftwareupdate'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Functions'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Fusionapps'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Generativeai'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Generativeaiinference'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Genericartifactscontent'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Globallydistributeddatabase'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Goldengate'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Governancerulescontrolplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Healthchecks'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Identity'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Identitydataplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Identitydomains'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Integration'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Jms'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Jmsjavadownloads'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Keymanagement'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Licensemanager'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Limits'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Loadbalancer'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Lockbox'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Loganalytics'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Logging'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Loggingingestion'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Loggingsearch'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Managementagent'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Managementdashboard'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Marketplace'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Marketplacepublisher'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Mediaservices'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Monitoring'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Mysql'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Networkfirewall'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Networkloadbalancer'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Nosql'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Objectstorage'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Oce'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Ocicontrolcenter'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Ocvp'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Oda'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Onesubscription'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Ons'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Opa'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Opensearch'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Operatoraccesscontrol'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Opsi'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Optimizer'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osmanagement'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osmanagementhub'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Ospgateway'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubbillingschedule'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osuborganizationsubscription'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubsubscription'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubusage'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Psql'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Queue'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Recovery'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Redis'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Resourcemanager'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Resourcesearch'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Rover'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Sch'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Secrets'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicecatalog'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicemanagerproxy'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicemesh'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Stackmonitoring'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Streaming'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Tenantmanagercontrolplane'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Threatintelligence'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Usage'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Usageapi'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Vault'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Vbsinst'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Visualbuilder'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Vnmonitoring'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Vulnerabilityscanning'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Waa'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Waas'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Waf'; RequiredVersion = '80.0.0'; },
@{ModuleName = 'OCI.PSModules.Workrequests'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Start-Presentation_1.ps1
|
Start-Presentation_1.ps1
|
if(-not(get-command New-System.Windows.Window -EA 0)){ Import-Module PowerBoots }
Add-BootsTemplate $PSScriptRoot\\PresentationFrame.xaml
$name = [System.Windows.Navigation.JournalEntry]::NameProperty
[double]$global:zoomLevel = 1
$SlideCount = 0
function Start-Zoom {
PARAM(
[Parameter(Position=0)]
$Zoom = 0
,
[Parameter(ValueFromPipeline=$true)]
$Root = $($global:Frame)
,
[Parameter()]
$Window = $presentationTitle
)
$null = Invoke-BootsWindow $Window {
Param($Window,$Root)
if(!$Root.RenderTransform.Children) {
$Root.RenderTransform = TransformGroup {
ScaleTransform -ScaleX $zoomLevel -ScaleY $zoomLevel
TranslateTransform
}
$BootsWindow.Add_MouseDown( {
if($zoomLevel -ne 1) {
trap { Write-Host $( $_ | fl * | out-string ) }
$global:MouseDownPoint = [System.Windows.Input.Mouse]::GetPosition($BootsWindow)
$this.CaptureMouse()
}
} )
$BootsWindow.Add_MouseUp( {
if($zoomLevel -ne 1) {
trap { Write-Host $( $_ | fl * | out-string ) }
$this.ReleaseMouseCapture()
}
} )
$BootsWindow.Add_MouseMove( {
if($zoomLevel -ne 1) {
trap { Write-Host $( $_ | fl * | out-string ) }
if($_.LeftButton -eq "Pressed") {
$newPos = [System.Windows.Input.Mouse]::GetPosition($BootsWindow)
$this.Content.RenderTransform.Children[1].SetValue(
[System.Windows.Media.TranslateTransform]::XProperty,
$this.Content.RenderTransform.Children[1].Value.OffsetX + ($newPos.X - $MouseDownPoint.X) )
$this.Content.RenderTransform.Children[1].SetValue(
[System.Windows.Media.TranslateTransform]::YProperty,
$this.Content.RenderTransform.Children[1].Value.OffsetY + ($newPos.Y - $MouseDownPoint.Y) )
$global:MouseDownPoint = $newPos;
}
}
} )
}
} $Root
}
function Set-Zoom {
PARAM(
[Parameter(Position=0)]
$Zoom = 0
,
[Parameter()]
$Root = $global:Frame
,
[Parameter()]
$Window = $presentationTitle
)
if($Zoom -gt 0) {
$global:zoomLevel *= (1+($Zoom/10))
} elseif($Zoom -lt 0) {
$global:zoomLevel /= (1+($Zoom/-10))
} else {
$global:zoomLevel = 1.0
}
$null = Invoke-BootsWindow $Window {
Param($Window,$Root)
$Root.RenderTransform.Children[0].SetValue(
[System.Windows.Media.ScaleTransform]::ScaleXProperty, $zoomLevel )
$Root.RenderTransform.Children[0].SetValue(
[System.Windows.Media.ScaleTransform]::ScaleYProperty, $zoomLevel )
## Note that we have to account for rounding errors ;)
if([Math]::Round($zoomLevel, 10) -eq 1.0 ) {
$Root.NavigationUIVisibility = "Visible"
$Root.RenderTransform.Children[1].SetValue(
[System.Windows.Media.TranslateTransform]::XProperty, 0.0 )
$Root.RenderTransform.Children[1].SetValue(
[System.Windows.Media.TranslateTransform]::YProperty, 0.0 )
} else {
$Root.NavigationUIVisibility = "Hidden"
}
} $Root
}
function Show-Url {
[CmdletBinding()]
PARAM(
[Parameter(Position=0, ValueFromPipeline=$true)]
[Uri]$Content
,
[Parameter()]
$Window = $presentationTitle
)
Invoke-BootsWindow $Window {
$global:Frame.Navigate( $Content )
}
}
New-Alias Navigate Show-Url # backwards compat
function Add-Slide {
#.Synopsis
# Add a slide to the presentation
#.Description
# Add any .net object as a slide to a presentation, wrapping it in a Page to set the title.
[CmdletBinding(DefaultParameterSetName="Script")]
PARAM(
[Parameter(Position=0,ValueFromPipelineByPropertyName=$true)]
[Alias("Name")]
[String]$Title = "Slide $SlideCount"
, [Parameter(Position=1, ValueFromPipeline=$true, Mandatory=$true)]
$Content
, [Parameter()]
$Window = $presentationTitle
)
PROCESS {
$SlideCount++
Invoke-BootsWindow $Window {
Param($Frame, $Content, $Title)
$Frame.Content = Page -Content $Content -Title $Title
} $global:Frame $Content $Title
}
}
function Add-TextSlide {
#.Synopsis
# Add a text slide to the presentation
#.Description
# Add a textual slide to the presentation with a header and several points
[CmdletBinding()]
PARAM(
[Parameter(Position=0)]
$Title = "Slide $SlideCount"
, [Parameter(Position=1, ValueFromPipeline=$true)]
[string[]]$Content = @("Several bullet points", "Which are equally important")
, [Parameter()]
$Window = $presentationTitle
)
BEGIN { [string[]]$global:Points = @() }
PROCESS { [string[]]$global:Points += $Content }
END {
Add-Slide -Title $Title -Window $Window -Content {
StackPanel -Margin 10 {
grid {
TextBlock $Title -FontSize 85 -FontFamily Impact -Foreground White -Effect { BlurEffect -Radius 15 } -TextAlign Center
TextBlock $Title -FontSize 85 -FontFamily Impact -Foreground $global:TitleBrush -TextAlign Center
}
write-host "Points: $Points"
$Points | % {
TextBlock $_ -FontSize 64 -FontWeight Bold -Foreground "White" -TextWrapping Wrap -Effect { DropShadowEffect -BlurRadius 15 }
}
}
}.GetNewClosure()
}
}
function Add-TitleSlide {
#.Synopsis
# Add a text slide to the presentation
#.Description
# Add a textual slide to the presentation with a header and several points
[CmdletBinding()]
PARAM(
[Parameter(Position=0)]
$Title
, [Parameter()]
$Window = $presentationTitle
)
BEGIN { [string[]]$Points = @() }
PROCESS { [string[]]$Points += $Content }
END {
Add-Slide -Title $Title -Window $Window -Content {
Grid {
TextBlock $Title `
-FontSize 125 -FontFamily Impact -Foreground White `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
-Effect { BlurEffect -Radius 20 }
TextBlock $Title `
-FontSize 125 -FontFamily Impact -Foreground White `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
-Effect { BlurEffect -Radius 20 }
TextBlock $Title `
-FontSize 125 -FontFamily Impact -Foreground $global:TitleBrush `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
-Effect {DropShadowEffect -Color White -Radius 15}
}
}
}
}
function Remove-Slide {
#.Synopsis
# Removes the specified slide from the deck (history)
#.Description
# Takes an index or name, and removes that slide, except that you CANNOT remove the last slide.
PARAM(
[Parameter(ParameterSetName="ByIndex", Mandatory=$true, Position=0)]
[int]$index
, [Parameter(ParameterSetName="ByTitle", Mandatory=$true, Position=0)]
[Alias("Name")]
[string]$Title
, [Parameter()]
$Window = $presentationTitle
)
$null = Invoke-BootsWindow $Window {
# Figure out where we are now, because we'll need to come back
$global:currentSlide = @($global:Frame.BackStack.GetEnumerator()).Count
# Activate the slide they want to delete ...
[int]$removable = Set-Slide @PsBoundParameters -passthru
}
# Separate Invoke's are required for the window to register what's going on?
$global:removable = $true
$null = Invoke-BootsWindow $Window {
if($global:Frame.CanGoForward) {
$global:Frame.GoForward()
} else {
$global:removable = $false
Write-Host "Sorry, you can't remove the last slide in the deck." -Fore Red
}
}
if($global:removable) {
# Separate Invoke's are required for the window to register what's going on?
Invoke-BootsWindow $Window {
$null = $global:Frame.RemoveBackEntry()
Set-Slide $currentSlide
}
}
}
function Show-Slide {
#.Synopsis
# Set the active slide in a deck
#.Description
# Sets the active slide by index or name (title)
[CmdletBinding(DefaultParameterSetName="ByIndex")]
PARAM(
[Parameter(ParameterSetName="ByIndex", Mandatory=$true, Position=0)]
[int]$index
, [Parameter(ParameterSetName="ByTitle", Mandatory=$true, Position=0)]
[Alias("Name")]
[string]$Title
, [Parameter()]
$Window = $presentationTitle
, [Parameter()]
[Switch]$Passthru
)
switch($PSCmdlet.ParameterSetName) {
"ByIndex" {
$null = Invoke-BootsWindow $Window {
# Figure out where we are now...
[int]$global:current = @($global:Frame.BackStack.GetEnumerator()).Count
# Then go where we need to
for(;$current -lt $index -and $global:Frame.CanGoForward ;$global:current++) {
$global:Frame.GoForward()
}
for(;$current -gt $index -and $global:Frame.CanGoBack ;$global:current--) {
$global:Frame.GoBack()
}
}
if($Passthru) { return $global:current }
}
"ByTitle" {
[int]$global:result = -1
[int]$global:current = -1
$null = Invoke-BootsWindow $Window {
# Figure out where we are now...
$global:current = @($global:Frame.BackStack.GetEnumerator()).Count
# Start with backward history ('cause it's more likely)
[int]$i = 0;
foreach($page in $global:Frame.BackStack) {
if($page.Name -eq $Title) {
$global:result = $current - $i - 1
for(;$i -gt $0 -and $global:Frame.CanGoBack;$i--) {
$global:Frame.GoBack()
}
break;
}
$i++
}
# Failing that, try forward history
[int]$i = 0;
foreach($page in $global:Frame.ForwardStack) {
if($page.Name -eq $Title) {
$global:result = $current + $i + 1
for(;$i -gt $0 -and $global:Frame.CanGoForward ;$i--) {
$global:Frame.GoForward()
}
break;
}
$i++
}
}
if($Passthru) {
if($global:result -ge 0) {
return $global:result
} else {
return $global:current
}
}
}
}
}
New-Alias Set-Slide Show-Slide # backwards compat
function Move-NextSlide {
#.Synopsis
# Navigates to the next slide (if there is another)
PARAM(
[Parameter()]
$Window = $presentationTitle
,
[Parameter()]
[Switch]$Passthru
)
$DidGo = Invoke-BootsWindow $Window {
Write-Output $global:Frame.CanGoForward
if($global:Frame.CanGoForward) {
$global:Frame.GoForward()
}
}
if($Passthru){ $DidGo }
}
New-Alias Next-Slide Move-NextSlide # backwards compat
function Move-PreviousSlide {
#.Synopsis
# Navigates to the previous slide (if there is another)
PARAM(
[Parameter()]
$Window = $presentationTitle
,
[Parameter()]
[Switch]$Passthru
)
$DidGo = Invoke-BootsWindow $Window {
Write-Output $global:Frame.CanGoForward
if($global:Frame.CanGoBack) {
$global:Frame.GoBack()
}
}
if($Passthru){ $DidGo }
}
New-Alias Prev-Slide Move-PreviousSlide
New-Alias Previous-Slide Move-PreviousSlide # backwards compat
function Start-Presentation {
#.Synopsis
# Start a presentation window
#.Description
# This is the kick-off function you have to call to create the presentation window
PARAM(
$PresentationTitle = "PowerShell Presentation"
, $BackgroundImagePath = $(Get-ItemProperty "HKCU:\\Control Panel\\Desktop" | Select -Expand Wallpaper | Get-ChildItem)
)
$BackgroundImagePath = Convert-Path (Resolve-Path $BackgroundImagePath)
$global:PresentationTitle = $PresentationTitle
## Finally, make the slide window
Boots -Title $PresentationTitle `
-Height $([System.Windows.SystemParameters]::PrimaryScreenHeight) `
-Width $([System.Windows.SystemParameters]::PrimaryScreenWidth) `
{
$global:TitleBrush = LinearGradientBrush -Start "0.5,0" -End "0.5,1" {
GradientStop -Color "#FF084670" -Offset 0
GradientStop -Color "#FF084670" -Offset 0.6
GradientStop -Color "#FF000000" -Offset 0.6
}
$global:Frame = Frame -Content {
Page -Title "Welcome" {
Grid {
TextBlock $PresentationTitle `
-FontSize 125 -FontFamily Impact -Foreground White `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
-Effect { BlurEffect -Radius 30 }
TextBlock $PresentationTitle `
-FontSize 125 -FontFamily Impact -Foreground White `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
-Effect { BlurEffect -Radius 30 }
TextBlock $PresentationTitle `
-FontSize 125 -FontFamily Impact -Foreground $global:TitleBrush `
-VerticalAlignment Center -TextAlignment Center `
-HorizontalAlignment Stretch -TextWrapping Wrap `
}
}
}
#Start-Zoom -Root $global:Frame
$global:Frame
} -Async -Popup -On_SourceInitialized {
if(Test-Path $BackgroundImagePath) {
$this.Background = ImageBrush -ImageSource $BackgroundImagePath
}
$this.WindowState = "Maximized"
} -On_KeyDown {
trap { Write-Host $( $_ | fl * | Out-String ) }
switch -regex ($_.Key) {
"Escape" {
Set-Zoom 0; break;
}
"OemPlus|Add" {
Set-Zoom +1; break;
}
"OemMinus|Subtract" {
Set-Zoom -1; break;
}
"MediaNextTrack|BrowserForward|Right" {
Next-Slide; break;
}
"MediaPreviousTrack|BrowserBack|Left" {
Previous-Slide; break;
}
}
} -On_MouseWheel {
if($_.Delta -gt 0 ) {
Set-Zoom +1
} else {
Set-Zoom -1
}
}
# -WindowStyle None -AllowsTransparency $true
}
function Test-Presentation {
Start-Presentation "PowerShell for Developers"
Add-TextSlide "Overview" "What is PowerShell?", "How can it help me?", "Should I code for it?", "How do I ..."
Add-TextSlide "What is PowerShell?" "A .Net Console","A new .Net Language","An admin scripting tool","An app automation engine", "All of the above"
ls ~\\Pictures\\Comix | Add-Slide
Set-Slide 0
## The simple, automatic, force-my-hand slide timer.
## One slide, every 20 seconds:
## go forward and check if we can go forward again
while( Move-NextSlide -Passthru ) {
# note that we have to sleep outside the invoke...
# otherwise the window can't update
sleep 20
}
}
Export-ModuleMember -Function * -Alias *
|
combined_dataset/train/non-malicious/sample_62_97.ps1
|
sample_62_97.ps1
|
#
# Module manifest for module 'OCI.PSModules.Events'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Events.dll'
# Version number of this module.
ModuleVersion = '88.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5e1c10f7-8832-4248-b692-89297c84ea32'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Events Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList',
'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule',
'Remove-OCIEventsRule', 'Update-OCIEventsRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_43_12.ps1
|
sample_43_12.ps1
|
#This script converts securestring to plaintext
param(
[Parameter(Mandatory, ValueFromPipeline)]
[System.Security.SecureString]
${SecureString}
)
$ssPtr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($SecureString)
try {
$plaintext = [System.Runtime.InteropServices.Marshal]::PtrToStringBSTR($ssPtr)
} finally {
[System.Runtime.InteropServices.Marshal]::ZeroFreeBSTR($ssPtr)
}
return $plaintext
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT7ZbNoY98P1cW
# CLQEXghewcRRqpuzw+uOgG2nbQ8aHaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAmRZNAgxcDFKH97A6YERhvK
# rSJCqORTlbGk5c1WcUAXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmDM3dETWF3IZty6w755Po2MXNNpeqpQk84QAyw9GvwX8JDoov6aPzDL0
# T4U6RU/y2fQ7DEGwyFIScXm6R4RRpeF1X8fooQEb/lvtIW9/cm77MUh9ph7mleZD
# 8lMVnGm6NGrr0Y/Yie2YDT0AqRUSZjaJJOvZF2+l4LdgZ3i/LpERKRxlBfmyQ0ud
# lHvrYW7FWg/fNXjzYq6aJ86c0sdrWT23PFbUIkTosc6XoP4VZrNiUHrGpMYlImWo
# fpYIQgDx9cCehT/o5b7dnL+b/dYTPukH+yzgXRX8hvQ9sqll2QOv3FBr30/sseZs
# nQdSgouPdEmqQIAHbsrGOlwN2SPE06GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBlkG1rco6/gfcB+/9WbE+emoQWqDJpdLg2r4YtaeUqywIGZjOaePor
# GBMyMDI0MDUxNjA2NDIxMy4yMTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAiGA8yMDI0MDUxNjAxNDgz
# OVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+R3
# AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vVD5ZLQF2IVTBpgme2LkAy
# RNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk84cbeSEfs3ona7Atp4Vjb
# 6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+sFS9/5M9THX/JkjED/UJ+
# Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0VaMYL7Zwea7M7OuTf1U0J
# tHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2ssdUPFHWHCJ3gTkcOB6y
# FOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB
# 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCQa/JbpCr1S3MfzpLdhJ+Yq1A0549b2s25U1Ri9ghw
# MTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb
# HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3U7IzUMEK7mnRzIEEZ3gJ
# GNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIAebCs4CdM9zAgwuj6kvzh
# CG7rXCtSSOgCqXvqjxxLuV/sAEyfe5yfJr3rcVJOHXCbYa/VyCrOsp4hPavLbSSo
# H7v8r0zdVYiBZuwK+t4vQEjlze431GbO1NBggoOtUAg4/YKywWJObN1oYzPTiNE3
# 0yqw/dIKae0bKCKJ07+SNUcLwu38YVUvFvJrutzBqNSgahXvLNbszCSS6LR/pMOD
# s3pcaF92IGsBLXQ6zcbgvVlVQvVqFyctQis9XoGhDBIsNvF3WubGRcQPy/i9I5gc
# MB/xcLiBtY7wG+98flybiQ5pIV62ndy3sqaq/lJJbBsaWRyKnWge0oxZ56c6uCdQ
# 4GhptqWRua3gAXNgyqO+OMKDVVd7pYcAa4I+ha7f8cEt/Pt2v6RuFaTc4jOMbTzN
# 41sBU/yePz3pPUrgShKi0zCE4mCnFbAVPc6NklcGJ16PIzkcm5SzAh/RBQAndeQp
# 7l8X6yz6y+yciTEaQ3QLiFYwJ86G5nKxfBgnn/+akaXWvsdHBF74lo8h3h6Tnrrh
# 0m3y4cWu8cqY8DsBmqM36NbS5oOsdEZmop/JCgrV3YAEAM+L0eHbKzY4udEbldB9
# J7UDsFkA6SstaIgViowSXxP4/8eYgYUWD1nlEA8R+rS5KTFAiqaKpTosL8PZ8cjO
# 3kMlGnrI6XPPkgTwlKpOjJE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3088.ps1
|
3088.ps1
|
function Verify-Same {
param (
[Parameter(ValueFromPipeline = $true)]
$Actual,
[Parameter(Mandatory = $true, Position = 0)]
$Expected
)
if (-not [object]::ReferenceEquals($Expected, $Actual)) {
throw [Exception]"Expected the objects to be the same instance but they were not."
}
$Actual
}
|
combined_dataset/train/non-malicious/269.ps1
|
269.ps1
|
function Get-ADDirectReports
{
[CmdletBinding()]
PARAM (
[Parameter(Mandatory)]
[String[]]$Identity,
[Switch]$Recurse
)
BEGIN
{
TRY
{
IF (-not (Get-Module -Name ActiveDirectory)) { Import-Module -Name ActiveDirectory -ErrorAction 'Stop' -Verbose:$false }
}
CATCH
{
Write-Verbose -Message "[BEGIN] Something wrong happened"
Write-Verbose -Message $Error[0].Exception.Message
}
}
PROCESS
{
foreach ($Account in $Identity)
{
TRY
{
IF ($PSBoundParameters['Recurse'])
{
Write-Verbose -Message "[PROCESS] Account: $Account (Recursive)"
Get-Aduser -identity $Account -Properties directreports |
ForEach-Object -Process {
$_.directreports | ForEach-Object -Process {
Get-ADUser -Identity $PSItem -Properties * | Select-Object -Property *, @{ Name = "ManagerAccount"; Expression = { (Get-Aduser -identity $psitem.manager).samaccountname } }
Get-ADDirectReports -Identity $PSItem -Recurse
}
}
}
IF (-not ($PSBoundParameters['Recurse']))
{
Write-Verbose -Message "[PROCESS] Account: $Account"
Get-Aduser -identity $Account -Properties directreports | Select-Object -ExpandProperty directReports |
Get-ADUser -Properties * | Select-Object -Property *, @{ Name = "ManagerAccount"; Expression = { (Get-Aduser -identity $psitem.manager).samaccountname } }
}
}
CATCH
{
Write-Verbose -Message "[PROCESS] Something wrong happened"
Write-Verbose -Message $Error[0].Exception.Message
}
}
}
END
{
Remove-Module -Name ActiveDirectory -ErrorAction 'SilentlyContinue' -Verbose:$false | Out-Null
}
}
|
combined_dataset/train/non-malicious/sample_7_35.ps1
|
sample_7_35.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ospgateway'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ospgateway.dll'
# Version number of this module.
ModuleVersion = '93.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2c26fa04-4a4e-49f5-877a-c15e551fc06e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ospgateway Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ospgateway.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOspgatewayAddress', 'Get-OCIOspgatewayAddressRule',
'Get-OCIOspgatewayInvoice', 'Get-OCIOspgatewayInvoiceLinesList',
'Get-OCIOspgatewayInvoicesList', 'Get-OCIOspgatewaySubscription',
'Get-OCIOspgatewaySubscriptionsList',
'Invoke-OCIOspgatewayAuthorizeSubscriptionPayment',
'Invoke-OCIOspgatewayDownloadPdfContent',
'Invoke-OCIOspgatewayPayInvoice',
'Invoke-OCIOspgatewayPaySubscription',
'Invoke-OCIOspgatewayVerifyAddress',
'Update-OCIOspgatewaySubscription'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ospgateway'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Set Active Sync DeviceID.ps1
|
Set Active Sync DeviceID.ps1
|
# Requires a connection to Exchange Server, or Exchange Management Shell
$s = New-PSSession -ConfigurationName Microsoft.Exchange -Name ExchMgmt -ConnectionUri http://ex14.domain.local/PowerShell/ -Authentication Kerberos
Import-PSSession $s
# Get all Client Access Server properties for all mailboxes with an ActiveSync Device Partnership
$Mailboxes = Get-CASMailbox -Filter {HasActivesyncDevicePartnership -eq $true} -ResultSize Unlimited
# Get DeviceID for all mailboxes
$EASMailboxes = $Mailboxes | Select-Object PrimarySmtpAddress,@{N='DeviceID';E={Get-ActiveSyncDeviceStatistics -Mailbox $_.Identity | Select-Object –ExpandProperty DeviceID}}
# Set the ActiveSyncAllowedDeviceIDs attribute of all Mailboxes
$EASMailboxes | foreach {Set-CASMailbox $_.PrimarySmtpAddress -ActiveSyncAllowedDeviceIDs $_.DeviceID}
|
combined_dataset/train/non-malicious/sample_27_86.ps1
|
sample_27_86.ps1
|
#
# Script module for module 'Az.Monitor' that is executed when 'Az.Monitor' is imported in a PowerShell session.
#
# Generated by: Microsoft Corporation
#
# Generated on: 05/16/2024 06:33:08
#
$PSDefaultParameterValues.Clear()
Set-StrictMode -Version Latest
function Test-DotNet
{
try
{
if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))
{
throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher."
}
}
catch [System.Management.Automation.DriveNotFoundException]
{
Write-Verbose ".NET Framework version check failed."
}
}
function Preload-Assembly {
param (
[string]
$AssemblyDirectory
)
if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore))
{
try
{
Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object {
try
{
Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null
}
catch {
Write-Verbose $_
}
}
}
catch {}
}
}
if ($true -and ($PSEdition -eq 'Desktop'))
{
if ($PSVersionTable.PSVersion -lt [Version]'5.1')
{
throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."
}
Test-DotNet
}
if ($true -and ($PSEdition -eq 'Core'))
{
if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')
{
throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."
}
}
if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
# [windows powershell] preload assemblies
# [windows powershell] preload module alc assemblies
$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies")
Preload-Assembly -AssemblyDirectory $preloadPath
if (Get-Module AzureRM.profile -ErrorAction Ignore)
{
Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
}
$module = Get-Module Az.Accounts
if ($module -ne $null -and $module.Version -lt [System.Version]"3.0.0")
{
Write-Error "This module requires Az.Accounts version 3.0.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop
}
elseif ($module -eq $null)
{
Import-Module Az.Accounts -MinimumVersion 3.0.0 -Scope Global
}
Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Monitor.dll)
if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
$FilteredCommands = @('Add-AzMetricAlertRule:ResourceGroupName','Add-AzMetricAlertRuleV2:ResourceGroupName','Add-AzWebtestAlertRule:ResourceGroupName')
if ($Env:ACC_CLOUD -eq $null)
{
$FilteredCommands | ForEach-Object {
$existingDefault = $false
foreach ($key in $global:PSDefaultParameterValues.Keys)
{
if ($_ -like "$key")
{
$existingDefault = $true
}
}
if (!$existingDefault)
{
$global:PSDefaultParameterValues.Add($_,
{
if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)
{
$context = Get-AzureRmContext
}
else
{
$context = Get-AzContext
}
if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {
$context.ExtendedProperties["Default Resource Group"]
}
})
}
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDergKc+BPP5qU2
# mqHyT6pYxYhWNfseLmEeyEMZFAOHyaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOhkUh0MSjyiEzO8bpMW0PZV
# qTDtk1BFQpoc9m0hIYvWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAT7d5mLMMW3khn7KF+c+Gak0ySZtox/l/ME1u31FL0CHJVG2Ii19af91/
# POgLasXLwihEnQFxqwqci3ABybABEa298p2CaGESBWkCfOOmE11MY9/tFXFQWaDP
# 8xaPSFuNPJau9Ue3Wyylep9J1GsCGIilm8XqNOD0YSAdaH7Sr1PSGsRMmKPRm66L
# n739kz1QWuBtYZNDsO/L4i5OJz6MjgAVjVw+/FUPU4VqrY9IgsTWlSClcYVIZf7D
# IgLAR9D5F1Fxmm613PeNyjUlkT9xYtXZWbclFabvV/GFeMv+idq6/NSqCdesiXs6
# EJtX2bZfpVH0j0einqd8M/WZE9VfS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAKKK0pF3BKzgLx9gd5eUDyxHOt4E7UYGiXaQgW22g7HgIGZjOTMI/+
# GBMyMDI0MDUxNjA2NDIxNS40MDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/dJTAiGA8yMDI0MDUxNjAxMTcy
# NVoYDzIwMjQwNTE3MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp790l
# AgEAMAoCAQACAiY8AgH/MAcCAQACAhN/MAoCBQDp8S6lAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAEhVGnVlLQhp31Br8gQI4FrzQ3vgx9Hz7GvwwXnR7GaG
# Ut443VjhqROBrxMxQAcaG7FEj9Ec75+06i7qsIn29zx09CxxDDhDGN2gDPFciLsE
# BiuURZx2G5F9uUGFDLtMdH7wD0O9iNBOy4u6pEX8Ip1IkkkmbgAGeDW66AJ2vhiv
# tKEdEy5eaL8estsNjCQ3L6A3hKgxoH2kApXhBX/zLQPT6H3lzouSfxjm3v3SXXHf
# iXrIxLwskfDd6kHcAiEHUrdKpYIpKCrcG9rtprvYW65JqkZaE/mtxtCTO1jsw2op
# 4gX0JsxTp0cnXjpgIHfNXUkclqhWpMH25ciLVUZGQFcxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB
# 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDj/HdlpFyl77r1LlS/uh1JuQalAMhySZWIWFEZvc08
# 2zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh
# 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgIbP0ZWY+r31SEk/v7RUAyrZJ
# M1k6l1N9wsbSPOKyaUMwDQYJKoZIhvcNAQELBQAEggIArF6MYMKI9LW0qfyjHdYQ
# 1IQtgXJDzlyr9e7ow+LcWNQFBsnjZdnEZKd82jVOUkLwcboUTBohPAgSH6NbcGka
# Pb1535v4AyE7aZBRt/fSq//7UPVAGnhqwhYx0XP65gXmowxcGYHSeCBIi63swc1f
# Z2rQw04RHdMQF9nFQ24b2ITgFrpxBMgp+HL0bACQ818Fnth5+id9/cQ6BIjHxhMq
# +yrtmyDxIcw1Nb1k/leZnj4xjY2z+yjEYHG1o3z6CxQSlcVTxYWAUjgJsFZRLJue
# 6aLGSg7q9xNonpLmON+aBr+sPJzZtbuhoOG4d7gIpM1rAFHXt/vF6ocKUmYV2HA1
# gYV6kv6EiEmrywDbkWy9ipIEpMw3EV7S0P/PY2HkzU4bjbSGlQ3hBg7+18M264tm
# ah94LOzLH1qzI5MZ7cezvglvh1oNj3hvaHchxgIaZbpqIjocmFisRnaSAw+NSV5Q
# km6/JjTK+VGIN14yS2jOVRTCd/PtmxQbFIKK7WhYgCpg6YKtO4jsDssnNlO4JB+c
# B3I6vh1t+Zgk/vYqslshzZTqphYj6jZL3AAeEUWCOhJbepFRIGBgzsGCyz0+rV1z
# T19/5jBAB6QD/aBEZ9uUml9KThJ1CL9WMZ/9q+b2Nq/zF6la8aI6zUQtuHlM0r+R
# qaAzInGSpkK91bGMDvhE9jM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Upgrade VM's to v7.ps1
|
Upgrade VM's to v7.ps1
|
Function PowerOn-VM($vm){
Start-VM -VM $vm -Confirm:$false -RunAsync | Out-Null
do {
$vmview = get-VM $vm | Get-View
$status = $vmview.Guest.ToolsStatus
Write-Host $vm is starting! -ForegroundColor Yellow
sleep 5
}until(($status -match "toolsOld") -or ($status -match "toolsOk"))
if ($status -match "Ok"){
$Startup = "Ok"}
elseif($status -match "toolsOld"){
$Startup = "ToolsOld"}
else{
$Startup = "Not Ready"}
return $Startup
}
Function PowerOff-VM($vm){
sleep 20
Shutdown-VMGuest -VM $vm -Confirm:$false | Out-Null
do {
$vmview = Get-VM $vm | Get-View
$status = $vmview.Guest.ToolsStatus
Write-Host $vm is stopping! -ForegroundColor Yellow
sleep 5
}until($status -match "toolsNotRunning")
if ($status -match "toolsNotRunning"){
$Shutdown = "Ok"}
else{
$Shutdown = "Not Ready"}
return $Shutdown
}
Function Check-ToolsStatus($vm){
$vmview = get-VM $vm | Get-View
$status = $vmview.Guest.ToolsStatus
if ($status -match "toolsOld"){
$vmTools = "Old"}
elseif($status -match "toolsNotRunning"){
$vmTools = "Not Running"}
else{
$vmTools = "Ok"}
return $vmTools
}
Function Check-VMHardwareVersion($vm){
$vmView = get-VM $vm | Get-View
$vmVersion = $vmView.Config.Version
$v4 = "vmx-04"
$v7 = "vmx-07"
if ($vmVersion -eq $v4){
$vmHardware = "Old"}
elseif($vmVersion -eq $v7){
$vmHardware = "Ok"}
else{Write-Host "Error!!" -ForegroundColor Red
$vmHardware = "Error"}
return $vmHardware
}
Function Upgrade-VMHardware($vm){
$vmview = Get-VM $vm | Get-View
$vmVersion = $vmView.Config.Version
$v4 = "vmx-04"
$v7 = "vmx-07"
if ($vmVersion -eq $v4){
Write-Host "Version 4 detected" -ForegroundColor Red
# Update Hardware
Write-Host "Upgrading Hardware on" $vm -ForegroundColor Yellow
Get-View ($vmView.UpgradeVM_Task($v7)) | Out-Null
}
}
Function CreateBeforeList{
Write-Host "Creating a CSV File with VM info" -ForegroundColor Yellow
$MyCol = @()
ForEach ($vm in Get-Folder $Folder | Get-VM )
{
$vmview = get-VM $vm | Get-View
$myObj = "" | Select Host, VMName, PowerState, IPAddress, MacAddress, Nics, VMToolsVersion, VMToolsStatus, VMToolsRunningStatus
$myObj.Host = $VM.Host.Name
$myObj.VMName = $VM.Name
$myObj.PowerState = $VM.PowerState
$myObj.IPAddress = [String]($vmview.Guest.Net| ForEach {$_.IpAddress})
$myObj.MacAddress = [String]($vmview.Guest.Net | ForEach {$_.MacAddress})
$myObj.Nics = $vmview.Guest.Net.Count
$myObj.VMToolsVersion = $vmview.Config.Tools.ToolsVersion
$myObj.VMToolsStatus = $vmview.Guest.ToolsStatus
$myObj.VMToolsRunningStatus = $vmview.Guest.ToolsRunningStatus
$myCol += $myObj
}
$myCol | Export-Csv C:\\beforeHWchange.csv -NoTypeInformation
}
Function CreateAfterList{
Write-Host "Creating a CSV and an Excel File with VM info" -ForegroundColor Yellow
$xlCSV = 6
$xlXLS = 56
$csvfile = "C:\\afterHWchange.csv"
$xlsfile = "C:\\afterHWchange.xls"
$Excel = New-Object -ComObject Excel.Application
$Excel.visible = $True
$Excel = $Excel.Workbooks.Add()
$Sheet = $Excel.Worksheets.Item(1)
$Sheet.Cells.Item(1,1) = "VMName"
$Sheet.Cells.Item(1,2) = "IPAddress"
$Sheet.Cells.Item(1,3) = "Settings"
$intRow = 2
$WorkBook = $Sheet.UsedRange
$WorkBook.Interior.ColorIndex = 19
$WorkBook.Font.ColorIndex = 11
$WorkBook.Font.Bold = $True
$import = Import-Csv "C:\\beforeHWchange.csv"
$vms = Get-Folder $Folder | Get-VM
foreach($vm in $vms){
$vmview = $vm | Get-View
foreach($item in $import){
$oldIp = $item.IPAddress
$newIP = $vm.Guest.IPAddress
if($item.VMName -eq $vm){
if($oldIp -eq $newIP){
$Sheet.Cells.Item($intRow, 1) = [String]$vmview.Name
$Sheet.Cells.Item($intRow, 2) = [String]$vm.Guest.IPAddress
$Sheet.Cells.Item($intRow, 3) = "Good"
$Sheet.Cells.Item($intRow, 3).Interior.ColorIndex = 4
}
else{
$Sheet.Cells.Item($intRow, 1) = [String]$vmview.Name
$Sheet.Cells.Item($intRow, 2) = [String]$vm.Guest.IPAddress
$Sheet.Cells.Item($intRow, 3) = "Wrong"
$Sheet.Cells.Item($intRow, 3).Interior.ColorIndex = 3
}
}
}
$intRow = $intRow + 1}
$WorkBook.EntireColumn.AutoFit()
sleep 5
$Sheet.SaveAs($xlsfile,$xlXLS)
$Sheet.SaveAs($csvfile,$xlCSV)
}
$vCenter = Read-Host "Enter your vCenter servername"
$Folder = Read-Host "Enter the name of the folder where the VMs are stored"
Connect-VIServer $vCenter
$vms = Get-Folder $Folder | Get-VM | Get-View | Where-Object {-not $_.config.template -and $_.Config.Version -eq "vmx-04" } | Select Name
CreateBeforeList
foreach($item in $vms){
$vm = $item.Name
$vmHardware = Check-VMHardwareVersion $vm
$vmToolsStatus = Check-ToolsStatus $vm
Write-Host "Hardware is old on:" $vm -ForegroundColor Red
if($vmToolsStatus -eq "Old"){
Write-Host "The VMware Tools are old on:" $vm -ForegroundColor Red
Sleep 20
Get-VMGuest $vm | Update-Tools
Sleep 120
Write-Host "VMware Tools are installed on:" $vm -ForegroundColor Cyan
$vmToolsStatus = Check-ToolsStatus $vm
if($vmToolsStatus -eq "Ok"){
$PowerOffVM = PowerOff-VM $vm
if($PowerOffVM -eq "Ok"){
Write-Host $vm "is down" -ForegroundColor Yellow
Upgrade-VMHardware $vm
PowerOn-VM $vm
Write-Host $vm "is up to date" -ForegroundColor Green
}
}
}
else{
$PowerOffVM = PowerOff-VM $vm
if($PowerOffVM -eq "Ok"){
Upgrade-VMHardware $vm
PowerOn-VM $vm
Write-Host $vm "is up to date" -ForegroundColor Green
}
}
}
Sleep 40
CreateAfterList
Disconnect-VIServer -Confirm:$false
|
combined_dataset/train/non-malicious/sample_65_14.ps1
|
sample_65_14.ps1
|
#=======================================================================================================================================================================
# Copyright (c) Microsoft Corporation. All rights reserved.
#
# Description:
# UnzipAndCopyMDS.ps1
# Kill all running Monitoring processes and unzip Monitoring files during install.
#=======================================================================================================================================================================
param (
[Parameter(Mandatory=$true)]
[string]$ZipFilePath,
[string]$DestinationFolder
)
Add-Type -AssemblyName System.IO.Compression.FileSystem
function Unzip
{
param([string]$zipfile, [string]$outpath)
Write-Output ">>>>Unzipping file '$zipfile' to folder '$outpath'"
[System.IO.Compression.ZipFile]::ExtractToDirectory($zipfile, $outpath)
}
# Execution of the script begins here:
$Error.Clear()
$timestamp = Get-Date -UFormat "%Y%m%d-%H%M%S"
$transcriptPath = Join-Path $env:TEMP "StorageSyncAgent-UnzipAndCopyMDS-$timestamp.log"
Start-Transcript -Path $transcriptPath
try
{
# Killing MonAgentLauncher.exe terminates all child MA processes.
$targetProcessName = "MonAgentLauncher"
$processes = Get-Process -Name $targetProcessName -ErrorAction SilentlyContinue
if ($processes)
{
foreach ($process in $processes)
{
$executablePath = $process.MainModule.FileName
Write-Output "Found process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath"
$installDir = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\Agent").InstallDir
if ($executablePath.IndexOf($installDir, [StringComparison]::InvariantCultureIgnoreCase) -ge 0) # Confirm that the process belongs to us i.e is installed in our Agent directory
{
Write-Output "Terminating process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath"
Stop-Process -Id $process.Id -Force
}
}
}
else
{
Write-Output "No processes named '$targetProcessName.exe' found."
}
}
catch
{
Write-Output "Exception occured while attempting to kill Monitoring Agent processes: $_"
Write-Output "Ignoring failures while killing Monitoring Agent processes and proceeding with the script"
}
$Error.Clear()
$attempt = 0
$numAttempts = 5
do
{
$attempt++
if ($attempt -gt 1)
{
Start-Sleep -Seconds 1
}
try
{
Unzip $ZipFilePath $DestinationFolder
$Error.Clear()
break;
}
catch
{
Write-Error $_.Exception.InnerException.Message -ErrorAction Continue
}
}
while ($attempt -le $numAttempts)
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCnPxDxbVrsTmb6
# EzGenlIsvcThar5JK5SanoBRvrFNB6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMvhJDNeAlZ42NgbF/5zpEaU
# HtHu0AbjOXW8jTs4fFzrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAiEaqWEvriOI5zhlfbitQWBGtK3QWEmyMUTEZ84GL5qox4qVbyfuWU/f0
# wVzeG7fqL2daDERfY94dhvXAEqS36oouTOtPGaym4uEO9wQcI+HIRNxn55iPbRmR
# O+826eZRnFkph7SLRisDeYy3NUO8/CNVF1AVO0mS3TxNALudqCkcfjeQ26YUZgqT
# frJTjm9u3yXTK6j6hzhhSwprKYKnegXsPilptVzH2XnpaMdmEFKctD6ycqo2TDTZ
# O08AbVr6DkmLpZirU86jdJo3Vkk0ayYvTd1CyQzLz9WR/+3kkrQo7Oc9omSzRlOu
# nNwazr1IBjO9w44K63ndQsfZdjQvL6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCQr8F6oiWK2C8FPtpxJIgzh3YiD6bshaFsGCWPiiOU+QIGZpWBKSVY
# GBMyMDI0MDgxNDA3NTExMC44ODhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6mY4xjAiGA8yMDI0MDgxMzE5NTU1
# MFoYDzIwMjQwODE0MTk1NTUwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqZjjG
# AgEAMAoCAQACAh6BAgH/MAcCAQACAhOEMAoCBQDqZ4pGAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAHisVUkZU7awgmH+i9eJfc8ScYxw4eVgRpQSkLlAJ3Rs
# zyuoDN1XSdkVhHWRvlhrjZOVwjCWTwlKxEDBS0+BK8DoPksvtOu/j0t8HEN4d1Fb
# flhC1+09vzxMWIvPEVF6CXAkaYEcYlK8TnOgSiU43pZ1MdhsygiMV+vdT8sTb+05
# aROafa3WvFaNl5i400KjAqfLXpXT6+B9Iceul4wo8t222S+DGsUYxE4PV10cuVa3
# RXEYFHpEmzr2QLH5mNnJb4UZ8uU20DchXv3iFTi+XD6GozYdebNoCI6Sbm0RTIjP
# 7jVSb5m8VVbqUY0uMl17h7NdE668WLj/7Ku7eZFC0yYxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB
# 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCA5JDhyfmGXripQILxDILqNx4J8kh69hTesi0a8omnB
# lTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db
# cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgZ5kayXaTUHk8zkL97k0h4q4O
# geys6iAk6wRXa5rjRYEwDQYJKoZIhvcNAQELBQAEggIAWnYeD026fKAKUQFoJZif
# 0fhAl7ndXkv61pshZjIfazzj//J/c2r1nSgwKhZiC1PR65OozXDQr7H9vstfbU7+
# d8QFNXrVQ/2MXpq6dtedeTnOevNelNgbN3Az2tyfDVbPOnwOvJY1ds1oApth9P26
# o7q1g9rq4Wo2v7X/vWsDvfWJrIehRhazNp9poB1eUUFSogtT3izVcRt7OxD3G5Ax
# 9EzNBGcI14Q7LLgGFAG4uezSEvNBx2KgRr4UaA1wdROT+xvEWDninoUXvsyv3Tpu
# R6fdm8amsdZdUtrqsueZ0rF/SeSwDxRfoUT1rTBhQ4dhvPR28op9MN39rPf08qLL
# rKROkaHQoQhscT4K2881vghftlbRg68sqSn48OaeQReof1yK6btaHapdACHBnZmJ
# /oAmh9kSzNwbjq1BDsauA6+auJI5/ZAXeM4bUsFPXKMULNWc/kE/zW32Jv9knBxn
# 2LvKlfIRL1i2kqFeq5imU3Qqbyr+ck4PbPGuDCQqqTfqPn3yCK95nIAcHMUGKt77
# Slgpw3ruv/N+pUkDmyl+dubKf6+cuGa2UkFgSBzyLHhu0QOEgbFTLLLpyhehh1Wf
# EqZ0RVBM+VjfFwC7SzOFyll1A57EeszyHfdlYaq9vdgI/Nju+BHzZspj2epRNLe5
# e4TVrynnhuQBbzLf6s/h1iU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Select-TextOutput.ps1
|
Select-TextOutput.ps1
|
##############################################################################\n##\n## Select-TextOutput\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nSearches the textual output of a command for a pattern.\n\n.EXAMPLE\n\nGet-Service | Select-TextOutput audio\nFinds all references to "Audio" in the output of Get-Service\n\n#>\n\nparam(\n ## The pattern to search for\n $Pattern\n)\n\nSet-StrictMode -Version Latest\n$input | Out-String -Stream | Select-String $pattern
|
combined_dataset/train/non-malicious/sample_40_37.ps1
|
sample_40_37.ps1
|
@{
RootModule = 'PSModule.psm1'
ModuleVersion = '2.2.5'
GUID = '1d73a601-4a6c-43c5-ba3f-619b18bbb404'
Author = 'Microsoft Corporation'
CompanyName = 'Microsoft Corporation'
Copyright = '(c) Microsoft Corporation. All rights reserved.'
Description = 'PowerShell module with commands for discovering, installing, updating and publishing the PowerShell artifacts like Modules, DSC Resources, Role Capabilities and Scripts.'
PowerShellVersion = '3.0'
FormatsToProcess = 'PSGet.Format.ps1xml'
FunctionsToExport = @(
'Find-Command',
'Find-DSCResource',
'Find-Module',
'Find-RoleCapability',
'Find-Script',
'Get-CredsFromCredentialProvider',
'Get-InstalledModule',
'Get-InstalledScript',
'Get-PSRepository',
'Install-Module',
'Install-Script',
'New-ScriptFileInfo',
'Publish-Module',
'Publish-Script',
'Register-PSRepository',
'Save-Module',
'Save-Script',
'Set-PSRepository',
'Test-ScriptFileInfo',
'Uninstall-Module',
'Uninstall-Script',
'Unregister-PSRepository',
'Update-Module',
'Update-ModuleManifest',
'Update-Script',
'Update-ScriptFileInfo')
VariablesToExport = 'PSGetPath'
AliasesToExport = @('inmo', 'fimo', 'upmo', 'pumo')
FileList = @('PSModule.psm1',
'PSGet.Format.ps1xml',
'PSGet.Resource.psd1')
RequiredModules = @(@{ModuleName = 'PackageManagement'; ModuleVersion = '1.4.4' })
PrivateData = @{
"PackageManagementProviders" = 'PSModule.psm1'
"SupportedPowerShellGetFormatVersions" = @('1.x', '2.x')
PSData = @{
Tags = @('Packagemanagement',
'Provider',
'PSEdition_Desktop',
'PSEdition_Core',
'Linux',
'Mac')
ProjectUri = 'https://go.microsoft.com/fwlink/?LinkId=828955'
LicenseUri = 'https://go.microsoft.com/fwlink/?LinkId=829061'
ReleaseNotes = @'
### 2.2.5
- Security patch for code injection bug
### 2.2.4.1
- Remove catalog file
### 2.2.3
- Update `HelpInfoUri` to point to the latest content (#560)
- Improve discovery of usable nuget.exe binary (Thanks bwright86!) (#558)
### 2.2.2
Bug Fix
- Update casing of DscResources output
### 2.2.1
Bug Fix
- Allow DscResources to work on case sensitive platforms (#521)
- Fix for failure to return credential provider when using private feeds (#521)
## 2.2
Bug Fix
- Fix for prompting for credentials when passing in -Credential parameter when using Register-PSRepository
## 2.1.5
New Features
- Add and remove nuget based repositories as a nuget source when nuget client tool is installed (#498)
Bug Fix
- Fix for 'Failed to publish module' error thrown when publishing modules (#497)
## 2.1.4
- Fixed hang while publishing some packages (#478)
## 2.1.3
New Features
- Added -Scope parameter to Update-Module (Thanks @lwajswaj!) (#471)
- Added -Exclude parameter to Publish-Module (Thanks @Benny1007!) (#191)
- Added -SkipAutomaticTags parameter to Publish-Module (Thanks @awickham10!) (#452)
Bug Fix
- Fixed issue with finding modules using macOS and .NET Core 3.0
## 2.1.2
New Feature
- Added support for registering repositories with special characters
## 2.1.1
- Fix DSC resource folder structure
## 2.1.0
Breaking Change
- Default installation scope for Update-Module and Update-Script has changed to match Install-Module and Install-Script. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times.
For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser. (#421)
Bug Fixes
- Update-ModuleManifest no longer clears FunctionsToExport, AliasesToExport, nor NestModules (#415 & #425) (Thanks @pougetat and @tnieto88!)
- Update-Module no longer changes repository URL (#407)
- Update-ModuleManifest no longer preprends 'PSGet_' to module name (#403) (Thanks @ThePoShWolf)
- Update-ModuleManifest now throws error and fails to update when provided invalid entries (#398) (Thanks @pougetat!)
- Ignore files no longer being included when uploading modules (#396)
New Features
- New DSC resource, PSRepository (#426) (Thanks @johlju!)
- Piping of PS respositories (#420)
- utf8 support for .nuspec (#419)
## 2.0.4
Bug Fix
* Remove PSGallery availability checks (#374)
## 2.0.3
Bug fixes and Improvements
* Fix CommandAlreadyAvailable error for PackageManagement module (#333)
* Remove trailing whitespace when value is not provided for Get-PSScriptInfoString (#337) (Thanks @thomasrayner)
* Expanded aliases for improved readability (#338) (Thanks @lazywinadmin)
* Improvements for Catalog tests (#343)
* Fix Update-ScriptInfoFile to preserve PrivateData (#346) (Thanks @tnieto88)
* Import modules with many commands faster (#351)
New Features
* Tab completion for -Repository parameter (#339) and for Publish-Module -Name (#359) (Thanks @matt9ucci)
## 2.0.1
Bug fixes
- Resolved Publish-Module doesn't report error but fails to publish module (#316)
- Resolved CommandAlreadyAvailable error while installing the latest version of PackageManagement module (#333)
## 2.0.0
Breaking Change
- Default installation scope for Install-Module, Install-Script, and Install-Package has changed. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times.
For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser.
## 1.6.7
Bug fixes
- Resolved Install/Save-Module error in PSCore 6.1.0-preview.4 on Ubuntu 18.04 OS (WSL/Azure) (#313)
- Updated error message in Save-Module cmdlet when the specified path is not accessible (#313)
- Added few additional verbose messages (#313)
## 1.6.6
Dependency Updates
* Add dependency on version 4.1.0 or newer of NuGet.exe
* Update NuGet.exe bootstrap URL to https://aka.ms/psget-nugetexe
Build and Code Cleanup Improvements
* Improved error handling in network connectivity tests.
Bug fixes
- Change Update-ModuleManifest so that prefix is not added to CmdletsToExport.
- Change Update-ModuleManifest so that parameters will not reset to default values.
- Specify AllowPrereleseVersions provider option only when AllowPrerelease is specified on the PowerShellGet cmdlets.
## 1.6.5
New features
* Allow Pester/PSReadline installation when signed by non-Microsoft certificate (#258)
- Whitelist installation of non-Microsoft signed Pester and PSReadline over Microsoft signed Pester and PSReadline.
Build and Code Cleanup Improvements
* Splitting of functions (#229) (Thanks @Benny1007)
- Moves private functions into respective private folder.
- Moves public functions as defined in PSModule.psd1 into respective public folder.
- Removes all functions from PSModule.psm1 file.
- Dot sources the functions from PSModule.psm1 file.
- Uses Export-ModuleMember to export the public functions from PSModule.psm1 file.
* Add build step to construct a single .psm1 file (#242) (Thanks @Benny1007)
- Merged public and private functions into one .psm1 file to increase load time performance.
Bug fixes
- Fix null parameter error caused by MinimumVersion in Publish-PackageUtility (#201)
- Change .ExternalHelp link from PSGet.psm1-help.xml to PSModule-help.xml in PSModule.psm1 file (#215)
- Change Publish-* to allow version comparison instead of string comparison (#219)
- Ensure Get-InstalledScript -RequiredVersion works when versions have a leading 0 (#260)
- Add positional path to Save-Module and Save-Script (#264, #266)
- Ensure that Get-AuthenticodePublisher verifies publisher and that installing or updating a module checks for approprite catalog signature (#272)
- Update HelpInfoURI to 'http://go.microsoft.com/fwlink/?linkid=855963' (#274)
## 1.6.0
New features
* Prerelease Version Support (#185)
- Implemented prerelease versions functionality in PowerShellGet cmdlets.
- Enables publishing, discovering, and installing the prerelease versions of modules and scripts from the PowerShell Gallery.
- [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/PrereleaseModule)
* Enabled publish cmdlets on PWSH and Nano Server (#196)
- Dotnet command version 2.0.0 or newer should be installed by the user prior to using the publish cmdlets on PWSH and Windows Nano Server.
- Users can install the dotnet command by following the instructions specified at https://aka.ms/dotnet-install-script.
- On Windows, users can install the dotnet command by running *Invoke-WebRequest -Uri 'https://dot.net/v1/dotnet-install.ps1' -OutFile '.\dotnet-install.ps1'; & '.\dotnet-install.ps1' -Channel Current -Version '2.0.0'*
- Publish cmdlets on Windows PowerShell supports using the dotnet command for publishing operations.
Breaking Change
- PWSH: Changed the installation location of AllUsers scope to the parent of $PSHOME instead of $PSHOME. It is the SHARED_MODULES folder on PWSH.
Bug fixes
- Update HelpInfoURI to 'https://go.microsoft.com/fwlink/?linkid=855963' (#195)
- Ensure MyDocumentsPSPath path is correct (#179) (Thanks @lwsrbrts)
## 1.5.0.0
New features
* Added support for modules requiring license acceptance (#150)
- [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/RequireLicenseAcceptance)
* Added version for REQUIREDSCRIPTS (#162)
- Enabled following scenarios for REQUIREDSCRIPTS
- [1.0] - RequiredVersion
- [1.0,2.0] - Min and Max Version
- (,1.0] - Max Version
- 1.0 - Min Version
Bug fixes
* Fixed empty version value in nuspec (#157)
## 1.1.3.2
* Disabled PowerShellGet Telemetry on PS Core as PowerShell Telemetry APIs got removed in PowerShell Core beta builds. (#153)
* Fixed for DateTime format serialization issue. (#141)
* Update-ModuleManifest should add ExternalModuleDependencies value as a collection. (#129)
## 1.1.3.1
New features
* Added `PrivateData` field to ScriptFileInfo. (#119)
Bug fixes
## 1.1.2.0
Bug fixes
## 1.1.1.0
Bug fixes
## 1.1.0.0
* Initial release from GitHub.
* PowerShellCore support.
## For full history of release notes see changelog:
https://github.com/PowerShell/PowerShellGet/blob/master/CHANGELOG.md
'@
}
}
HelpInfoURI = 'http://go.microsoft.com/fwlink/?linkid=2113539'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCRNShWem0qs5De
# OoNTMpUMZmnlgRrJHCT4bl+44h9Jy6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN08RC17KKEUhfMSj3scTYcg
# x1d7sFH+JkR037Tslb3+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAbcxqITK5v1Ot2pnljbqyQCO2WlIMS4WojH/TYVqDWsg9xWhj7mOsCjEW
# F28L7N8RC32euTTft3Ucnvf02t+DSCc8TbuJMGZM0T6qSTh0Kkg76AC8k0jprbfV
# nupgErySLUIyCfeNfyPE1Bm5PA4yMohBBl4d0KkAXrTNA7gdtjS9sI3u2DxHCiR5
# 87hL2m8hWTRh1apZz9OvehGLtIpjq15HE0W/4RVx8YPUblTcHq32Z9J2973d+4eB
# IEJFa2YbeO37hF0htreZ+y+QtdXDPr2qALjKNLNmKQSORzkRg/0eERW9H1ZAcqHZ
# nDEawRWYVc8CA5srPfAUF8MCZPDBhaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBmLpPXZd9q8vtvKs7ublRpx4IDJUKdyqAz+80RAaUQDwIGZdYG2R2I
# GBMyMDI0MDIyNjAzMDQwOC4zODlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGc08wIhgPMjAyNDAyMjYxMDE3NTFaGA8yMDI0MDIyNzEwMTc1MVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZzTwIBADAHAgEAAgIZYDAHAgEAAgIR3DAKAgUA
# 6YfEzwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHDEIjghGzYaGDbtF3vI
# cHmzY3Gy1BXTRCVb51kPta30B5L2LVT8gT3smO5EYlUCKSHZAkpmzWSjw/pJGu/z
# wFMQjx5nEQGdIZ0y+753iTrtMXJ76LBuiHldvmjcg/q/ZOu5d9UHX96QBgZzgepY
# K3h7NFMX/10Zzc9Of/2KL4qJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgykw55JTv3zC2j434QfQuEkVJRa3Ac6I5U4OULs4RTNAwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEIPokA7jEYMcKLyr8MC0LdMM2hjE55wuYZR4jOpJchD/u
# MA0GCSqGSIb3DQEBCwUABIICADbeUGpaO3FFY6AJm7JiZHlQNII939ztVT2Ui+0h
# zrYwceT/8frU53SyYS/rmZVtkyFQOAs6moWlhxP89KHoHdyn8/mWmbA9Al2vdMWH
# HCgGMJlRyJIGr995taOOz+AiaBR1CbFT+62jkmsO6i3saTbvVEpzqF0q+vfaBk+l
# eJY97JqXh3s8ByzWdHLf2I63iwKxfLlDyimMAHpRBPpq1eUW6qmka2EFZM08ke9b
# nonXowGqEdqGESLKt0g/EB42QFP8H9+5+O2kDxSM4jA/DC/2FhP3axkh0EiM1zjC
# bJKLCY2RmEdSIUismkxgvG/bR79XHfDNhSKolElvssbpZwjsqanK7j23qt3yc2Ef
# SFGSLEF0DMCSVoK8HEdK0onHuoVA+z6z8Ze7NQsG5JRCACT/U4HHFvuYK4MoW8pf
# 89HRVlyt0p2CtrFA2N5a1ZgbVJEhqZ+ztVPQDgLku7Wsr1gilHqp3MXYPFagnGBY
# VASUPiiXj3e/0peAkcic4MNN0mhMCpbxWGjkdDiWxZUstI5sVuR3/2YvNvoQzWQU
# M4bAMvtKyVUf9cy8mf4Xo4+SJVCbKQeMxcFeY5H3aS8gUCOsWpp2z09tgFhb21Op
# t67FtDPPogTAidK+T4sINKUQDzxeWs9o9D4tgr5r/uCEMf141PepkZ6Y0SKf9/yC
# XAV5
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_66_72.ps1
|
sample_66_72.ps1
|
#
# Module manifest for module 'OCI.PSModules.Osmanagementhub'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osmanagementhub.dll'
# Version number of this module.
ModuleVersion = '86.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '114fe920-9645-46a9-9e65-26c95a3d3613'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osmanagementhub Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagementhub.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIOsmanagementhubPackagesToSoftwareSource',
'Disable-OCIOsmanagementhubModuleStreamOnManagedInstance',
'Disable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup',
'DisMount-OCIOsmanagementhubManagedInstancesFromLifecycleStage',
'DisMount-OCIOsmanagementhubManagedInstancesFromManagedInstanceGroup',
'DisMount-OCIOsmanagementhubProfileFromManagedInstance',
'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstance',
'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstanceGroup',
'Enable-OCIOsmanagementhubModuleStreamOnManagedInstance',
'Enable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup',
'Get-OCIOsmanagementhubAllSoftwarePackagesList',
'Get-OCIOsmanagementhubEntitlementsList',
'Get-OCIOsmanagementhubErrataList', 'Get-OCIOsmanagementhubErratum',
'Get-OCIOsmanagementhubEvent', 'Get-OCIOsmanagementhubEventContent',
'Get-OCIOsmanagementhubEventsList',
'Get-OCIOsmanagementhubLifecycleEnvironment',
'Get-OCIOsmanagementhubLifecycleEnvironmentsList',
'Get-OCIOsmanagementhubLifecycleStage',
'Get-OCIOsmanagementhubLifecycleStageInstalledPackagesList',
'Get-OCIOsmanagementhubLifecycleStagesList',
'Get-OCIOsmanagementhubManagedInstance',
'Get-OCIOsmanagementhubManagedInstanceAnalyticContent',
'Get-OCIOsmanagementhubManagedInstanceAvailablePackagesList',
'Get-OCIOsmanagementhubManagedInstanceAvailableSoftwareSourcesList',
'Get-OCIOsmanagementhubManagedInstanceAvailableWindowsUpdatesList',
'Get-OCIOsmanagementhubManagedInstanceContent',
'Get-OCIOsmanagementhubManagedInstanceErrataList',
'Get-OCIOsmanagementhubManagedInstanceGroup',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailableModulesList',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailablePackagesList',
'Get-OCIOsmanagementhubManagedInstanceGroupAvailableSoftwareSourcesList',
'Get-OCIOsmanagementhubManagedInstanceGroupInstalledPackagesList',
'Get-OCIOsmanagementhubManagedInstanceGroupModulesList',
'Get-OCIOsmanagementhubManagedInstanceGroupsList',
'Get-OCIOsmanagementhubManagedInstanceInstalledPackagesList',
'Get-OCIOsmanagementhubManagedInstanceInstalledWindowsUpdatesList',
'Get-OCIOsmanagementhubManagedInstanceModulesList',
'Get-OCIOsmanagementhubManagedInstancesList',
'Get-OCIOsmanagementhubManagedInstanceUpdatablePackagesList',
'Get-OCIOsmanagementhubManagementStation',
'Get-OCIOsmanagementhubManagementStationsList',
'Get-OCIOsmanagementhubMirrorsList',
'Get-OCIOsmanagementhubModuleStream',
'Get-OCIOsmanagementhubModuleStreamProfile',
'Get-OCIOsmanagementhubModuleStreamProfilesList',
'Get-OCIOsmanagementhubModuleStreamsList',
'Get-OCIOsmanagementhubPackageGroup',
'Get-OCIOsmanagementhubPackageGroupsList',
'Get-OCIOsmanagementhubProfile',
'Get-OCIOsmanagementhubProfilesList',
'Get-OCIOsmanagementhubScheduledJob',
'Get-OCIOsmanagementhubScheduledJobsList',
'Get-OCIOsmanagementhubSoftwarePackage',
'Get-OCIOsmanagementhubSoftwarePackageByName',
'Get-OCIOsmanagementhubSoftwarePackagesList',
'Get-OCIOsmanagementhubSoftwarePackageSoftwareSourcesList',
'Get-OCIOsmanagementhubSoftwareSource',
'Get-OCIOsmanagementhubSoftwareSourcesList',
'Get-OCIOsmanagementhubSoftwareSourceVendorsList',
'Get-OCIOsmanagementhubWindowsUpdate',
'Get-OCIOsmanagementhubWindowsUpdatesList',
'Get-OCIOsmanagementhubWorkRequest',
'Get-OCIOsmanagementhubWorkRequestErrorsList',
'Get-OCIOsmanagementhubWorkRequestLogsList',
'Get-OCIOsmanagementhubWorkRequestsList',
'Import-OCIOsmanagementhubEventContent',
'Invoke-OCIOsmanagementhubInstallAllWindowsUpdatesOnManagedInstancesInCompartment',
'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstance',
'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstance',
'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubPromoteSoftwareSourceToLifecycleStage',
'Invoke-OCIOsmanagementhubRefreshManagementStationConfig',
'Invoke-OCIOsmanagementhubRefreshSoftwareOnManagedInstance',
'Invoke-OCIOsmanagementhubRunScheduledJobNow',
'Invoke-OCIOsmanagementhubSearchSoftwareSourceModules',
'Invoke-OCIOsmanagementhubSearchSoftwareSourceModuleStreams',
'Invoke-OCIOsmanagementhubSearchSoftwareSourcePackageGroups',
'Invoke-OCIOsmanagementhubSummarizeManagedInstanceAnalytics',
'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstance',
'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstanceGroup',
'Invoke-OCIOsmanagementhubSynchronizeMirrors',
'Invoke-OCIOsmanagementhubSynchronizeSingleMirrors',
'Mount-OCIOsmanagementhubManagedInstancesToLifecycleStage',
'Mount-OCIOsmanagementhubManagedInstancesToManagedInstanceGroup',
'Mount-OCIOsmanagementhubProfileToManagedInstance',
'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstance',
'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstanceGroup',
'Move-OCIOsmanagementhubAvailabilityOfSoftwareSources',
'Move-OCIOsmanagementhubEventCompartment',
'Move-OCIOsmanagementhubLifecycleEnvironmentCompartment',
'Move-OCIOsmanagementhubManagedInstanceGroupCompartment',
'Move-OCIOsmanagementhubManagementStationCompartment',
'Move-OCIOsmanagementhubProfileCompartment',
'Move-OCIOsmanagementhubScheduledJobCompartment',
'Move-OCIOsmanagementhubSoftwareSourceCompartment',
'New-OCIOsmanagementhubEntitlement',
'New-OCIOsmanagementhubLifecycleEnvironment',
'New-OCIOsmanagementhubManagedInstanceGroup',
'New-OCIOsmanagementhubManagementStation',
'New-OCIOsmanagementhubProfile',
'New-OCIOsmanagementhubScheduledJob',
'New-OCIOsmanagementhubSoftwareSource',
'Remove-OCIOsmanagementhubEvent',
'Remove-OCIOsmanagementhubEventContent',
'Remove-OCIOsmanagementhubLifecycleEnvironment',
'Remove-OCIOsmanagementhubManagedInstance',
'Remove-OCIOsmanagementhubManagedInstanceGroup',
'Remove-OCIOsmanagementhubManagementStation',
'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstance',
'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstanceGroup',
'Remove-OCIOsmanagementhubPackagesFromManagedInstance',
'Remove-OCIOsmanagementhubPackagesFromManagedInstanceGroup',
'Remove-OCIOsmanagementhubProfile',
'Remove-OCIOsmanagementhubScheduledJob',
'Remove-OCIOsmanagementhubSoftwareSource',
'Update-OCIOsmanagementhubAllPackagesOnManagedInstanceGroup',
'Update-OCIOsmanagementhubAllPackagesOnManagedInstancesInCompartment',
'Update-OCIOsmanagementhubEvent',
'Update-OCIOsmanagementhubLifecycleEnvironment',
'Update-OCIOsmanagementhubManagedInstance',
'Update-OCIOsmanagementhubManagedInstanceGroup',
'Update-OCIOsmanagementhubManagementStation',
'Update-OCIOsmanagementhubPackagesOnManagedInstance',
'Update-OCIOsmanagementhubProfile',
'Update-OCIOsmanagementhubScheduledJob',
'Update-OCIOsmanagementhubSoftwareSource'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagementhub'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1214.ps1
|
1214.ps1
|
Set-StrictMode -Version 'Latest'
& (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve)
$sourceRoot = $null;
$destinationRoot = $null
function Assert-Copy
{
param(
$SourceRoot,
$DestinationRoot,
[Switch]
$Recurse
)
Get-ChildItem -Path $SourceRoot | ForEach-Object {
$destinationPath = Join-Path -Path $DestinationRoot -ChildPath $_.Name
if( $_.PSIsContainer )
{
if( $Recurse )
{
Test-Path -PathType Container -Path $destinationPath | Should -BeTrue
Assert-Copy -SourceRoot $_.FullName -DestinationRoot $destinationPath -Recurse
}
else
{
$destinationPath | Should -Not -Exist
}
return
}
else
{
Test-Path -Path $destinationPath -PathType Leaf | Should -BeTrue -Because ($_.FullName)
}
$sourceHash = Get-FileHash -Path $_.FullName | Select-Object -ExpandProperty 'Hash'
$destinationHashPath = '{0}.checksum' -f $destinationPath
Test-Path -Path $destinationHashPath -PathType Leaf | Should -BeTrue
$destinationHash = [IO.File]::ReadAllText($destinationHashPath)
$destinationHash | Should -Be $sourceHash
}
}
Describe 'Copy-DscResource' {
BeforeEach {
$Global:Error.Clear()
$script:destinationRoot = Join-Path -Path $TestDrive.FullName -ChildPath ('D.{0}' -f [IO.Path]::GetRandomFileName())
New-Item -Path $destinationRoot -ItemType 'Directory'
$script:sourceRoot = Join-Path -Path $TestDrive.FullName -ChildPath ('S.{0}' -f [IO.Path]::GetRandomFileName())
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir1\Dir3\zip.zip') -Force
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir1\zip.zip')
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir2') -ItemType 'Directory'
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'zip.zip')
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'mov.mof')
New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'msi.msi')
}
It 'should copy files' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot
$result | Should -BeNullOrEmpty
Assert-Copy $sourceRoot $destinationRoot
}
It 'should pass thru copied files' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse
$result | Should -Not -BeNullOrEmpty
Assert-Copy $sourceRoot $destinationRoot -Recurse
$result.Count | Should -Be 10
foreach( $item in $result )
{
$item.FullName | Should -BeLike ('{0}*' -f $destinationRoot)
}
}
It 'should only copy changed files' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -Not -BeNullOrEmpty
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -BeNullOrEmpty
[IO.File]::WriteAllText((Join-path -Path $sourceRoot -ChildPath 'mov.mof'), ([Guid]::NewGuid().ToString()))
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -Not -BeNullOrEmpty
$result.Count | Should -Be 2
$result[0].Name | Should -Be 'mov.mof'
$result[1].Name | Should -Be 'mov.mof.checksum'
}
It 'should always regenerate checksums' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -Not -BeNullOrEmpty
[IO.File]::WriteAllText((Join-Path -Path $sourceRoot -ChildPath 'zip.zip.checksum'), 'E4F0D22EE1A26200BA320E18023A56B36FF29AA1D64913C60B46CE7D71E940C6')
try
{
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -BeNullOrEmpty
[IO.File]::WriteAllText((Join-Path -Path $sourceRoot -ChildPath 'zip.zip'), ([Guid]::NewGuid().ToString()))
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru
$result | Should -Not -BeNullOrEmpty
$result[0].Name | Should -Be 'zip.zip'
$result[1].Name | Should -Be 'zip.zip.checksum'
}
finally
{
Get-ChildItem -Path $sourceRoot -Filter '*.checksum' | Remove-Item
Clear-Content -Path (Join-Path -Path $sourceRoot -ChildPath 'zip.zip')
}
}
It 'should copy recursively' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -Recurse
$result | Should -BeNullOrEmpty
Assert-Copy -SourceRoot $sourceRoot -Destination $destinationRoot -Recurse
}
It 'should force copy' {
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse
$result | Should -Not -BeNullOrEmpty
Assert-Copy $sourceRoot $destinationRoot -Recurse
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse
$result | Should -BeNullOrEmpty
$result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Force -Recurse
$result | Should -Not -BeNullOrEmpty
Assert-Copy $sourceRoot $destinationRoot -Recurse
}
}
|
combined_dataset/train/non-malicious/sample_0_60.ps1
|
sample_0_60.ps1
|
#************************************************
# DC_HyperVBasicInfo.ps1
# Version 1.0
# Date: 4-7-2015
# Author: Ryutaro Hayashi <Ryutaro.Hayashi@microsoft.com>
# Ported to SDP and included in HyperV SDP by Tim Springston <tspring@microsoft.com>
# Description: Data collection for hyperv.
#************************************************
#Output file info
$FileDescription = "Text File containing Hyper-V basic settings and configuration information."
$SectionDescription = "Hyper-V Basic Information"
$Outputfile = Join-Path $Pwd.Path (($env:COMPUTERNAME) + "_Hyper-VBasicInfo.txt")
Get-Date | Out-File $Outputfile -encoding UTF8
Filter Import-CimXml
{
# Create new XML object from input
$CimXml = [Xml]$_
$CimObj = New-Object -TypeName System.Object
# Iterate over the data and pull out just the value name and data for each entry
ForEach ($CimProperty in $CimXml.SelectNodes("/INSTANCE/PROPERTY[@NAME='Name']"))
{
$CimObj | Add-Member -MemberType NoteProperty -Name $CimProperty.NAME -Value $CimProperty.VALUE
}
ForEach ($CimProperty in $CimXml.SelectNodes("/INSTANCE/PROPERTY[@NAME='Data']"))
{
$CimObj | Add-Member -MemberType NoteProperty -Name $CimProperty.NAME -Value $CimProperty.VALUE
}
# Display output
$CimObj
}
Function showHVGlobalSettings
{
$VSMgtServiceSettingData = $args[0]
("Hyper-V Global Settings") | Out-File $Outputfile -Append -encoding UTF8
("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
("Hyper-V Settings:") | Out-File $Outputfile -Append -encoding UTF8
(" Virtual Hard Disks: " + $VSMgtServiceSettingData.DefaultVirtualHardDiskPath) | Out-File $Outputfile -Append -encoding UTF8
(" Virtual Machines: " + $VSMgtServiceSettingData.DefaultExternalDataRoot) | Out-File $Outputfile -Append -encoding UTF8
(" Physical GPUs: ") | Out-File $Outputfile -Append -encoding UTF8
(" NUMA Spanning: " + $VSMgtServiceSettingData.NumaSpanningEnabled) | Out-File $Outputfile -Append -encoding UTF8
### Live migrations
$VSMigrationService = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemMigrationService'
$VSMigServiceSettingData = $VSMigrationService.GetRelated('Msvm_VirtualSystemMigrationServiceSettingData')
(" Live Migrations:") | Out-File $Outputfile -Append -encoding UTF8
(" Enable incoming and outgoing live migrations: " + $VSMigServiceSettingData.EnableVirtualSystemMigration) | Out-File $Outputfile -Append -encoding UTF8
switch ($VSMigServiceSettingData.AuthenticationType)
{
0 {$AuthTypeStr = "CredSSP(0)"}
1 {$AuthTypeStr = "Kerberos(1)"}
}
(" Authentication protocol: " + $AuthTypeStr) | Out-File $Outputfile -Append -encoding UTF8
(" Simultaneous live migrations: " + $VSMigServiceSettingData.MaximumActiveVirtualSystemMigration) | Out-File $Outputfile -Append -encoding UTF8
(" Incoming live migrations: ") | Out-File $Outputfile -Append -encoding UTF8
$MigNetworksSettings = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemMigrationNetworkSettingData'
$NetworksSet = 0
ForEach($MigNetworksSetting in $MigNetworksSettings)
{
For($i=0; $i -lt $MigNetworksSetting.Tags.Count; $i++)
{
If($MigNetworksSetting.Tags[$i] -eq "Microsoft:UserManagedAllNetworks")
{
$NetworksSet++
}
}
}
If($NetworksSet -gt 0)
{
$NetworkOptionStr = "Use any available network for live migration"
}
Else
{
$NetworkOptionStr = "Use these IP addresses for live migration"
$IPList = $VSMigrationService.MigrationServiceListenerIPAddressList
For($y=0; $y -lt $IPLIst.count; $y++)
{
$IPListStr = $IPListStr + " " + $IPList[$y]
}
}
(" Option: " + $NetworkOptionStr) | Out-File $Outputfile -Append -encoding UTF8
If($NetworksSet -eq 0)
{
(" Network List: " + $IPListStr) | Out-File $Outputfile -Append -encoding UTF8
}
#### Storage Migrations
(" Storage Migrations:") | Out-File $Outputfile -Append -encoding UTF8
(" Simultaneous storage migrations: " + $VSMigServiceSettingData.MaximumActiveStorageMigration) | Out-File $Outputfile -Append -encoding UTF8
### Replication Configuration
(" Replication Configuration:") | Out-File $Outputfile -Append -encoding UTF8
$HVRServiceSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ReplicationServiceSettingData'
If ($HVRServiceSettingData.RecoveryServerEnabled)
{
switch ($HVRServiceSettingData.AllowedAuthenticationType)
{
0 {$AllowedAuthenticationType = "Not defined"}
1 {$AllowedAuthenticationType = "Use kerberos (HTTP)"}
2 {$AllowedAuthenticationType = "Use certificate-based Authentication"}
3 {$AllowedAuthenticationType = "Both certificate based authentication and integrated authentication"}
}
(" Authentication and ports:") | Out-File $Outputfile -Append -encoding UTF8
(" Authentication Type: " + $AllowedAuthenticationType) | Out-File $Outputfile -Append -encoding UTF8
(" HttpPort(Kerberos) : " + $HVRServiceSettingData.HttpPort) | Out-File $Outputfile -Append -encoding UTF8
(" HttpsPort(Certificate): " + $HVRServiceSettingData.HttpsPort) | Out-File $Outputfile -Append -encoding UTF8
$HVRAuthSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ReplicationAuthorizationSettingData'
$AuthEntryCount = ($HVRAuthSettingData | Measure-Object).count
(" Authentication and Storage:") | Out-File $Outputfile -Append -encoding UTF8
If($AuthEntryCount -eq 1 -and $HVRAuthSettingData.AllowedPrimaryHostSystem -eq "*")
{
$AuthServerStr = "Type: Allow replication from any authenticated server"
(" " + $AuthServerStr) | Out-File $Outputfile -Append -encoding UTF8
(" Storage location: " + $HVRAuthSettingData.ReplicaStorageLocation) | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
$AuthServerStr = "Type: Allow replication from specifed servers"
(" " + $AuthServerStr) | Out-File $Outputfile -Append -encoding UTF8
ForEach($HVRAuthSetting in $HVRAuthSettingData)
{
(" Primary server: " + $HVRAuthSetting.AllowedPrimaryHostSystem + " | Storage location: " + $HVRAuthSetting.ReplicaStorageLocation + " | TrustGroup: " + $HVRAuthSetting.TrustGroup) | Out-File $Outputfile -Append -encoding UTF8
}
}
}
Else
{
(" Hyper-V Replica is not configured as replica server.") | Out-File $Outputfile -Append -encoding UTF8
}
### Enhanced Session Mode Policy (WS2012R2 or later)
If($VSMgtServiceSettingData.EnhancedSessionModeEnabled -eq $null)
{
$EnhancedSessionMode = "N/A (Enhanced session mode is supported from Windows Server 2012 R2)"
}
Else
{
$EnhancedSessionMode = $VSMgtServiceSettingData.EnhancedSessionModeEnabled
}
(" Enhanced session mode policy: " + $EnhancedSessionMode) | Out-File $Outputfile -Append -encoding UTF8
### Memory reserve
$memReserveRegKey = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization\"
$memReserveReg = Get-ItemProperty $memReserveRegKey
$memoryReserve = $memReserveReg."MemoryReserve"
If($memoryReserve -ne $null)
{
(" Memory Reserve: " + $memoryReserve + " MB(WARNING: Memory reserve is set)") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showNUMAinfo()
{
("NUMA Information") | Out-File $Outputfile -Append -encoding UTF8
("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8
$hostName = hostname
$hostComputer = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ComputerSystem' | Where-Object { $_.ElementName -eq $hostname}
$numaNodes = $hostComputer.GetRelated("Msvm_NumaNode")
Foreach($numaNode in $numaNodes) {
("") | Out-File $Outputfile -Append -encoding UTF8
($numaNode.ElementName + ":") | Out-File $Outputfile -Append -encoding UTF8
(" EnabledState : " + $numaNode.EnabledState) | Out-File $Outputfile -Append -encoding UTF8
(" HealthState : " + $numaNode.HealthState) | Out-File $Outputfile -Append -encoding UTF8
(" NumberOfLogicalProcessors : " + $numaNode.NumberOfLogicalProcessors) | Out-File $Outputfile -Append -encoding UTF8
(" NumberOfProcessorCores : " + $numaNode.NumberOfProcessorCores) | Out-File $Outputfile -Append -encoding UTF8
(" CurrentlyConsumableMemoryBlocks: " + $numaNode.CurrentlyConsumableMemoryBlocks) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
$Memory = $numaNode.GetRelated("Msvm_Memory") | Where-Object { $_.SystemName -eq $hostName}
$MemSizeGB = ($Memory.ConsumableBlocks * $Memory.BlockSize / 1024 / 1024 / 1024)
$MemSizeGB2 = [math]::round($MemSizeGB, 2)
$MemSizeMB = ($Memory.ConsumableBlocks * $Memory.BlockSize / 1024 / 1024)
(" ==== " + $Memory.ElementName + " ====") | Out-File $Outputfile -Append -encoding UTF8
(" BlockSize : " + $Memory.BlockSize) | Out-File $Outputfile -Append -encoding UTF8
(" ConsumableBlocks : " + $Memory.ConsumableBlocks) | Out-File $Outputfile -Append -encoding UTF8
(" Size : " + $MemSizeMB + "MB / " + $MemSizeGB2 + "GB") | Out-File $Outputfile -Append -encoding UTF8
(" EnabledState : " + $Memory.EnabledState) | Out-File $Outputfile -Append -encoding UTF8
(" HealthState : " + $Memory.HealthState) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
}
Function showVMBasicinfo()
{
$VM = $args[0]
$VSSettingData = $args[1]
("Basic information:") | Out-File $Outputfile -Append -encoding UTF8
(" GUID: " + $VM.Name) | Out-File $Outputfile -Append -encoding UTF8
If($VM.ProcessID -eq $null)
{
$procId = "N/A => Virtual Machine is not running."
}
Else
{
$procId = $VM.ProcessID
}
(" PID: " + $procId) | Out-File $Outputfile -Append -encoding UTF8
### VM Version
(" Version: " + $VSSettingData.Version) | Out-File $Outputfile -Append -encoding UTF8
### VM Generation
$vmGgeneration = getVmGeneration $VSSettingData
(" Generation: " + $vmGgeneration) | Out-File $Outputfile -Append -encoding UTF8
### Enabled state
$vmStatus = getVMEnabledState $VM.EnabledState
(" State: " + $vmStatus) | Out-File $Outputfile -Append -encoding UTF8
### Heartbeat
$heartbeatComponent = Get-CimInstance -namespace 'root\virtualization\v2' -query "associators of {$VM} where ResultClass = Msvm_HeartbeatComponent"
If($heartbeatComponent -eq $null)
{
$heartbeartStr = "N/A(Virtual Machine is not running)"
}
ElseIf($heartbeatComponent.EnabledState -eq 3)
{
$heartbeartStr = "N/A(Heartbeat service is not enabled)"
}
Else
{
$hbStatusStr1 = getHBOperationalStatus $heartbeatComponent.OperationalStatus[0]
$hbStatusStr2 = getHBSecondaryStatus $heartbeatComponent.OperationalStatus[1]
$heartbeartStr = $hbStatusStr1 + "(Application state - " + $hbStatusStr2 + ")"
}
(" Heartbeat: " + $heartbeartStr) | Out-File $Outputfile -Append -encoding UTF8
### Health state
switch ($VM.HealthState)
{
# https://msdn.microsoft.com/en-us/library/hh850116(v=vs.85).aspx
5 {$healthState = "OK" + "(" + $VM.HealthState + ")"}
20 {$healthState = "Major Failure" + "(" + $VM.HealthState + ")"}
25 {$healthState = "Critical failure)" + "(" + $VM.HealthState + ")"}
}
(" Health state: " + $healthState) | Out-File $Outputfile -Append -encoding UTF8
### Uptime
$uptimeSeconds = $VM.OnTimeInMilliseconds / 1000
$uptimeMinutes = $uptimeSeconds / 60
$seconds = [math]::Truncate($uptimeSeconds % 60)
$minutes = [math]::Truncate($uptimeMinutes % 60)
$hours = [math]::Truncate($uptimeSeconds / 3600)
(" Uptime: " + $hours + ":" + $minutes + ":" + $seconds) | Out-File $Outputfile -Append -encoding UTF8
### IC version
If($VM.EnabledState -eq 2)
{
$KvpExchangeComponent = $VM.GetRelated("Msvm_KvpExchangeComponent")
If($KvpExchangeComponent.count -eq 0)
{
$versionString = "Unable to retrieve IC version. VM would not be started."
}
ElseIf($KvpExchangeComponent.GuestIntrinsicExchangeItems -ne $null)
{
$IntrinsicItems = $KvpExchangeComponent.GuestIntrinsicExchangeItems | Import-CimXml
$icVersionItem = $IntrinsicItems | Where {$_.Name -eq "IntegrationServicesVersion"}
If($icVersionItem.Data -ne $null)
{
$versionString = $icVersionItem.Data
$icVersionExist = $True
}
Else
{
$versionString = "Unable to retrieve IC version. Key exchange service would not be running in guest."
}
}
Else
{
$versionString = "Unable to retrieve IC version. Key exchange service would not be running in guest."
}
}
Else
{
$versionString = "N/A(VM is not running)"
}
$icRegistryKey = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization\GuestInstaller\Version\"
$icReg = Get-ItemProperty $icRegistryKey -EA SilentlyContinue
if ($icReg) { $hostICVersion = $icReg."Microsoft-Hyper-V-Guest-Installer-Win6x-Package" }
If($hostICVersion -eq $icVersionItem.Data)
{
(" Integration Service Version: " + $versionString + " => IC version is same with host version.") | Out-File $Outputfile -Append -encoding UTF8
}
ElseIf($icVersionExist)
{
(" Integration Service Version: " + $versionString + " => WARNING: IC version is not same with host version(" + $hostICVersion + ").") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Integration Service Version: " + $versionString) | Out-File $Outputfile -Append -encoding UTF8
}
If($VM.EnhancedSessionModeState -ne $null)
{
switch ($VM.EnhancedSessionModeState)
{
2 {$EnhancedSessionModeState = "Enhanced mode is allowed and available on the virtual machine(2)"}
3 {$EnhancedSessionModeState = "Enhanced mode is not allowed on the virtual machine(3)"}
6 {$EnhancedSessionModeState = "Enhanced mode is allowed and but not currently available on the virtual machine(6)"}
default {$EnhancedSessionModeState = "Unknown"}
}
(" EnhancedSession Mode: " + $EnhancedSessionModeState) | Out-File $Outputfile -Append -encoding UTF8
}
(" Number of NUMA nodes: " + $VM.NumberOfNumaNodes) | Out-File $Outputfile -Append -encoding UTF8
### Configuration file
$configPath = $VSSettingData.ConfigurationDataRoot + "\" + $VSSettingData.ConfigurationFile
(" Configuration File: " + $configPath) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showKVPItems()
{
$VM = $args[0]
$VSSettingData = $args[1]
$KvpExchangeComponent = $VM.GetRelated("Msvm_KvpExchangeComponent")
$KvpExchangeComponentSettingData = $VSSettingData.GetRelated("Msvm_KvpExchangeComponentSettingData")
("KVP Items:") | Out-File $Outputfile -Append -encoding UTF8
(" Guest intrinsic items:") | Out-File $Outputfile -Append -encoding UTF8
If($KvpExchangeComponent.count -eq 0)
{
(" Unable to retrieve guest items. VM would not be started.") | Out-File $Outputfile -Append -encoding UTF8
}
ElseIf($KvpExchangeComponent.GuestIntrinsicExchangeItems -ne $null)
{
$IntrinsicItems = $KvpExchangeComponent.GuestIntrinsicExchangeItems | Import-CimXml
ForEach($IntrinsicItem in $IntrinsicItems)
{
(" " + $IntrinsicItem.Name + ": " + $IntrinsicItem.Data) | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Unable to retrieve guest items. Key exchange service would not be running in guest.") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
(" Host only items:") | Out-File $Outputfile -Append -encoding UTF8
If($KvpExchangeComponentSettingData.HostOnlyItem -eq $null)
{
(" No host only items.") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
$HostItems = $KvpExchangeComponentSettingData.HostOnlyItems | Import-CimXml
If($HostItems.count -eq 0)
{
(" No host only items are registerd.") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
ForEach($HostItem in $HostItems)
{
(" " + $HostItem.Name + ": " + $HostItem.Data) | Out-File $Outputfile -Append -encoding UTF8
}
}
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showBIOSinfo
{
$VSSettingData = $args[0]
("BIOS:") | Out-File $Outputfile -Append -encoding UTF8
(" Num Lock: " + $VSSettingData.BIOSNumLock) | Out-File $Outputfile -Append -encoding UTF8
For($i=0; $i -lt $VSSettingData.BootOrder.length; $i++)
{
switch ($VSSettingData.BootOrder[$i])
{
0 {$deviceStr = "Floppy"}
1 {$deviceStr = "CD-ROM"}
2 {$deviceStr = "Hard Drive"}
3 {$deviceStr = "PXE Boot"}
}
$BootOrderStr = $BootOrderStr + $deviceStr
If($i -lt ($VSSettingData.BootOrder.length-1)) {
$BootOrderStr = $BootOrderStr + " -> "
}
}
(" Startup order: " + $BootOrderStr) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showMeminfo
{
$VSSettingData = $args[0]
$MemSettingData = $VSSettingData.GetRelated('Msvm_MemorySettingData')
("Memory:") | Out-File $Outputfile -Append -encoding UTF8
(" Startup RAM: " + $MemSettingData.VirtualQuantity + "MB") | Out-File $Outputfile -Append -encoding UTF8
(" Enable Dynamic Memory: " + $MemSettingData.DynamicMemoryEnabled) | Out-File $Outputfile -Append -encoding UTF8
If($MemSettingData.DynamicMemoryEnabled)
{
(" Minimum RAM: " + $MemSettingData.Reservation + "MB") | Out-File $Outputfile -Append -encoding UTF8
(" Maximum RAM: " + $MemSettingData.Limit + "MB") | Out-File $Outputfile -Append -encoding UTF8
(" Memory Buffer: " + $MemSettingData.TargetMemoryBuffer) | Out-File $Outputfile -Append -encoding UTF8
}
(" Memory Weight: " + $MemSettingData.Weight) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showCPUinfo
{
$VSSettingData = $args[0]
$ProcSettingData = $VSSettingData.GetRelated('Msvm_ProcessorSettingData')
("Processor:") | Out-File $Outputfile -Append -encoding UTF8
(" Number of Virtual Processors: " + $ProcSettingData.VirtualQuantity) | Out-File $Outputfile -Append -encoding UTF8
(" Resource control: ") | Out-File $Outputfile -Append -encoding UTF8
(" Virtual machine reserve: " + $ProcSettingData.Reservation / 1000) | Out-File $Outputfile -Append -encoding UTF8
(" Virtual machine limit : " + $ProcSettingData.Limit / 1000) | Out-File $Outputfile -Append -encoding UTF8
(" Relative weight : " + $ProcSettingData.Weight) | Out-File $Outputfile -Append -encoding UTF8
(" Compatibility: ") | Out-File $Outputfile -Append -encoding UTF8
(" Migrate to physical computer with a differnet processor version: " + $ProcSettingData.LimitProcessorFeatures) | Out-File $Outputfile -Append -encoding UTF8
(" NUMA: ") | Out-File $Outputfile -Append -encoding UTF8
(" Maximum number of virtual processors : " + $ProcSettingData.MaxProcessorsPerNumaNode) | Out-File $Outputfile -Append -encoding UTF8
$MemSettingData = $VSSettingData.GetRelated('Msvm_MemorySettingData')
(" MaxMemoryBlocksPerNumaNode : " + $MemSettingData.MaxMemoryBlocksPerNumaNode + " MB") | Out-File $Outputfile -Append -encoding UTF8
(" Maximum NUMA nodes allowed on a socket: " + $ProcSettingData.MaxNumaNodesPerSocket) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showIDEHardDriveinfo
{
$VM = $args[0]
("IDE Controller :") | Out-File $Outputfile -Append -encoding UTF8
$hardDrives = Get-VMHardDiskDrive -VMName $VM.ElementName | Where-Object {$_.ControllerType -eq "IDE" }
If($hardDrives.count -eq 0)
{
(" No IDE drive attached.") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
return
}
ForEach($hardDrive in $hardDrives)
{
If($hardDrive.ControllerType -eq "IDE")
{
(" Virtual Hard Disks: ") | Out-File $Outputfile -Append -encoding UTF8
If( $hardDrive.Path -eq $null)
{
(" WARNING: Disk path is null. Probably the disk is removed or deleted.") | Out-File $Outputfile -Append -encoding UTF8
continue
}
Else
{
(" - " + $hardDrive.Path) | Out-File $Outputfile -Append -encoding UTF8
(" Location: " + $hardDrive.Name) | Out-File $Outputfile -Append -encoding UTF8
}
If(!(Test-Path $hardDrive.Path))
{
(" WARNING: the file does not exist.") | Out-File $Outputfile -Append -encoding UTF8
continue
}
$vhdInfo = Get-VHD -Path $hardDrive.Path
$property = Get-ChildItem $hardDrive.Path
$fileSize = [math]::round($property.Length / 1GB , 3)
$maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3)
$ACL = Get-ACL $hardDrive.Path
(" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8
(" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8
(" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8
(" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8
(" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8
(" ACL: ") | Out-File $Outputfile -Append -encoding UTF8
$AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount])
ForEach($AccessRule in $AccessRules)
{
(" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8
}
(" ID: " + $hardDrive.ID) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
### Advanced Features(Windows Server 2012 R2 or later)
(" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8
$StorageAllocationSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_StorageAllocationSettingData' | Where-Object { $_.HostResource -eq $hardDrive.Path}
If($StorageAllocationSettingData.IOPSLimit -eq $null)
{
$isStorageQoSEnabled = $false
$StorageQoSStr = "This feature is supported from Windows Server 2012 R2."
}
ElseIf($StorageAllocationSettingData.IOPSLimit -eq 0)
{
$isStorageQoSEnabled = $false
$StorageQoSStr = "Disabled"
}
Else
{
$isStorageQoSEnabled = $true
$StorageQoSStr = "Enabled"
}
(" Enable Quality of Service management: " + $StorageQoSStr) | Out-File $Outputfile -Append -encoding UTF8
If($isStorageQoSEnabled)
{
(" Minimum: " + $StorageAllocationSettingData.IOPSReservation) | Out-File $Outputfile -Append -encoding UTF8
(" Maximum: " + $StorageAllocationSettingData.IOPSLimit) | Out-File $Outputfile -Append -encoding UTF8
}
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
}
Function showSCSIHardDriveinfo
{
$VM = $args[0]
("SCSI Controller :") | Out-File $Outputfile -Append -encoding UTF8
$hardDrives = Get-VMHardDiskDrive -VMName $VM.ElementName | Where-Object {$_.ControllerType -eq "SCSI" }
If($hardDrives.count -eq 0)
{
(" No SCSI drive attached.") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
return
}
ForEach($hardDrive in $hardDrives)
{
If($hardDrive.ControllerType -eq "SCSI")
{
(" Virtual Hard Disks: ") | Out-File $Outputfile -Append -encoding UTF8
If( $hardDrive.Path -eq $null)
{
(" WARNING: Disk path is null. Probably the disk is detached or deleted.") | Out-File $Outputfile -Append -encoding UTF8
continue
}
Else
{
(" - " + $hardDrive.Path) | Out-File $Outputfile -Append -encoding UTF8
(" Location: " + $hardDrive.Name) | Out-File $Outputfile -Append -encoding UTF8
}
If(!(Test-Path $hardDrive.Path))
{
(" WARNING: above file does not exist.") | Out-File $Outputfile -Append -encoding UTF8
continue
}
$vhdInfo = Get-VHD -Path $hardDrive.Path
$property = Get-ChildItem $hardDrive.Path
$fileSize = [math]::round($property.Length / 1GB , 3)
$maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3)
$ACL = Get-ACL $hardDrive.Path
(" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8
(" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8
(" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8
(" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8
(" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8
(" ACL: ") | Out-File $Outputfile -Append -encoding UTF8
$AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount])
ForEach($AccessRule in $AccessRules)
{
(" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8
}
(" ID: " + $hardDrive.ID) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
### Advanced Features(Windows Server 2012 R2 or later)
(" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8
$StorageAllocationSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_StorageAllocationSettingData' | Where-Object { $_.HostResource -eq $hardDrive.Path}
# Storage Qos
If($StorageAllocationSettingData.IOPSLimit -eq $null)
{
$isStorageQoSEnabled = $false
$StorageQoSStr = "This feature is supported from Windows Server 2012 R2."
}
ElseIf($StorageAllocationSettingData.IOPSLimit -eq 0)
{
$isStorageQoSEnabled = $false
$StorageQoSStr = "Disabled"
}
Else
{
$isStorageQoSEnabled = $true
$StorageQoSStr = "Enabled"
}
(" Enable Quality of Service management: " + $StorageQoSStr) | Out-File $Outputfile -Append -encoding UTF8
If($isStorageQoSEnabled)
{
(" Minimum: " + $StorageAllocationSettingData.IOPSReservation) | Out-File $Outputfile -Append -encoding UTF8
(" Maximum: " + $StorageAllocationSettingData.IOPSLimit) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
# Shared disk support
If($StorageAllocationSettingData.PersistentReservationsSupported -eq $null)
{
$sharedDiskStr = "This feature is supported from Windows Server 2012 R2."
}
ElseIf($StorageAllocationSettingData.PersistentReservationsSupported)
{
$sharedDiskStr = "Enabled"
}
Else
{
$sharedDiskStr = "Disabled"
}
(" Enable virtual hard disk sharing: " + $sharedDiskStr) | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showNetworkAdapterinfo
{
$VSSettingData = $args[0]
$EthernetPortAllocationSettings = $VSSettingData.GetRelated('Msvm_EthernetPortAllocationSettingData')
ForEach($EthernetPortAllocationSetting in $EthernetPortAllocationSettings)
{
### Get GUID for vSwitch
$VirtualEthernetSwitch = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualEthernetSwitch' | Where-Object { $_.__PATH -eq $EthernetPortAllocationSetting.HostResource}
("Network Adapter :") | Out-File $Outputfile -Append -encoding UTF8
If ($VirtualEthernetSwitch -ne $null)
{
$switchName = $VirtualEthernetSwitch.ElementName
}
Else
{
$switchName = "Not Connected"
}
(" Virtual Switch: " + $switchName) | Out-File $Outputfile -Append -encoding UTF8
### VLAN Info
$EthernetSwitchPortVlanSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortVlanSettingData')
If($EthernetSwitchPortVlanSettingData -ne $NULL)
{
switch ($EthernetSwitchPortVlanSettingData.OperationMode)
{
0 {$VlanMode = "None(0)"}
1 {$VlanMode = "Access(1)"}
2 {$VlanMode = "Trunk(2)"}
3 {$VlanMode = "Private(3)"}
default {$VlanMode = "Disabled"}
}
(" Enable virtual LAN identification: " + $VlanMode) | Out-File $Outputfile -Append -encoding UTF8
(" VLAN ID: " + $EthernetSwitchPortVlanSettingData.AccessVlanId) | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Enable virtual LAN identification: Disabled") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
### Bandwidth Management Info
$EthernetSwitchPortBandwidthSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortBandwidthSettingData')
(" Bandwitdth Management:") | Out-File $Outputfile -Append -encoding UTF8
If($EthernetSwitchPortBandwidthSettingData -ne $NULL)
{
(" Enable bandwidth management: True") | Out-File $Outputfile -Append -encoding UTF8
(" Minimum bandwidth : " + $EthernetSwitchPortBandwidthSettingData.Reservation / 1000000.0 + " Mbps") | Out-File $Outputfile -Append -encoding UTF8
(" Maximum bandwidth : " + $EthernetSwitchPortBandwidthSettingData.Limit / 1000000.0 + " Mbps") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Enable bandwidth management: False") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
### Hardware Acceleration
$EthernetSwitchPortOffloadSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortOffloadSettingData')
(" Hardware Acceleration:") | Out-File $Outputfile -Append -encoding UTF8
If($EthernetSwitchPortOffloadSettingData.VMQOffloadWeight -ne 0)
{
$VMQEnabled = "True(VMQOffloadWeight=" + $EthernetSwitchPortOffloadSettingData.VMQOffloadWeight +")"
}
Else
{
$VMQEnabled = "False"
}
(" Enable virtual machine queue: " +$VMQEnabled) | Out-File $Outputfile -Append -encoding UTF8
If($EthernetSwitchPortOffloadSettingData.IPSecOffloadLimit -ne 0)
{
$IPSecEnabled = "True(Maximum Number = " + $EthernetSwitchPortOffloadSettingData.IPSecOffloadLimit +" Offloaded SA)"
}
Else
{
$IPSecEnabled = "False"
}
(" IPSec task offloading: " +$IPSecEnabled) | Out-File $Outputfile -Append -encoding UTF8
If($EthernetSwitchPortOffloadSettingData.IOVOffloadWeight -ne 0)
{
$SRIOVEnabled = "True(IOVOffloadWeight = " + $EthernetSwitchPortOffloadSettingData.IOVOffloadWeight + ")"
}
Else
{
$SRIOVEnabled = "False"
}
(" Enable SR-IOV: " +$SRIOVEnabled) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
### Failover TCP/IP
$SyntheticEthernetPortSettings = $VSSettingData.GetRelated('Msvm_SyntheticEthernetPortSettingData')
# Get Msvm_SyntheticEthernetPortSettingData corresponding to the current Msvm_EthernetPortAllocationSetting
ForEach($SyntheticEthernetPortSetting in $SyntheticEthernetPortSettings)
{
If($EthernetPortAllocationSetting.InstanceID.Contains($SyntheticEthernetPortSetting.InstanceID))
{
$SyntheticPort = $SyntheticEthernetPortSetting
break
}
}
If($SyntheticPort -eq $null)
{
(" WARNING: Failed to retrieve Msvm_SyntheticEthernetPortSettingData.") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
### As Msvm_SyntheticEthernetPortSettingData is not found, we cannot show any info on vNIC.
return
}
(" Failover TCP/IP: ") | Out-File $Outputfile -Append -encoding UTF8
$FailoverNetworkAdapterSettingData = $SyntheticPort.GetRelated('Msvm_FailoverNetworkAdapterSettingData')
If($FailoverNetworkAdapterSettingData -ne $null)
{
If($FailoverNetworkAdapterSettingData.DHCPEnabled)
{
(" IPv4/IPv6 TCP/IP Settings: DHCP(No static IP address is specified)") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" IPv4 TCP/IP Settings:") | Out-File $Outputfile -Append -encoding UTF8
(" IPv4 Address : " + $FailoverNetworkAdapterSettingData.IPAddresses[0]) | Out-File $Outputfile -Append -encoding UTF8
(" Subnet mask : " + $FailoverNetworkAdapterSettingData.Subnets[0]) | Out-File $Outputfile -Append -encoding UTF8
(" Default gateway: " + $FailoverNetworkAdapterSettingData.DefaultGateways[0]) | Out-File $Outputfile -Append -encoding UTF8
(" Prefferred DNS server: " + $FailoverNetworkAdapterSettingData.DNSServers[0]) | Out-File $Outputfile -Append -encoding UTF8
(" Alternate DNS server : " + $FailoverNetworkAdapterSettingData.DNSServers[1]) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
If($FailoverNetworkAdapterSettingData.IPAddresses.length -eq 2)
{
(" IPv6 TCP/IP Settings:") | Out-File $Outputfile -Append -encoding UTF8
(" IPv4 Address : " + $FailoverNetworkAdapterSettingData.IPAddresses[1]) | Out-File $Outputfile -Append -encoding UTF8
(" Subnet mask : " + $FailoverNetworkAdapterSettingData.Subnets[1]) | Out-File $Outputfile -Append -encoding UTF8
(" Default gateway: " + $FailoverNetworkAdapterSettingData.DefaultGateways[1]) | Out-File $Outputfile -Append -encoding UTF8
(" Prefferred DNS server: " + $FailoverNetworkAdapterSettingData.DNSServers[2]) | Out-File $Outputfile -Append -encoding UTF8
(" Alternate DNS server : " + $FailoverNetworkAdapterSettingData.DNSServers[3]) | Out-File $Outputfile -Append -encoding UTF8
}
}
}
Else
{
(" Hyper-V replica is not configured.") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
### Advanced Feature
(" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8
If($SyntheticPort.StaticMacAddress)
{
$MACAddr = "Static (" + $SyntheticPort.address + ")"
}
Else
{
$MACAddr = "Dynamic (" + $SyntheticPort.address + ")"
}
(" MAC Address: " + $MACAddr) | Out-File $Outputfile -Append -encoding UTF8
$EthernetSwitchPortSecuritySettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortSecuritySettingData')
If($EthernetSwitchPortSecuritySettingData.AllowMacSpoofing -ne $null)
{
$MACAddressSpoofing = $EthernetSwitchPortSecuritySettingData.AllowMacSpoofing
}
Else
{
$MACAddressSpoofing = "False"
}
(" Enable MAC address spoofing: " + $MACAddressSpoofing) | Out-File $Outputfile -Append -encoding UTF8
### DHCP guard
If($EthernetSwitchPortSecuritySettingData.EnableDhcpGuard -ne $null)
{
$DHCPGuard = $EthernetSwitchPortSecuritySettingData.EnableDhcpGuard
}
Else
{
$DHCPGuard = "False"
}
(" Enable DHCP guard: " + $DHCPGuard) | Out-File $Outputfile -Append -encoding UTF8
### Router guard
If($EthernetSwitchPortSecuritySettingData.EnableRouterGuard -ne $null)
{
$RouterGuard = $EthernetSwitchPortSecuritySettingData.EnableRouterGuard
}
Else
{
$RouterGuard = "False"
}
(" Enable router advertisement guard: " + $RouterGuard) | Out-File $Outputfile -Append -encoding UTF8
### Port mirroring
If($EthernetSwitchPortSecuritySettingData.MonitorMode -ne $null)
{
switch ($EthernetSwitchPortSecuritySettingData.MonitorMode)
{
0 {$MonitorMode = "None (0)"}
1 {$MonitorMode = "Destination (1)"}
2 {$MonitorMode = "Source (2)"}
default {$MonitorMode = "False"}
}
}
Else
{
$MonitorMode = "False"
}
(" Mirrorring mode: " + $MonitorMode) | Out-File $Outputfile -Append -encoding UTF8
### Proctected Netowrk(WS2012R2 or later)
If($SyntheticPort.ClusterMonitored -ne $null)
{
(" Protected network: " + $SyntheticPort.ClusterMonitored) | Out-File $Outputfile -Append -encoding UTF8
}
### NIC Teaming
If($EthernetSwitchPortSecuritySettingData.AllowTeaming -ne $null)
{
$AllowTeaming = $EthernetSwitchPortSecuritySettingData.AllowTeaming
}
Else
{
$AllowTeaming = "False"
}
(" Enable this network adapter to be partof a team in the guest operating system: " + $AllowTeaming) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
}
Function showComPortinfo
{
$VM = $args[0]
$ComPorts = Get-VMComPort -VMName $VM.ElementName
("COM Port:") | Out-File $Outputfile -Append -encoding UTF8
Foreach ($ComPort in $ComPorts)
{
(" " + $ComPort.Name + ": " + $ComPort.Path) | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showFloppyDriveinfo
{
$VM = $args[0]
$loppyDrive = Get-VMFloppyDiskDrive -VMName $VM.ElementName
("Diskette Drive:") | Out-File $Outputfile -Append -encoding UTF8
(" Path: " + $floppyDrive.Path) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showICinfo
{
$VSSettingData = $args[0]
("Integration Services:") | Out-File $Outputfile -Append -encoding UTF8
$ShutdownComponentSettingData = $VSSettingData.GetRelated('Msvm_ShutdownComponentSettingData')
$enabledState = getStateString($ShutdownComponentSettingData.EnabledState)
(" Operating system shutdown: " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
$TimeSyncComponentSettingData = $VSSettingData.GetRelated('Msvm_TimeSyncComponentSettingData')
$enabledState = getStateString($TimeSyncComponentSettingData.EnabledState)
(" Time synchronization : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
$KvpExchangeComponentSettingData = $VSSettingData.GetRelated('Msvm_KvpExchangeComponentSettingData')
$enabledState = getStateString($KvpExchangeComponentSettingData.EnabledState)
(" Data Exchange : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
$HeartbeatComponentSettingData = $VSSettingData.GetRelated('Msvm_HeartbeatComponentSettingData')
$enabledState = getStateString($HeartbeatComponentSettingData.EnabledState)
(" Heartbeat : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
### Show heartbeat interval if it is enabled.
If($HeartbeatComponentSettingData.EnabledState -eq 2)
{
(" Interval : " + $HeartbeatComponentSettingData.Interval + " ms") | Out-File $Outputfile -Append -encoding UTF8
(" Latency : " + $HeartbeatComponentSettingData.Latency + " ms") | Out-File $Outputfile -Append -encoding UTF8
(" ErrorThreshold: " + $HeartbeatComponentSettingData.ErrorThreshold + " times") | Out-File $Outputfile -Append -encoding UTF8
}
$VssComponentSettingData = $VSSettingData.GetRelated('Msvm_VssComponentSettingData')
$enabledState = getStateString($VssComponentSettingData.EnabledState)
(" Backup (volume snapshot) : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
### Guest service(Windows server 2012 R2 or later)
$GuestServiceInterfaceComponentSettingData = $VSSettingData.GetRelated('Msvm_GuestServiceInterfaceComponentSettingData')
$enabledState = getStateString($GuestServiceInterfaceComponentSettingData.EnabledState)
(" Guest service : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function getStateString
{
$enabledState = $args[0]
switch ($enabledState)
{
2 {$enabledStateStr = "Enabled(2)"}
3 {$enabledStateStr = "Disabled(3)"}
default {$enabledStateStr = "Unknown"}
}
return $enabledStateStr
}
Function showSnapshotFileinfo
{
$VSSettingData = $args[0]
("Snapshot File Location(File Location for xml):") | Out-File $Outputfile -Append -encoding UTF8
(" Path: " + $VSSettingData.SnapshotDataRoot) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showSmartPagingFileinfo
{
$VSSettingData = $args[0]
("Smart Paging File Location:") | Out-File $Outputfile -Append -encoding UTF8
(" Path: " + $VSSettingData.SwapFileDataRoot) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showAutomaticActioninfo
{
$VSSettingData = $args[0]
("Automatic Start Action:") | Out-File $Outputfile -Append -encoding UTF8
switch ($VSSettingData.AutomaticStartupAction)
{
2 {$startActionStr = "Nothing(2)"}
3 {$startActionStr = "Automatically start if it was running when the service stopped(3)"}
4 {$startActionStr = "Always start this virtual machine automatically(4)"}
default {$startActionStr = "Unknown"}
}
(" Action: " + $startActionStr) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
("Automatic Stop Action:") | Out-File $Outputfile -Append -encoding UTF8
switch ($VSSettingData.AutomaticShutdownAction)
{
2 {$shutdownActionStr = "Turn off the virtual machine(2)"}
3 {$shutdownActionStr = "Save the virtual machine state(3)"}
4 {$shutdownActionStr = "Shut down the guest operating system(4)"}
default {$shutdownActionStr = "Unknown"}
}
(" Action: " + $shutdownActionStr) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showSnapshotInfo
{
$VM = $args[0]
("Snapshot: ") | Out-File $Outputfile -Append -encoding UTF8
$Snapshots = Get-VMSnapshot -VMName $VM.ElementName
If($Snapshots.length -eq 0)
{
(" No snapshots in this VM.") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
return
}
(" -----------------------------------------------------") | Out-File $Outputfile -Append -encoding UTF8
ForEach($Snapshot in $Snapshots)
{
$VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.ElementName -eq $Snapshot.Name }
If($VirtualSystemSettingData.count -gt 1)
{
### Sometimes there are two same Msvm_StorageAllocationSettingData. So we get first one. Probably this is a bug...
$HardDrives = $VirtualSystemSettingData[0].GetRelated('Msvm_StorageAllocationSettingData')
}
Else
{
$HardDrives = $VirtualSystemSettingData.GetRelated('Msvm_StorageAllocationSettingData')
}
(" Name : " + $Snapshot.Name) | Out-File $Outputfile -Append -encoding UTF8
(" Type : " + $Snapshot.SnapshotType) | Out-File $Outputfile -Append -encoding UTF8
(" Creation Time: " + $Snapshot.CreationTime) | Out-File $Outputfile -Append -encoding UTF8
(" Parent : " + $Snapshot.ParentSnapshotName) | Out-File $Outputfile -Append -encoding UTF8
(" File List : ") | Out-File $Outputfile -Append -encoding UTF8
If($HardDrives -eq $null)
{
continue # No drives attached to this snapshot.
}
# Get ACL and file property.
ForEach($HardDrive in $HardDrives)
{
If(($HardDrive.HostResource[0]).Contains("vhd"))
{
(" - " + $HardDrive.HostResource) | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
continue ### Probably physical drive or ISO file
}
If(!(Test-Path $HardDrive.HostResource))
{
(" !!! WARNING: above file does not exist !!!") | Out-File $Outputfile -Append -encoding UTF8
continue
}
$vhdInfo = Get-VHD -Path $HardDrive.HostResource[0]
$property = Get-ChildItem $HardDrive.HostResource[0]
$fileSize = [math]::round($property.Length / 1GB , 3)
$maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3)
$ACL = Get-ACL $HardDrive.HostResource[0]
(" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8
(" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8
(" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8
(" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8
(" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8
(" ACL: ") | Out-File $Outputfile -Append -encoding UTF8
$AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount])
ForEach($AccessRule in $AccessRules)
{
(" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8
}
}
(" -----------------------------------------------------") | Out-File $Outputfile -Append -encoding UTF8
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function showReplicationinfo
{
$VM = $args[0]
$VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.VirtualSystemType -eq 'Microsoft:Hyper-V:System:Realized' }
switch ($VM.ReplicationState)
{
0 {$ReplicationState = "Disabled"}
1 {$ReplicationState = "Ready for replication"}
2 {$ReplicationState = "Waiting to complete initial replication"}
3 {$ReplicationState = "Replicating"}
4 {$ReplicationState = "Synced replication complete"}
5 {$ReplicationState = "Recovered"}
6 {$ReplicationState = "Committed"}
7 {$ReplicationState = "Suspended"}
8 {$ReplicationState = "Critical"}
9 {$ReplicationState = "Waiting to start resynchronization"}
10 {$ReplicationState = "Resynchronizing"}
11 {$ReplicationState = "Resynchronization suspended"}
12 {$ReplicationState = "Failover in progress"}
13 {$ReplicationState = "Failback in progress"}
14 {$ReplicationState = "Failback complete"}
}
switch ($VM.FailedOverReplicationType)
{
0 {$FailedOverReplicationType = "None"}
1 {$FailedOverReplicationType = "Regular"}
2 {$FailedOverReplicationType = "Application consistent"}
3 {$FailedOverReplicationType = "Planned"}
}
switch ($VM.ReplicationHealth)
{
0 {$ReplicationHealth = "Not applicable"}
1 {$ReplicationHealth = "Ok"}
2 {$ReplicationHealth = "Warning"}
3 {$ReplicationHealth = "Critical"}
}
switch ($VM.ReplicationMode)
{
0 {$ReplicationMode = "None"}
1 {$ReplicationMode = "Primary"}
2 {$ReplicationMode = "Recovery"}
3 {$ReplicationMode = "Replica"}
4 {$ReplicationMode = "Extended Replica"}
}
### Sometimes there are two same Msvm_ReplicationSettingData. So we get first one.
$ReplicationSettingData = $VM.GetRelated('Msvm_ReplicationSettingData') | Select-Object -first 1
switch ($ReplicationSettingData.AuthenticationType)
{
1 {$AuthenticationType = "Kerberos authentication"}
2 {$AuthenticationType = "Certificate based authentication"}
}
$HVRConfiRoot = $VirtualSystemSettingData.ConfigurationDataRoot.ToString()
$HVRConfigFile = $VirtualSystemSettingData.ConfigurationFile.ToString()
$VHD = get-vhd -vmid $VM.Name
If($ReplicationSettingData.ReplicationInterval -eq $null)
{
$ReplicationInterval = 300
}
Else
{
$ReplicationInterval = $ReplicationSettingData.ReplicationInterval
}
("Replication:") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
(" Replication:") | Out-File $Outputfile -Append -encoding UTF8
(" This virtual machinge is configured as " + $ReplicationMode + " virtual machine.") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
(" Port on the Replica server : " + $ReplicationSettingData.RecoveryServerPortNumber) | Out-File $Outputfile -Append -encoding UTF8
(" Authentication Type : " + $AuthenticationType) | Out-File $Outputfile -Append -encoding UTF8
(" Compression the data that is transmitted over the network: " + $ReplicationSettingData.CompressionEnabled) | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
(" Recovery Points:") | Out-File $Outputfile -Append -encoding UTF8
If($ReplicationSettingData.RecoveryHistory -eq 0)
{
(" Only the latest point for recovery") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Additional recovery points") | Out-File $Outputfile -Append -encoding UTF8
(" Number of recovery point: " + $ReplicationSettingData.RecoveryHistory) | Out-File $Outputfile -Append -encoding UTF8
$isVssReplicaEnabled = $True
If($ReplicationSettingData.ApplicationConsistentSnapshotInterval -eq 0)
{
$isVssReplicaEnabled = $False
}
(" Application consistent replication: " + $isVssReplicaEnabled) | Out-File $Outputfile -Append -encoding UTF8
If($isVssReplicaEnabled)
{
(" Replicate incremental VSS copy every: " + $ReplicationSettingData.ApplicationConsistentSnapshotInterval + " hour(s)") | Out-File $Outputfile -Append -encoding UTF8
}
}
### Windows Server 2012 R2 or later
### We don't show resync setting if it is RecoveryVM as it is not available.
If($VM.ReplicationMode -eq 1)
{
("") | Out-File $Outputfile -Append -encoding UTF8
(" Resynchronization:") | Out-File $Outputfile -Append -encoding UTF8
$resyncIntervalEnd = [System.Management.ManagementDateTimeConverter]::Totimespan($ReplicationSettingData.AutoResynchronizeIntervalEnd)
$resyncIntervalStart = [System.Management.ManagementDateTimeConverter]::Totimespan($ReplicationSettingData.AutoResynchronizeIntervalStart)
$oneSecond = New-TimeSpan -Seconds 1
$endPlusOneSec = $resyncIntervalEnd + $oneSecond
If($ReplicationSettingData.AutoResynchronizeEnabled)
{
If(($resyncIntervalStart.Hours -eq $endPlusOneSec.Hours) -and ($resyncIntervalStart.Minutes -eq $endPlusOneSec.Minutes) -and ($resyncIntervalStart.Seconds -eq $endPlusOneSec.Seconds))
{
(" Automatically start resynchronization") | Out-File $Outputfile -Append -encoding UTF8
}
Else
{
(" Automatically start resynchronization only during the follwing hours:") | Out-File $Outputfile -Append -encoding UTF8
(" From: " + $resyncIntervalStart.Hours.ToString("00") + $resyncIntervalStart.Minutes.ToString("\:00")) | Out-File $Outputfile -Append -encoding UTF8
(" To: " + $resyncIntervalEnd.Hours.ToString("00") + $resyncIntervalEnd.Minutes.ToString("\:00")) | Out-File $Outputfile -Append -encoding UTF8
}
}
Else
{
(" Manually") | Out-File $Outputfile -Append -encoding UTF8
}
}
("") | Out-File $Outputfile -Append -encoding UTF8
(" Other replication info: ") | Out-File $Outputfile -Append -encoding UTF8
(" VM GUID : " + $VM.Name) | Out-File $Outputfile -Append -encoding UTF8
(" Configuration file : " + $HVRConfiRoot + "\" + $HVRConfigFile) | Out-File $Outputfile -Append -encoding UTF8
(" Included VHD files : ") | Out-File $Outputfile -Append -encoding UTF8
ForEach($includedDisk in $ReplicationSettingData.IncludedDisks)
{
(" - " + $includedDisk) | Out-File $Outputfile -Append -encoding UTF8
}
(" Primary server : " + $ReplicationSettingData.PrimaryHostSystem) | Out-File $Outputfile -Append -encoding UTF8
(" Primary connection point : " + $ReplicationSettingData.PrimaryConnectionPoint) | Out-File $Outputfile -Append -encoding UTF8
(" Replica server : " + $ReplicationSettingData.RecoveryHostSystem) | Out-File $Outputfile -Append -encoding UTF8
(" Replication interval : " + $ReplicationInterval + " seconds") | Out-File $Outputfile -Append -encoding UTF8
(" ReplicationHealth : " + $ReplicationHealth) | Out-File $Outputfile -Append -encoding UTF8
(" ReplicationMode : " + $ReplicationMode) | Out-File $Outputfile -Append -encoding UTF8
(" ReplicationState : " + $ReplicationState) | Out-File $Outputfile -Append -encoding UTF8
(" Last update time : " + $VM.LastReplicationTime) | Out-File $Outputfile -Append -encoding UTF8
(" Last update time(VSS) : " + $VM.LastApplicationConsistentReplicationTime) | Out-File $Outputfile -Append -encoding UTF8
}
Function showHVFileVersion
{
$system32Files = dir "C:\Windows\System32\vm*"
$hypervisorFiles = dir "C:\Windows\System32\hv*"
$driversFiles = dir "C:\Windows\System32\drivers\vm*"
$fileArray = ($system32Files, $driversFiles, $hypervisorFiles)
("File version:") | Out-File $Outputfile -Append -encoding UTF8
ForEach($files in $fileArray)
{
ForEach($file in $files)
{
$ext = (Get-ChildItem $File).get_Extension()
If($ext -ne ".dll" -and $ext -ne ".sys" -and $ext -ne ".exe")
{
continue
}
(" " + $file.Name + " " + $file.VersionInfo.FileVersion) | Out-File $Outputfile -Append -encoding UTF8
}
}
("") | Out-File $Outputfile -Append -encoding UTF8
}
Function getVmGeneration
{
$VSSettingData = $args[0]
If($VSSettingData.VirtualSystemSubType -eq $null) ### WS2012
{
$vmGgeneration = "1"
}
Else ### WS2012R2 or later
{
$subType = $VSSettingData.VirtualSystemSubType.split(":")
$vmGgeneration = $subType[3]
}
return $vmGgeneration
}
Function getHeartBeatInfo
{
$heartbeatComponent = $args[0]
If ( $heartbeatComponent.StatusDescriptions -ne $null )
{
$heartbeat = $HeartbeatComponent.OperationalStatus[0]
$strhbPrimaryStatus = getHBOperationalStatus($heartbeat)
}
}
Function getVMEnabledState
{
$vmStatus = $args[0]
# http://msdn.microsoft.com/en-us/library/hh850116(v=vs.85).aspx
switch ($vmStatus)
{
0 {$EnabledState = "Unknown"}
1 {$EnabledState = "Other"}
2 {$EnabledState = "Running(Enabled - 2)"}
3 {$EnabledState = "Off(Disabled - 3)"}
4 {$EnabledState = "Shutting down(4)"}
5 {$EnabledState = "Not Applicable(5)"}
6 {$EnabledState = "Saved(Enabled but Offline - 6)"}
7 {$EnabledState = "In Test(7)"}
8 {$EnabledState = "Deferred(8)"}
9 {$EnabledState = "Quiesce(9)"}
10 {$EnabledState = "Starting(10)"}
}
return $EnabledState
}
Function getHBOperationalStatus
{
$hbStatus = $args[0]
# http://msdn.microsoft.com/en-us/library/hh850157(v=vs.85).aspx
switch ($hbStatus)
{
2 {$hbPrimaryStatus = "OK"}
3 {$hbPrimaryStatus = "Degraded"}
7 {$hbPrimaryStatus = "Non-Recoverable Error"}
12 {$hbPrimaryStatus = "No Contact"}
13 {$hbPrimaryStatus = "Lost Communication"}
15 {$hbPrimaryStatus = "Paused"}
default {$hbPrimaryStatus = "N/A"}
}
return $hbPrimaryStatus
}
Function getHBSecondaryStatus
{
$hbStatus2 = $args[0]
# http://msdn.microsoft.com/en-us/library/hh850157(v=vs.85).aspx
switch ($hbStatus2)
{
2 {$hbSecondaryStatus = "OK"}
32775 {$hbSecondaryStatus = "Protocol Mismatch"}
32782 {$hbSecondaryStatus = "Application Critical State"}
32783 {$hbSecondaryStatus = "Communication Timed Out"}
32784 {$hbSecondaryStatus = "Communication Failed"}
default {$hbSecondaryStatus = "N/A"}
}
return $hbSecondaryStatus
}
###
### MAIN
###
$osVersion = [environment]::OSVersion.Version
$TestPath = Test-Path "C:\Windows\System32\vmms.exe"
If (($TestPath -eq $False) -or ($osVersion.Build -lt 9200))
{
"Hyper-V basic information cannot be collected on this system." | WriteTo-StdOut
"Hyper-V is installed: $TestPath" | WriteTo-StdOut
"OS version is build $OSVersion" | WriteTo-StdOut
}
Else
{
$hostName = hostname
$VMs = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ComputerSystem' | Where-Object { $_.ElementName -ne $hostName}
$VSMgtServiceSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemManagementServiceSettingData'
showHVGlobalSettings $VSMgtServiceSettingData
showNUMAinfo
("Virtual Machine Settings") | Out-File $Outputfile -Append -encoding UTF8
("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
ForEach ($VM in $VMs)
{
$VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.VirtualSystemType -eq 'Microsoft:Hyper-V:System:Realized' }
("<<<<<<<<<< " + $VM.elementName + " >>>>>>>>>>") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
showVMBasicinfo $VM $VirtualSystemSettingData
### Hyper-V UI settings
showBIOSinfo $VirtualSystemSettingData
showMeminfo $VirtualSystemSettingData
showCPUinfo $VirtualSystemSettingData
# We don't get IDE info in case of Gen2VM as IDE does not exist.
$vmGeneration = getVmGeneration $VirtualSystemSettingData
If($vmGeneration -eq "1")
{
showIDEHardDriveinfo $VM
}
showSCSIHardDriveinfo $VM
showNetworkAdapterinfo $VirtualSystemSettingData
showComPortinfo $VM
If($vmGeneration -eq "1")
{
showFloppyDriveinfo $VM
}
showICinfo $VirtualSystemSettingData
showSnapshotFileinfo $VirtualSystemSettingData
showSmartPagingFileinfo $VirtualSystemSettingData
showAutomaticActioninfo $VirtualSystemSettingData
### Additional info
showSnapshotInfo $VM
showKVPItems $VM $VirtualSystemSettingData
# Get replication info if it is enabled
if ($VM.ReplicationState -ne 0)
{
("Detected Hyper-V replica enabled...") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
showReplicationinfo $VM
}
("") | Out-File $Outputfile -Append -encoding UTF8
("================================================================================") | Out-File $Outputfile -Append -encoding UTF8
("") | Out-File $Outputfile -Append -encoding UTF8
}
showHVFileVersion
CollectFiles -filesToCollect $OutputFile -fileDescription $FileDescription -sectionDescription $SectionDescription -renameOutput $false
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEtmMqo9c5RMNT
# 0i6yeLSjp5NTQg3w+ms9Fd4xXeF5haCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHvqipDCrkecCbyXhN/puvpO
# hG0xJ3VcZnYJO4v2nqsbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEArsR+InkXBsENsndZR2fh+rvqy0XJlhg7FHuZVx7V2hdjA/mHjV8d0pGX
# RxlhOVL3knRbDL5+5NfhG9FJIMXKbRAEj5tsVuovY9Y/v4m1a0qiLDWZBKaOWIeA
# vlH/XzaXo8xeA9zsaaGZ9y+lQ0iGLRtboqAh2xc1dpewFMn03h6meYKsnQa140vW
# h3wnbob+LwC+AUX73IiPPKyZQ848DXkDoISzD8HdGI69dbwDoV3mCFyYl2D8tZQj
# kjL//y9igwHXuS/JNOf7epL0rrQWbL2WDwZrTV4KJ85sTR5U3RYWTvqZiiUGZjQO
# ey1MilKPvCOxZnO6bQK5MY6rXqcanKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCkrTCCFDigsb5QDsoFVgmAUH2xwgnbNAPXHFIyAyqW8wIGZxqBxlhS
# GBMyMDI0MTAyODExNDA0Ni45NzRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw
# M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H
# AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA
# trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX
# ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2
# JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s
# 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr
# LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCA5b/AlMmKHF3uUknjmVsMXU8vClEHgTHCoC8beyLjTujCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ
# T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX
# s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAHa1XcmsSsJbRrZfWr8tECj+8
# 59UVjHiT93y2Z1VZlKSNztMVxcStm9WsDiZGWsB5pQVYe5QFCvvusnWhXru57Tdr
# 3cC0PSN5e97CUo1DhVVcs7jBATunf+KZ+N8MnCCtRRcC5wBYPz9yJfErIASWho3d
# ULaAmDs+NcwxrCuvyEaneFaHlFsN69+9SroH1q/4KF48Q89OW8gmIw46AnxtLffF
# MkkND6qNvnh9xUJjDh+avywOZhDOV6MOjVY4Md08KcQC8lVJEkseLixlFyFgq6ql
# mVVKxMMkW+abiAgZ1bGnr3fbGJXcBn50w1Gl4p53ElOLDivGDEIisW9QPGiV324j
# FGY6lfplPluF6X5qAgSIReh58c9L95FNKezKdLdFYiPlWo/hjlaAvc9QC9I52Z15
# q+dIEm5xxyXUySNUHAVH8q/Wut+BXXNfOj4ocIdhvi6iRaYDJ0M4ShaZra3j5NgV
# m8LHJkNxQzSxq07eClpbquEZKSYXvbpa5ksn2z8WJ1ACdieXhu0IsTn/Lwkz/pLl
# 9JtJB6ox4CfB/ZkmJL0YbIEXF71zqmme21/bo0lKuTCwJhuSwvxCFPibO6s7/crS
# 2nuluZ40VvA09U9DJyV07iEaYIEw04DEeJSQw1OhkRANtH9LBKXIZFh2ocegyXGX
# 0G3Qw667qUvLUEeYh2Q=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_3_61.ps1
|
sample_3_61.ps1
|
ConvertFrom-StringData @'
id_systemfiles_title=System Files
id_systemfiles_status=Collecting System Files
id_systemfilesdirectorylistings_title=System Files Directory Listings
id_systemfilesdirectorylistings_status=Collecting System Files Directory Listings
id_systemfilesacllistings_title=System Files ACL Listings
id_systemfilesacllistings_status=Collecting System Files ACL Listings
id_dcompermissions_title=DCOM Permissions
id_dcompermissions_status=Collecting DCOM Permissions
id_environmentvariables_title=Environment Variables
id_environmentvariables_status=Collecting Environment Variables
id_ipconfig_title=IPConfig
id_ipconfig_status=Collecting IPConfig
id_systempolicies_title=System Policies
id_systempolicies_status=Collecting System Policies
id_proxysettings_title=Proxy Settings
id_proxysettings_status=Collecting Proxy Settings
id_etllogs_title=ETL Logs
id_etllogs_status=Collecting ETL Logs
id_rootcertificates_title=Root Certificates
id_rootcertificates_status=Collecting Root Certificates
id_runningservices_title=Running Services
id_runningservices_status=Collecting Running Services
id_otherlogs_title=Other Logs
id_otherlogs_status=Collecting Other Logs
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3Rq26OvTBcD52
# orzeRWGllCq2lvdJSTdxO5HlQFqAyaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBw+
# ricoCZSZIxSsTvnL3Jqxo/a7RHFjSVSgnlQaWNXEMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAmxZ+xUkUqVIVWS/NwFW2RLUuHzYVXXquM4H8
# /1sYGKSydYc94/Gd2z+M6F454d8GO4J1v0bu2i+PH5PuQs82uJrAyUKJihTCmaFG
# LP4RHW6ygJYnCdI82T356EduQ+CmuelWPmoRgDPbNcttcDMfYkKGncQ/Vmh9k3Ne
# MWrrF8WTyw5qstdkmeucIyZj5QG2aXUHnePyW6YFTInXalgq9ngGX/YADJVTXtO4
# AxIkSp3c5IK1zea+tSwMFAazWVZ60ysgUeVPzIICHHSzMdgiOd9v8ZflS+E+JS9b
# 0gwqkkX4T5zi5tGZa1qjlTplDvOsRa8dbkZyt5J8vOAd/j/XSaGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAvJDGWd0+kKOSmMEcaJwjiYYHUGtIMC1+S
# SHqIVmBkqgIGZuto66IiGBMyMDI0MTAyODExNDA0MC40MTVaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL
# bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV
# +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB
# U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY
# EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV
# urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC
# yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK
# pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp
# Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8
# zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT
# ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ
# VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT
# HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ
# MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv
# cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f
# CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT
# DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh
# Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG
# DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+
# //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx
# /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk
# 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz
# 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0
# MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA
# AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV
# cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0
# aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ
# GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz
# QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw
# /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgKZzcqM522l3FBq9x1Ba2q58RheWVN9erFiCsi+PaFTkwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY
# qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4
# qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAFN0vQT8CacdrHTsmRZv5aePx2grM1s0
# VmOBlVEKmnn4ieSlmNxAY4U9Jff2Kg23rNI015HozFGPCXhmcBOBPU64/2ecKLqt
# UyKVEEYq2qk5JXeMchVSlTLNiioNSOuwBDk6e7bkoZ5w7f1xE/e+5kwB5Rq2oLpO
# XGI7cSkWyLvRQSQvV7Bx7YqYCbhpP87R16BezTcpVSt2xGnIkpCD6GpEF1Yqz0go
# wpaJERB7gRWQz1lkEwmMeiCW2TnEF7oKK6UJWxx7V5hjyolTWlG81R+8V37Lyjgw
# IMhDk/4zm0grK8UxTVnB8SMWIfWhiHw/evX8oY6KRyhEatMiBi4wXVvGZN7WX4Sj
# SvEH5KskA7ticB28azk4CbOPx4iZQM11uuVaik/pmXThMJ8Z2soF6qUl/VExxvvP
# H6uoqcHoluTf238S7+fjKBcWvQRmKjp0Zw9p7h1yv8wGW3wqxgd9JPRasCl9sy5Y
# D1zOMMg7USj/0L1uUm0aPJgHEFcuhjmLXfY5D0XyLXWo1sGUOA8hvH9VFdNbbXAH
# 37YDA4/CW7cN8oj2neA19y1sjuU9MSLSjGERx2QmEZ20Dqe934+7Uh9108zdZBXY
# B8X2CuTSBspQMId40SLZSRRvkv/CmjN2NXWkJerGxbeMWqMo7rSv+bavfO230IAK
# bbLAEZiF8A1u
# SIG # End signature block
|
combined_dataset/train/non-malicious/WCF code coverage.ps1
|
WCF code coverage.ps1
|
param($msBuildTarget, $configurationName, [bool]$deleteInstrumentedAssemblies)
#-------------------------------------
# Script to compile coverage for a WCF
# solution running in IIS.
# See:
# http://geekswithblogs.net/EltonStoneman/archive/2011/10/14/end-to-end-wcf-code-coverage-with-powershell.aspx
#-------------------------------------
#-------------------------------------
# Function to get the running app pool
#-------------------------------------
function get-apppool{
[regex]$pattern="-ap ""($appPoolName)"""
gwmi win32_process -filter 'name="w3wp.exe"' | % {
$name=$_.name
$cmd = $pattern.Match($_.commandline).Groups[1].Value
$procid = $_.ProcessId
New-Object psobject | Add-Member -MemberType noteproperty -PassThru Name $name |
Add-Member -MemberType noteproperty -PassThru AppPoolID $cmd |
Add-Member -MemberType noteproperty -PassThru PID $procid
}
}
#---------------------------------------
# Function to get the id of the app pool
#---------------------------------------
function get-apppoolpid{
$appPoolPid = 0
$appPools = get-apppool
foreach ($appPool in $appPools){
if ($appPool.AppPoolID -eq "$appPoolName"){
$appPoolPid = $appPool.PID
}
}
write-host "$solutionFriendlyName app pool PID: $appPoolPID"
return $appPoolPid
}
#------------------------------------------------
# Starts the app pool by making a service request
#------------------------------------------------
function start-apppool{
#ping the service to start a new app pool process:
$uri = new-object System.Uri("$wakeUpServiceUrl")
$client = new-object System.Net.WebClient
$client.DownloadString($uri) | out-null
}
#-------------------
# Kills the app pool
#-------------------
function kill-apppool{
$procId = get-apppoolpid
if ($procId -ne 0){
write-host "Killing app pool process"
$proc = [System.Diagnostics.Process]::GetProcessById($procId)
$proc.Kill()
}
}
#------------------------------------------------------------------------------
# Instruments an assembly for code coverage, excluding the specified namespaces
#------------------------------------------------------------------------------
function instrument2([string]$assemblyName, [string[]]$excludes){
$assy = "$websiteBinDirectory\\$assemblyName"
$excludeLine = ""
if ($excludes -ne $null){
foreach ($x in $excludes){
write-host "Excluding: $x.*"
$excludeLine = "$excludeLine-exclude:$x.* "
}
}
$cmd = "C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe"
write-host "Executing $cmd /coverage $excludeLine $assy"
& $cmd /coverage "$excludeLine" "$assy"
}
#------------------------------------------------------------------------------
# Instruments an assembly for code coverage, excluding the specified namespaces
#------------------------------------------------------------------------------
function instrument([string]$assemblyName, [string[]]$excludes){
$assy = "$websiteBinDirectory\\$assemblyName"
#ES - this doesn't work as the ":" in exlucde gets parsed out by PS:
#$excludeParms = ""
#$args
#foreach($exclude in $args){
# $excludeParms = $excludeParms + '/exclude:' + $exclude + '.* '
#}
#$excludeParms
#& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $excludeParms $assy
if ($excludes -eq $null){
write-host "Excluding 0 funcspecs"
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $assy
}
elseif ($excludes.Length -eq 0){
write-host "Excluding 0 funcspecs"
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $assy
}
elseif ($excludes.Length -eq 1){
write-host "Excluding 1 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $assy
}
elseif ($excludes.Length -eq 2){
write-host "Excluding 2 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
$exclude2 = '-exclude:' + $excludes[1]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $assy
}
elseif ($excludes.Length -eq 3){
write-host "Excluding 3 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
$exclude2 = '-exclude:' + $excludes[1]
$exclude3 = '-exclude:' + $excludes[2]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $assy
}
elseif ($excludes.Length -eq 4){
write-host "Excluding 4 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
$exclude2 = '-exclude:' + $excludes[1]
$exclude3 = '-exclude:' + $excludes[2]
$exclude4 = '-exclude:' + $excludes[3]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $assy
}
elseif ($excludes.Length -eq 5){
write-host "Excluding 5 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
$exclude2 = '-exclude:' + $excludes[1]
$exclude3 = '-exclude:' + $excludes[2]
$exclude4 = '-exclude:' + $excludes[3]
$exclude5 = '-exclude:' + $excludes[4]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $exclude5 $assy
}
elseif ($excludes.Length -eq 6){
write-host "Excluding 6 funcspecs"
$exclude1 = '-exclude:' + $excludes[0]
$exclude2 = '-exclude:' + $excludes[1]
$exclude3 = '-exclude:' + $excludes[2]
$exclude4 = '-exclude:' + $excludes[3]
$exclude5 = '-exclude:' + $excludes[4]
$exclude6 = '-exclude:' + $excludes[5]
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $exclude5 $exclude6 $assy
}
}
#-----------------------------------
# Starts instrumenting W3WP app pool
#------------------------------------
function start-instrumentation{
#set instrumentation on:
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfclrenv' /globaltraceon
#restart the app pool and store the ID:
kill-apppool
start-apppool
$procId = get-apppoolpid
#start instrumenting:
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /START:COVERAGE /OUTPUT:$coverageOutputPath /CS /USER:$appPoolIdentity
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /ATTACH:$procId
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /status
}
#--------------------
# Stops instrumenting
#--------------------
function stop-instrumentation{
#stop instrumenting & reset app pool:
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /DETACH
kill-apppool
& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /SHUTDOWN
}
#------------------------
# Exports coverage to XML
#------------------------
function export-coverage{
#export the coverage file to XML:
[System.Reflection.Assembly]::LoadFile("C:\\Program Files\\Microsoft Visual Studio 10.0\\Common7\\IDE\\PrivateAssemblies\\Microsoft.VisualStudio.Coverage.Analysis.dll")
$coverage = [Microsoft.VisualStudio.Coverage.Analysis.CoverageInfo]::CreateFromFile("$coverageOutputPath")
$dataSet = $coverage.BuildDataSet()
$dataSet.WriteXml("$coverageOutputPath" + 'xml')
}
#----------------------------------------------------------------------------------
# Deletes instrumented assemblies, and reinstates original un-instrumented versions
#----------------------------------------------------------------------------------
function delete-intstrumentedassemblies{
$dir = new-object IO.DirectoryInfo($websiteBinDirectory)
$originalAssemblies = $dir.GetFiles("*.dll.orig")
foreach ($originalAssembly in $originalAssemblies){
$targetName = $originalAssembly.FullName.TrimEnd(".orig".ToCharArray())
#overwrite the instrumented DLL with the original:
[IO.File]::Copy($originalAssembly.FullName, $targetName, $true)
[IO.File]::Delete($originalAssembly.FullName)
#delete the instrumented PDB:
$instrumentedPdbName = $originalAssembly.FullName.TrimEnd(".dll.orig".ToCharArray()) + ".instr.pdb"
[IO.File]::Delete($instrumentedPdbName)
}
}
#--------------
# Script begins
#--------------
#set variables:
$solutionFriendlyName = 'XYZ'
$wakeUpServiceUrl = 'http://localhost/x.y.z/Service.svc'
$appPoolName = 'ap_XYZ'
$appPoolIdentity = 'domain\\svc_user'
$websiteBinDirectory = 'c:\\websites\\xyz\\x.y.z.Services\\bin'
$coverageOutputPath = "Test.coverage"
#instrument assemblies:
# - instrument assembly so ALL namespaces are included in coverage
instrument "x.y.z.Services.dll"
# - instrument assembly so anything from the Ignore1 and Ignore2 namespaces are excluded from coverage
instrument "x.y.z.Core.dll" 'x.y.z.Core.Ignore1.*' , 'x.y.z.Core.Ignore2.*'
write-host "Before starting instrumentation, last exit code: $LASTEXITCODE"
#instrument W3WP, run tests & export results:
start-instrumentation
write-host "Before running tests, last exit code: $LASTEXITCODE"
& 'C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\msbuild.exe' Build.proj /t:$msBuildTarget /p:ConfigurationName=$configurationName
$realExitCode = $LASTEXITCODE
write-host "Before stopping instrumentation, last exit code: $LASTEXITCODE, real exit code: $realExitCode"
stop-instrumentation
export-coverage
export-coverage
if ($deleteInstrumentedAssemblies -eq $true){
delete-intstrumentedassemblies
}
write-host "Before existing, last exit code: $LASTEXITCODE, real exit code: $realExitCode"
exit $realExitCode
#------------
# Script ends
#------------
|
combined_dataset/train/non-malicious/4241.ps1
|
4241.ps1
|
function Get-PassPol
{
$domain = [ADSI]"WinNT://$env:userdomain"
$Name = @{Name='DomainName';Expression={$_.Name}}
$MinPassLen = @{Name='Minimum Password Length (Chars)';Expression={$_.MinPasswordLength}}
$MinPassAge = @{Name='Minimum Password Age (Days)';Expression={$_.MinPasswordAge.value/86400}}
$MaxPassAge = @{Name='Maximum Password Age (Days)';Expression={$_.MaxPasswordAge.value/86400}}
$PassHistory = @{Name='Enforce Password History (Passwords remembered)';Expression={$_.PasswordHistoryLength}}
$AcctLockoutThreshold = @{Name='Account Lockout Threshold (Invalid logon attempts)';Expression={$_.MaxBadPasswordsAllowed}}
$AcctLockoutDuration = @{Name='Account Lockout Duration (Minutes)';Expression={if ($_.AutoUnlockInterval.value -eq -1) {'Account is locked out until administrator unlocks it.'} else {$_.AutoUnlockInterval.value/60}}}
$ResetAcctLockoutCounter = @{Name='Reset Account Lockout Counter After (Minutes)';Expression={$_.LockoutObservationInterval.value/60}}
$domain | Select-Object $Name,$MinPassLen,$MinPassAge,$MaxPassAge,$PassHistory,$AcctLockoutThreshold,$AcctLockoutDuration,$ResetAcctLockoutCounter
}
$PassPol = Get-PassPol
Write-Output 'Domain Password Policy: '
Write-Output $PassPol
|
combined_dataset/train/non-malicious/35.ps1
|
35.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
$name
)
$graphApiVersion = "Beta"
$DCP_resource = "deviceManagement/deviceConfigurations"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Remove-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
$id
)
$graphApiVersion = "Beta"
$DCP_resource = "deviceManagement/deviceConfigurations"
try {
if($id -eq "" -or $id -eq $null){
write-host "No id specified for device configuration, can't remove configuration..." -f Red
write-host "Please specify id for device configuration..." -f Red
break
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$CP = Get-DeviceConfigurationPolicy -name "Test Graph Policy"
if($CP){
if(@($CP).count -gt 1){
Write-Host "More than one device configuration policy has been found, please specify a single device configuration policy..." -ForegroundColor Red
Write-Host
}
elseif(@($CP).count -eq 1){
Write-Host "Removing device configuration policy" $CP.displayName -ForegroundColor Yellow
Remove-DeviceConfigurationPolicy -id $CP.id
}
}
else {
Write-Host "Device Configuration Policy doesn't exist..."
Write-Host
}
|
combined_dataset/train/non-malicious/38d536b5-87f9-4725-b346-64260dcc55ec.ps1
|
38d536b5-87f9-4725-b346-64260dcc55ec.ps1
|
function Invoke-JQuery
{
<#
.SYNOPSIS
Function to Invoke JQuery commands via IE COM
.DESCRIPTION
Invokes JQuery (or plain Javascript) commands via InternetExplorer.Application COM object,
after initial injection of JQuery reference in header section.
Useful to utilize JQuery selectors and functions for IE automation.
.PARAMETER IE
Initialized InternetExplorer.Application COM object
.PARAMETER Command
JQuery/Javascript to Invoke
.PARAMETER Function
Function to add in header section
.PARAMETER Initialize
Switch to initially inject JQuery in header section.
.EXAMPLE
$ie = new-object -com internetexplorer.application
$ie.visible = $true
$ie.navigate2("http://www.example.com")
# Wait for page load
while($ie.busy) {start-sleep 1}
#add addtional div to store results
$div="<div id='myResult'>"
$ie.Document.body.innerHTML += $div
#hide anchor tags
Invoke-JQuery $ie '$("a").hide();' -Initialize
#change innerhtml of div
Invoke-JQuery $ie 'var str=$("p:first").text();$("#myResult").html(str);'
#retrieve the value
$result = $ie.document.getElementById("myResult").innerHtml
$jFunc=@"
function SelectText(element) {
var text = document.getElementById(element);
var range = document.body.createTextRange();
range.moveToElementText(text);
range.select();
}
"@
Invoke-JQuery $ie -Function $jFunc
Invoke-JQuery $ie 'SelectText("myResult");'
#>
[cmdletbinding()]
param(
[parameter(position=0, mandatory=$true)]
$IE,
[parameter(position=1,mandatory=$false)]
$Command,
[parameter()]
$Function,
[parameter()]
[switch]$Initialize
)
if ($Initialize -or $Function){
$url='http://code.jquery.com/jquery-1.4.2.min.js'
$document = $IE.document
$head = @($document.getElementsByTagName("head"))[0]
$script = $document.createElement('script')
$script.type = 'text/javascript'
}
if ($Initialize){
$script.src = $url
$head.appendChild($script) | Out-Null
}
if ($Command){$IE.document.parentWindow.execScript("$Command","javascript")}
if ($Function){
$script.text = $Function
$head.appendChild($script) | Out-Null
}
}
|
combined_dataset/train/non-malicious/sample_21_26.ps1
|
sample_21_26.ps1
|
###########################################################
#
# 'ExtensionService' module
#
###########################################################
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
Import-Module "$PSScriptRoot\ServiceHelper.psm1"
$script:GCInstallPath = "$PSScriptRoot\..\..\.."
$script:GCBinariesFolderName = "GC"
$script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName
$script:OperationRetryCount = 5
<#
.SYNOPSIS
Install Guest Configuration Extension Service.
.Example
Install-ExtensionService
#>
Function Install-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Install-ExtensionService"
$ServiceType = "Extension"
$gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config'
'{ "ServiceType": "Extension" }' | Out-File $gcConfigPath -Encoding utf8
New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory
Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath)
$packagesPath = Join-Path $env:SystemDrive 'Packages'
$extensionInstallPath = Join-Path $packagesPath 'Plugins'
if (!(Test-Path -Path $extensionInstallPath))
{
# Create extension install directory if it doesn't exist
New-Item $extensionInstallPath -Force -ItemType Directory
}
Set-AclPermissions -ServiceType $ServiceType -Path $extensionInstallPath
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
# Install GC Service and verify it is installed correctly.
Install-ServiceInternal -ServiceType "Extension"
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Enable and start Guest Configuration Extension Service.
.Example
Enable-ExtensionService
#>
Function Enable-ExtensionService {
[CmdletBinding()]
Param()
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Enable-ExtensionService"
$ServiceType = "Extension"
Start-ServiceInternal -ServiceType $ServiceType
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Uninstall Guest Configuration Extension Service.
.Example
Uninstall-ExtensionService
#>
Function Uninstall-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Uninstall-ExtensionService"
$ServiceType = "Extension"
# Unregister GC Service
Uninstall-ServiceInternal -ServiceType $ServiceType
}
<#
.SYNOPSIS
Update Guest Configuration Extension service.
.Example
Update-ExtensionService
#>
Function Update-ExtensionService{
[CmdletBinding()]
Param()
Write-Verbose -Message "In Update-ExtensionService"
}
Export-ModuleMember -Function @(
'Install-ExtensionService',
'Enable-ExtensionService',
'Uninstall-ExtensionService',
'Update-ExtensionService'
)
# SIG # Begin signature block
# MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALlNBTkFMvQNzJ
# babyhzSqcfsu9XXh3hKpjS5zPO2U2KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICd6
# lDcaMbiGzvIuiPF29+5B15kGK6LA3sYRwkqpr26SMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAy5Flbs5eFTol2aQyj3h130aY0h5cEXScLBNV
# 0J3K6G3TNXdyZiSFwmKxrtDYf52hzRwbBTXA2stgK1l5+HcWP8Q1HWPs7ZMgReyJ
# svfj0J2XNisTAaFuIYmi3Mkfer4opEukEu5HklLpmgRxJygFQS0yyspq6yVzdRai
# CQb+Ds8lMAy3WCBsIKOOn3Gs4T60jtrSa+kKz9fAJhnkLaS+jnlLk82cXHt89u0K
# 1VC4jzrs6cWvX6L4oWQJq+EUp8mtP2rQ0QbBNXfi9uJFXehbIUOkJ2Is5T4QTRQ2
# hxql9Nl0tcIp5J/sc3if7EnXNYUTcPcBFk35pJC8aZuyyyElaaGCFygwghckBgor
# BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCByBk8mGWOerRUJctU4GFpGWqRZsOwWSQz8
# NtbmxmbhfwIGZh/d1CZAGBMyMDI0MDQxNzE0NDMyNC4zNzRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHg1Pwf
# ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH
# nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK
# s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+
# yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y
# cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J
# 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+
# yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb
# cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd
# YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK
# XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/
# obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx
# yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64
# tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK
# nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ
# RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa
# VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC
# PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61
# rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK
# i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN
# odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ
# XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O
# W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx
# 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnKXFQwIhgPMjAyNDA0MTcyMjMzNTZaGA8yMDI0MDQx
# ODIyMzM1NlowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6cpcVAIBADAGAgEAAgEF
# MAcCAQACAhE/MAoCBQDpy63UAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB
# hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA
# YKXBk+c4g6pUrtj19UP/7rMM6a/6zTbayuE+hVnnnOe5vttZVtGP+ew7AST+BoRY
# St6AlHjgeXA5kNLol9J/0Rs2kJoTKQA6L0TxYm5Hw/GtRv2F5+OKyPmnAmnnRlpf
# ZsWt7v9JiD5mKkTjcYGa29P/xWqgp5xzcTVUpKwGtQsxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+XQABAAAB
# 4DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDgTxby+OfMpdeCg5hzphAiFW1p5KB6kwIpDnNi/4yb
# KTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOPuUr/yOeVtOM+9zvsMIJJv
# hNkClj2cmbnCGwr/aQrBMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwIgQgi32+uBM5JnOMxmxCYghA41vB
# 43U6XthUpo8z5tkvi5MwDQYJKoZIhvcNAQELBQAEggIAh4lxUxjlg9xbtCJUzNey
# XJfw+Hy75MydmDHMTV2RX3k8Gmd5QSUcWR5Xlqe1V38WN8GL44GEaYINC+qiADLg
# sX0y0Dp63DaupYlWs/iKheqrd6d8jQ5vlUj58jdCrLRSj6Y8znTK2CVeU8x/vzbh
# 1vyxVJJvBxEl8J1I2VpM+euphFjSMx1eI0gqA1yj1JlHCMD0QWrmJprTcvnYPJMi
# SlrxEUxTfIus47+fqHQW5PIOKQm09XZ0fGR5I0Oe7hHH+wKY96g6lFZNykSu7b7I
# ZEQ/l3lHVAkMM/TtwfjfEkXTk6Y/iN6giJwYpkHljPWNZfsaPpbhVSXuYKfqVl7T
# gywYdB0ygwHyn4RGxwbWmgSLop232ccMh7hLfYqVuWTdnQZtcegADjAQohHVVw73
# 0/UdXkatiJauxkv51Et8z70bY1nbS6JCUqmKy6OppB6nFjzvdEO6d7Uy82C4hoA+
# vyZrEVTnnn9mPqc4dv5PhwTl5EzQ2PQ6fse2Z6OfzJbzDTwoE9gtsc6/hD0nQlL8
# dQPKaO/SMNS7ts5HpEgMfXXI9gdMhpooWdjNeVgZ+nlQm5qDBYhABVTs8JicigUf
# neU285I8HuMN39XVuj1adOm2L34v+il/sSu9Hj/CUJ2rDf2TZZvm+VjAVBHtBHGr
# EqYdFDpK3nOsCCNkKRgI4AQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4399.ps1
|
4399.ps1
|
function Get-PackageManagementProviderName
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Uri]
$Location
)
$PackageManagementProviderName = $null
$loc = Get-LocationString -LocationUri $Location
$providers = PackageManagement\Get-PackageProvider | Where-Object { $_.Features.ContainsKey($script:SupportsPSModulesFeatureName) }
foreach($provider in $providers)
{
if($provider.ProviderName -eq $script:PSModuleProviderName)
{
continue
}
$packageSource = Get-PackageSource -Location $loc -Provider $provider.ProviderName -ErrorAction SilentlyContinue
if($packageSource)
{
$PackageManagementProviderName = $provider.ProviderName
break
}
}
return $PackageManagementProviderName
}
|
combined_dataset/train/non-malicious/sample_34_72.ps1
|
sample_34_72.ps1
|
#
# Module manifest for module 'Az.ServiceBus'
#
# Generated by: Microsoft Corporation
#
# Generated on: 5/16/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.ServiceBus.psm1'
# Version number of this module.
ModuleVersion = '4.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = 'ced192ca-b6cd-4848-90dc-b83a5970befc'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - Service Bus service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core.
For more information on Service Bus, please visit the following: https://learn.microsoft.com/azure/service-bus/'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Microsoft.Azure.Management.ServiceBus.dll',
'ServiceBus.Autorest/bin/Az.ServiceBus.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'ServiceBus.Autorest/Az.ServiceBus.format.ps1xml',
'ServiceBus.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('ServiceBus.Autorest/Az.ServiceBus.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Approve-AzServiceBusPrivateEndpointConnection',
'Complete-AzServiceBusMigration',
'Deny-AzServiceBusPrivateEndpointConnection',
'Get-AzServiceBusAuthorizationRule',
'Get-AzServiceBusGeoDRConfiguration', 'Get-AzServiceBusKey',
'Get-AzServiceBusMigration', 'Get-AzServiceBusNamespace',
'Get-AzServiceBusNetworkRuleSet',
'Get-AzServiceBusPrivateEndpointConnection',
'Get-AzServiceBusPrivateLink', 'Get-AzServiceBusQueue',
'Get-AzServiceBusRule', 'Get-AzServiceBusSubscription',
'Get-AzServiceBusTopic', 'New-AzServiceBusAuthorizationRule',
'New-AzServiceBusGeoDRConfiguration',
'New-AzServiceBusIPRuleConfig', 'New-AzServiceBusKey',
'New-AzServiceBusKeyVaultPropertiesObject',
'New-AzServiceBusNamespace', 'New-AzServiceBusQueue',
'New-AzServiceBusRule', 'New-AzServiceBusSubscription',
'New-AzServiceBusTopic', 'New-AzServiceBusVirtualNetworkRuleConfig',
'Remove-AzServiceBusAuthorizationRule',
'Remove-AzServiceBusGeoDRConfiguration',
'Remove-AzServiceBusMigration', 'Remove-AzServiceBusNamespace',
'Remove-AzServiceBusPrivateEndpointConnection',
'Remove-AzServiceBusQueue', 'Remove-AzServiceBusRule',
'Remove-AzServiceBusSubscription', 'Remove-AzServiceBusTopic',
'Set-AzServiceBusAuthorizationRule',
'Set-AzServiceBusGeoDRConfigurationBreakPair',
'Set-AzServiceBusGeoDRConfigurationFailOver',
'Set-AzServiceBusNamespace', 'Set-AzServiceBusNetworkRuleSet',
'Set-AzServiceBusQueue', 'Set-AzServiceBusRule',
'Set-AzServiceBusSubscription', 'Set-AzServiceBusTopic',
'Start-AzServiceBusMigration', 'Stop-AzServiceBusMigration',
'Test-AzServiceBusName'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'New-AzServiceBusAuthorizationRuleSASToken',
'Test-AzServiceBusNameAvailability'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'Get-AzServiceBusNamespaceV2', 'New-AzServiceBusNamespaceV2',
'Remove-AzServiceBusNamespaceV2', 'Set-AzServiceBusNamespaceV2'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','ServiceBus'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Moved cmdlets to V4.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDTJpAuLuYWhw39
# 8EcL6TWF+WvXigBzw74fH4Zp26TQd6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINRksoKwazyD0JOxzknWDD+U
# BsTv5llPR60NbGuGZLBgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAJnKv+67eXm64PDr9UPprhJvix/0oYC/0bAdhd8dhBbTDShc+qc6bPdoZ
# O2IurlTTvTRvppYby2OKV/vgQD1iALIZBf8yjSM0URDwrdK4nVkDxqw0Mq2ly6Dn
# ruM2zVQjrQmYbAU3ceEvhjT4Ud8xTgo2S1pBvkkVTcYuJ444DtpQyM2LwsPuAhcy
# 244YQyquRlJtXoGiK+M+MzGLOs/ynKIZQcdB7t0j2d8MrhEBbxQAjakZR6YU1lOs
# pY9Fu5PjTShSA7qdQ9XQ+0q+3W+v6Wu66nfRBDUYWw6JPTj7rDlbdvtiGh1pqvN9
# BkerszaN4WwdMWap0+rocpKp+iKKCKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCP8T6xmAUm6tAP9/crHIJ6nqtCtzeIFHnrOpD/QG6rAwIGZjOabFTM
# GBMyMDI0MDUxNjA3MjMzMy43MTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0
# lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt
# XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP
# mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8
# LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT
# 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT
# 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28
# /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu
# bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv
# 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB
# YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl
# JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K
# 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx
# mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u
# 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4
# 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT
# 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6
# ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL
# a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W
# qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp
# InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr
# UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h
# Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL
# cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy
# NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq
# AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p
# RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9
# fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc
# dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru
# var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb
# bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB
# 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCAWXOMavFvxyHnHqqE/p6riCxV0hv2PpajwpkSG3g5g
# qzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db
# cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk
# ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAJ7wANcqaROf8tBAGAqhw
# 2DnaALHhTRTZIKBqMQ7iOQXvlgDAjUNtkai1WJR2LpZd/F7UhcNP62vQAgQ1SxFr
# qbXeH37ZEkstNEvzAPtaRh6/VE4zB4czgY4v1hABXoJw9P7gRLUIdQ1VRPTE5anZ
# HQBcXp5uKwWxgTvxaOBypR1wGBiNAhhbQFInat45bSQi+DHfj3q8PuERkUVlwN+l
# 9Dwu8fsBgrWgNjh/rY5wBrbBYfFEo8p2Rn2HD9hnc6qVspFOcLRTiPHfMLW7WIDY
# O8/vozpTrG7kBNxqMjoj4rV8U8+f+kt/S+ghv8A2moX8+RZq9uLprYZVIcZvt90V
# Xs7dme8MErFM7yvuYpsEFonzuHTCjLSzV+Xjogjc/JzGrt0q78GKeXM9L2xytv3E
# p/GNdOI25ioqYszhJ01DELJWoZPdiBkUFTfBVmZ0B1jyPOZIc8hCTUC8bZQPugv3
# zqr0XfIJAYa5BCz8lstF6n8ijlJrgrCXwAB9qY5bEGgJwKiQVfjwhBR3K8jsFFbC
# MbesahQQ+8zF+iidlZGpmQDrh2SyRZQ2iT6D+g0yn6xBAS3uumTV9KPkO8fohKIg
# ymEavXSIM54KSFcyIC5F0yTn/82XXlrahRAXvwlM712vmBzMFcJ3WvWsFqjHNMQi
# lAiSktltqD9C1mr4eUM8cnY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_50_61.ps1
|
sample_50_61.ps1
|
ConvertFrom-StringData @'
FailoverClustersModuleRequired=Gerekli PowerShell modülü (FailoverClusters) bulunamadı. Yüklemek için Roller ve Özellikler Aracı'nı kullanın: Uzak Sunucu Yönetim Araçları | Özellik Yönetim Araçları | Yük Devretme Kümelemesi Araçları | Windows PowerShell İçin Yük Devretme Küme Modülü.
'@
# SIG # Begin signature block
# MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAt+B9wNWoeEu3A
# IgXAe/Lh8bNhR8MsKLVcxhOXLQnxxaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOYrBJeD8p5KURynfeAi0W/L
# EgnLIT5FbJJ8P1AbnHg3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAtkvxIHou5dUPdyWq9dnIvgA/oJIQoXkZ69yeZ3EJK2fgUPW3VIAeKYef
# JBCHIH3K4x5e4QzwZc/WSSvCgnxTCnUVI1eRLFgW+/k2ucyj6oqHPiBY/vRUfGhg
# N69U72CVxdLGN56tnsBd0dN+vaY0zJz3uu9PNSil6rDWk7QBzwK1nF3MHbTcNOVD
# m0PirxkqGqgYlfKpR1ApY7reO6tALui7wgrJfjM9e3Zyxlibj5tgxPOOcNVvfQaT
# 4cYmzqNmIcMUYRbLMU8wZ8H7ky+gj0QVJXjJBNop+iHuUXDGD6AWC6xMXtFJlm8u
# yFHNkHKeMvxzl6yX7xsW6OODDnHXtaGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC
# FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC2K1fe5FML1ofIgpI1Ur+HlrinW1ST4zMozNi3SGMhFwIGZa6C/0q3
# GBMyMDI0MDEyMjIxMzIwMC41MTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOlZAXgwIhgPMjAyNDAxMjIyMzAwMDhaGA8yMDI0MDEyMzIzMDAwOFowdjA8Bgor
# BgEEAYRZCgQBMS4wLDAKAgUA6VkBeAIBADAJAgEAAgEGAgH/MAcCAQACAhFNMAoC
# BQDpWlL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASXzy0QumYD5FJty8
# CaDX5T5aA/+aFNaT3pHiTpwJtjl3YisVMK9spV4xRtiMCt1N1iNFLsvmBdcl3UwJ
# jbK/5DWZZjPyUEph8Qon/GfrdC35ZDhTI8L93HwuxbYgD+VwNrsDmZGT2gewGnLg
# K5pYatQM1AWj+dtBluuU+3gqzVUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCCWFf0sPb8GvtIrDjjernt5pVKBYAY9urp7P9KJQB48oTCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz
# fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe
# nkielp8oRD0AAQAAAd4wIgQgYj8w3kfC0Jvs9rCNyXm8xM06hS2hsBx8v5ACk2bu
# InAwDQYJKoZIhvcNAQELBQAEggIAXW7YcuW4uSgPSHZK7XTNUIs96RhnffT/yL2U
# U+/FLil4cvqJwyu1fx3w3kPP+oyD+EEPxyxftRJlU2vF+mX5T6pL17EEdz7cqhon
# 6PtWrtIpRzzyOcvcG2PVd2hkxFrmxO0dTVyPAEl2BSyEErK4pp0rtmd/mQHetIIP
# twRtqZEtii6hBh2HrV6OH4xnMeZVagcBP4hLXoSyFq9rfKaTtN6cVmKpuBNoT81b
# dwqBYiDU7Dq0t4JAHXuW0lghNsO29k48v5Y1P0puDl8T2HTeNejuV5S76TjydVo4
# JpVcCa9SelZWR6Ygh5q9WDb2QpDpnK4rY1ZXJLw8/2G5DSB5LqXYxmOycqiwHcBh
# YUfX0Rr0+jiYRWSX3+KQxgFkhNb4ahAhJ3cdmMEeEvE7S/5HapUsdJvuH25C+5Gr
# d/GvZp3m5TqyO9qOGWMes6+HTaFrKRl+kEIyggUEwMl+NzVNPRIsOoQyirjirCMG
# YHdk4Hr8mJkgWgP7w3CO8NeWRrtqD5zweoJznR4EVfg49TdsVhk1MJuaeDnGxn4O
# ay/tbjXy2BC6VrmcMKqAa61TcAwfv9DNoxPxQcU6hwRwBPDTvWvAHSJjz6vzJpKW
# yYDGFnwcJk1BwoQDiZeGQ4yBLuHeOc2sJbR7I8Be8drBzA8hauILwlPqbPAshr4D
# 4aCDJao=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1069.ps1
|
1069.ps1
|
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Test-ShouldTestUncPath
{
Assert-True (Test-UncPath -Path '\\computer\share')
}
function Test-ShouldTestRelativePath
{
Assert-False (Test-UncPath -Path '..\..\foo\bar')
}
function Test-ShouldTestNtfsPath
{
Assert-False (Test-UncPath -Path 'C:\foo\bar\biz\baz\buz')
}
|
combined_dataset/train/non-malicious/sample_9_20.ps1
|
sample_9_20.ps1
|
#************************************************
# DC_DfsrInfo.ps1
# Version 1.2.0
# Date: 4/19/2010
# By Craig Landis (clandis@microsoft.com)
#************************************************
# 2019-03-17 WalterE added Trap #_# nneds check for DFSrDiag.exe / OSversion?
# 2023-02-08 fix 'CHOICE /T 20 /C 123q'
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
function MenuDiagInput-CollectDFSR{
Write-Host -ForegroundColor Yellow "============AD Collect DFSR Information =============="
Write-Host "1: Collect All (=default)"
Write-Host "2: Collect All But Health-Reports"
Write-Host "3: Collect Minimal"
Write-Host "q: Press Q to skip"
}
If ((Get-CimInstance -query "Select ProductType from Win32_OperatingSystem").ProductType -ne 1) {
$DFSRkey = "HKLM:\SYSTEM\CurrentControlSet\Services\DFSR"
If (Test-Path $DFSRkey){
Import-LocalizedData -BindingVariable DfsrInfoStrings -FileName DC_DfsrInfo -UICulture en-us
Write-DiagProgress -Activity $DfsrInfoStrings.ID_DfsrInfo -Status $DfsrInfoStrings.ID_DfsrInfoObtaining
$sectionDescription = "DFSR Miscellaneous"
$OutputFile = "DFSR__Progress.txt"
#_#$CollectDFSRInformation_Answer = get-diaginput -id "CollectDFSRInformation"
MenuDiagInput-CollectDFSR
#$Selection = Read-Host "Choose the DFSR Information level"
#$Selection =
CHOICE /T 20 /C 123q /D 1 /M "Choose the DFSR Information level: Press 1,2,3,q=quit [Timeout=20sec]"
#WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $Selection" -shortformat
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $LASTEXITCODE" -shortformat
switch ($LASTEXITCODE)
{
1 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"}
2 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"}
3 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"}
4 {}
default {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"}
}
<#
switch ($CollectDFSRInformation_Answer)
{
"CollectAll" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"}
"CollectAllButHealthReports" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"}
"CollectMinimal" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"}
}
#>
RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "Progress Log"
CollectFiles -filesToCollect "Dfsr*.log" -fileDescription "DFSR Current Log File" -sectionDescription "DFSR Debug Log Files" -renameOutput $false
CollectFiles -filesToCollect "Dfsr*.gz" -fileDescription "DFSR Previous Log file" -sectionDescription "DFSR Debug Log Files" -renameOutput $false
CollectFiles -filesToCollect ($ComputerName + "_DFSR_ConflictAndDeleted.xls") -fileDescription "DFSR Conflicts and Deletes" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Events_Last_72_Hours.xls") -fileDescription "DFSR Events Last 3 Days" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_File_Versions.txt") -fileDescription "DFSR File Versions" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Hotfixes.txt") -fileDescription "DFSR Hotfixes" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Info.txt") -fileDescription "DFSR Configuration Information" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Performance_Data.txt") -fileDescription "DFSR Performance Data" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_DBGUIDs.txt") -fileDescription "DFSR Database GUIDs" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_DfsrMachineConfig.XML") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_DFSR.txt") -fileDescription "DFSR Registry Key" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_TCPIP.txt") -fileDescription "TCPIP Registry Key" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Replica*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Volume*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_Dfsmgmt*.log") -fileDescription "DFS Management Trace Log" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_File_Screens.txt") -fileDescription "FSRM File Screens" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_Quotas.txt") -fileDescription "FSRM Quotas" -sectionDescription "DFSR Miscellaneous"
CollectFiles -filesToCollect "*HealthReport*" -fileDescription "Health Report" -sectionDescription "DFSR Health Reports"
}
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3XQppCIcPWskT
# F5FaHmfo0K67pJpbAnun/w4/3VC+naCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDVYJ3DS+UK1PHeyFdg/GMR9
# uTZdLEal0GiV0kMQLW7OMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkot0NVKSbeuB/n5L33NSg2xciai5trTZXBxEYfhbHRHyPIxTfp2PNxWr
# a7Oc6D0M5GVUPsbOx1TkO6DsngmdnvLGeDOWXJcY2l0tU/99wlpDGKBtT0Atv3b0
# KRW454UZT9OibbTY6i2jgdBI8usmoHBLklOmCFam4+p3DDKrjmSWkGZZXBRfXllD
# ceASnnWfk5qOS1+fEMnuQQKCfNSShvu/ayZkzFGBez16WCCpam7JkY9dJy5Ll96F
# tyjAvfMbVDK7fD4cgE/LZbHWiufwuzCPOb28B/vTZ8arDZvsczDj1uH5W7AxZO7R
# zDPOIFIWGPR0T38MnH81vMPeKrUzgaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDGr0fT4Q8HD1sZ2Ba8V/62uX9OHtUDt9dXC/RtxflOzwIGZutwxmYr
# GBMyMDI0MTAyODExNDA0NS4xNjVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe
# CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq
# U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf
# Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp
# ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw
# UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF
# acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi
# vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8
# /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I
# vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM
# SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92
# BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo
# PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT
# FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A
# Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW
# /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy
# tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h
# 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ
# lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr
# 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU
# PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t
# iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ
# 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx
# f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK
# AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz
# tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0
# teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey
# h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ
# N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI
# Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl
# FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgi31DZ7r24F8L
# TCGjTX6qKoAySMDRtqfL9s0P+3yDOVAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB
# MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB
# CwUABIICAB+dColSLEOJcJ/4gYtlcwDbpawNhquzmiY8A1/BUCSfaYCCn4JC7zD+
# 8wevnKZIxQz+/3EAL4jq3+rAko0pcHWDG3RuSdKvsKLIhP31aqAVRE76AbWpjgzH
# z+D8mvE5PN4h4okzJJuwmRrbrniA6BHHVfG3N3EBiZPSBbyVWMgfS5RfDNQJP/Sc
# Xnv+79H5H0t9j1Lv/67+uMSzBfEZx1+D3m1CVbBVXr8y16IJiiTW7xckBn+YOsjF
# LRj6nssKS+XBkMaq+qxRmNqu7KvP3x7eeow+C0fjjuuAovSmtvEjqSsbVUQTxoXU
# OGL5vmqbyKUXpq8ZvI/fh8Vk2V09l39sGrw475JAGV7dl3UZQa4rqPB9TAAa6y4G
# gbqeKV1LRa9oWsotlxXFEdbUOFuh6DNx2RKd9IDDIQfZYGOxBUwlFV7ld0NPZ7qU
# rDWVh79JysPwer7dWIxhMED5QzVpy1obLXUxzjNrPPw4wDYTyuBQnoiM5pMr9p+B
# yCg9m7/c1Konl5/UKhEuaqx0nEtwSJQJESFdk8CXJBwddmLT0ipOW/w0NFi0SxhG
# JK7iPjiKJLFyUShmV/HIyPK51j0YYjlQu2CvO072yFVU7DqREwQVOgZ/rMDEe5fO
# yVfD/it1vz1e/IFbwBJZusgsbrXDNtp6z7BjWdu5JiYWCPOBr9za
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_1_54.ps1
|
sample_1_54.ps1
|
// ==================================================================
// DCIM_CLPConcreteJob
// ==================================================================
// Class: DCIM_CLPConcreteJob
[ dynamic, provider("dcismprovider")]
class DCIM_CLPConcreteJob : CIM_ConcreteJob
{
[Write, Description (
"Identifies the pid of process that the current ConcreteJob belongs to."
"It is used to filter the CLPProtocolEndpoing instances associated to this "
"concrete job."),
ModelCorrespondence { "DCIM_CLPConcreteJob.OEMAvocent_pid " }]
string OEMAvocent_pid;
};
/* SIG # Begin signature block */
/* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDSxmYnCrApFyUe */
/* +wYmsiqvc8D6ZsHrwrP+wtnaWzw4V6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDH/SBhiBZP */
/* QHJxSAgCa0ktO3iUIK+Kv0P18aE2fGqJijBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYBLK+LEhT9WyFCf+auDTbusTNDiUBZ+WJbxwqDSfJY3NqKc */
/* w+gOacq+T4BbOSIpUaGoHponzVTxrS/toTmg5AxAt/KCFmRX8Z7iQDCKEtPXLLtF */
/* ORMSPrLQROGANiXtCj9Sl5lqRgthXjluEiESGSVmWlvMNb4T10s7IZAUGzdkVgAl */
/* Fx+7okSgxsCV/9vgNstW5+FlwqijDfIEcMgU6hS/sRUg0gKdt9uqCxVpew9y3icl */
/* HMeMA8Uuqifb06YQESR6nwyErlVc463ArCyS/geRkfC+EIXSXkiDq1DX1cToVuut */
/* woWvAX+0Uv1wJZfoTvcvRyjN+lAQ4t1xQ2LDDrqzbqVIdTPmQchQ770aKC0H2vwc */
/* rObTOxvHc1DQH+x0os3zVo5eFOt85XNoSH3REL9nukcPOFfFzkBmUWrVslap4Beg */
/* CTv7Qdwf7OjEldH9FRWTBvL+GTKK/4U00QtEGVZeHMHDKjFNB83E9l8ex6SQdNYI */
/* XPT9wrBJGFGYvyQ4lEehghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */
/* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */
/* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgl99VfQ2+K1ps */
/* Vzj5hwhU0jrPeOOgEe7LxHC/fAOXxJACEQDRfMfEETxH/N2l9bRpV8MMGA8yMDI0 */
/* MDkyMDA3MDAzMlqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */
/* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */
/* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */
/* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */
/* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */
/* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */
/* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */
/* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */
/* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */
/* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */
/* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */
/* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */
/* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */
/* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */
/* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */
/* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */
/* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */
/* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */
/* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */
/* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */
/* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */
/* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */
/* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */
/* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */
/* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */
/* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */
/* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */
/* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */
/* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */
/* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */
/* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */
/* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */
/* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */
/* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */
/* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */
/* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */
/* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */
/* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */
/* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */
/* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */
/* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */
/* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */
/* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */
/* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */
/* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */
/* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */
/* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */
/* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */
/* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */
/* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */
/* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */
/* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */
/* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */
/* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */
/* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */
/* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */
/* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */
/* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */
/* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */
/* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */
/* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */
/* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */
/* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */
/* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */
/* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */
/* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */
/* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */
/* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */
/* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */
/* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */
/* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */
/* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */
/* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */
/* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */
/* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */
/* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */
/* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */
/* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */
/* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */
/* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */
/* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */
/* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */
/* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */
/* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */
/* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */
/* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */
/* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */
/* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */
/* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */
/* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */
/* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */
/* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */
/* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */
/* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */
/* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */
/* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */
/* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */
/* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */
/* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */
/* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */
/* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */
/* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */
/* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */
/* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */
/* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */
/* MDA3MDAzMlowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */
/* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIBBUdtIs0UPyTvP3CgbiILTw+N/FBXQuVo1J */
/* nd3DMKbPMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */
/* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICACLOAMxiple58lZiEOXt */
/* /J+EQ9/tUFvP/VIoyooEUZXjjJfj783z9wVI5L18Vmj9i2Ttd42KTzJGmQ37mk/F */
/* N05pEy3Tf3nHgVfFuIERCHyFBvwJ9ZkIs2J6w8O0OxLzjdW9nh73BYKnBhU4ScCF */
/* j6A8M2rk1ryHW56P1xCILnUw9zOMFAhu3jE9WbtkQRmR8fRQV+chIiDjZ3UhWUDN */
/* jlqwrFoPqqnbfDdMV/ETxvFkCLmXb8Zgc6CfNvM5tcAjHzcjNgtkFQWCagYy7Z7+ */
/* GHY6Qt5LeL16fp8pKpgP597CBIGOv9MFvNOLK+GFvLI4Uh35OYl0CZS4RuYzQpc0 */
/* +eMtV5nopAIMG9GZDfeBCgIR2iLfI18wduCVDWSD8OHX7/rXrFRCErf1aPa/sZ4x */
/* YfOukNSO28l6ipF2KgWdC2sEbg3OyMqAeuvG3dq7s+lf0QPs8N1KdaP4xzLd12Vy */
/* GY0TBSEsmXCtPJwHJ94VeZC8x5bJEJon0280j2aKpXOgELCK46xMKL89ywRERvbi */
/* 3J9hPR7MmQ8bKWHrXdK2f7rmDsQ4EHk8gRxq8ocN2q8/6vlUYZxbKOJ2xcUkoinU */
/* uc38wEt133f4KPB0nfjnjTvtRntZ0qtLBdX9vNx84cq5+7NaG9Ct0QNAHoIYpXO+ */
/* k4SvWYphOTsP7F9dAMwM3nbC */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/New-MAML.ps1
|
New-MAML.ps1
|
#Requires -version 2.0
#Generates External MAML Powershell help file for any loaded cmdlet or function
#Note: Requires Joel Bennet's New-XML script from http: //www.poshcode.com/1244
#place New-XML in same directory as New-MAML
#Once the XML/MAML file is generated, you'll need to fill in the TODO items and the parameters options
#that are defaulted to false. The position parameter option will need to be changed in the generated MAML also.
#Example Usage to generate a test-ispath.ps1-help.xml file:
#PS C:\\Users\\u00\\bin> $xml = ./new-maml test-ispath
#PS C:\\Users\\u00\\bin> $xml.Declaration.ToString() | out-file ./test-ispath.ps1-help.xml -encoding "UTF8"
#PS C:\\Users\\u00\\bin> $xml.ToString() | out-file ./test-ispath.ps1-help.xml -encoding "UTF8" -append
#For compiled cmdlets place the MAML file in the same directory as the binary module or snapin dll
#For script modules/functions include a reference to the External MAML file for each function
#Note: You can use the same MAML file for multiple functions, example:
#
## .ExternalHelp C:\\Users\\u00\\bin\\test-ispath.ps1-help.xml
## function test-ipath
param ($commandName)
$scriptRoot = Split-Path (Resolve-Path $myInvocation.MyCommand.Path)
. $scriptRoot\\New-XML.ps1
[XNamespace]$helpItems="http://msh"
[XNamespace]$maml="http://schemas.microsoft.com/maml/2004/10"
[XNamespace]$command="http://schemas.microsoft.com/maml/dev/command/2004/10"
[XNamespace]$dev="http://schemas.microsoft.com/maml/dev/2004/10"
$parameters = get-command $commandName | %{$commandName=$_.Name;$_.parameters} | %{$_.Values}
New-Xml helpItems -schema "maml" {
xe ($command + "command") -maml $maml -command $command -dev $dev {
xe ($command + "details") {
xe ($command + "name") {"$commandName"}
xe ($maml + "description") {
xe ($maml + "para") {"TODO Add Short description"}
}
xe ($maml + "copyright") {
xe ($maml + "para") {}
}
xe ($command + "verb") {"$(($CommandName -split '-')[0])"}
xe ($command + "noun") {"$(($commandName -split '-')[1])"}
xe ($dev + "version") {}
}
xe ($maml + "description") {
xe ($maml + "para") {"TODO Add Long description"}
}
xe ($command + "syntax") {
xe ($command + "syntaxItem") {
$parameters | foreach {
xe ($command + "name") {"$commandName"}
xe ($command + "parameter") -require "false" -variableLength "false" -globbing "false" -pipelineInput "false" -postion "0" {
xe ($maml + "name") {"$($_.Name)"}
xe ($maml + "description") {
xe ($maml + "para") {"TODO Add $($_.Name) Description"}
}
xe ($command + "parameterValue") -required "false" -variableLength "false" {"$($_.ParameterType.Name)"}
}
}
}
}
xe ($command + "parameters") {
$parameters | foreach {
xe ($command + "parameter") -required "false" -variableLength "false" -globbing "false" -pipelineInput "false (ByValue)" -position "0" {
xe ($maml + "name") {"$($_.Name)"}
xe ($maml + "description") {
xe ($maml + "para") {"TODO Add $($_.Name) Description"}
}
xe ($command + "parameterValue") -required "true" -variableLength "false" {"$($_.ParameterType.Name)"}
xe ($dev + "type") {
xe ($maml + "name") {"$($_.ParameterType.Name)"}
xe ($maml + "uri"){}
}
xe ($dev + "defaultValue") {}
}
}
}
xe ($command + "inputTypes") {
xe ($command + "inputType") {
xe ($dev + "type") {
xe ($maml + "name") {"TODO Add $commandName inputType"}
xe ($maml + "uri") {}
xe ($maml + "description") {
xe ($maml + "para") {}
}
}
xe ($maml + "description") {}
}
}
xe ($command + "returnValues") {
xe ($command + "returnValue") {
xe ($dev + "type") {
xe ($maml + "name") {"TODO Add $commandName returnType"}
xe ($maml + "uri") {}
xe ($maml + "description") {
xe ($maml + "para") {}
}
}
xe ($maml + "description") {}
}
}
xe ($command + "terminatingErrors") {}
xe ($command + "nonTerminatingErrors") {}
xe ($maml + "alertSet") {
xe ($maml + "title") {}
xe ($maml + "alert") {
xe ($maml + "para") {}
}
}
xe ($command + "examples") {
xe ($command + "example") {
xe ($maml + "title") {"-------------- EXAMPLE 1 --------------"}
xe ($maml + "introduction") {
xe ($maml + "para") {"C:\\PS>"}
}
xe ($dev + "code") {"TODO Add $commandName Example code"}
xe ($dev + "remarks") {
xe ($maml + "para") {"TODO Add $commandName Example Comment"}
xe ($maml + "para") {}
xe ($maml + "para") {}
xe ($maml + "para") {}
xe ($maml + "para") {}
}
xe ($command + "commandLines") {
xe ($command + "commandLine") {
xe ($command + "commandText") {}
}
}
}
}
xe ($maml + "relatedLinks") {
xe ($maml + "navigationLink") {
xe ($maml + "linkText") {"$commandName"}
xe ($maml + "uri") {}
}
}
}
}
|
combined_dataset/train/non-malicious/sample_16_68.ps1
|
sample_16_68.ps1
|
#
# Module manifest for module 'OCI.PSModules.Vnmonitoring'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis',
'Get-OCIVnmonitoringPathAnalyzerTest',
'Get-OCIVnmonitoringPathAnalyzerTestsList',
'Get-OCIVnmonitoringWorkRequest',
'Get-OCIVnmonitoringWorkRequestErrorsList',
'Get-OCIVnmonitoringWorkRequestLogsList',
'Get-OCIVnmonitoringWorkRequestResultsList',
'Get-OCIVnmonitoringWorkRequestsList',
'Move-OCIVnmonitoringPathAnalyzerTestCompartment',
'New-OCIVnmonitoringPathAnalyzerTest',
'Remove-OCIVnmonitoringPathAnalyzerTest',
'Update-OCIVnmonitoringPathAnalyzerTest'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_42_56.ps1
|
sample_42_56.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ailanguage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ailanguage.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f9edfadc-7cd9-4f7a-8258-fc0671fb808f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ailanguage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ailanguage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAilanguageEndpoint', 'Get-OCIAilanguageEndpointsList',
'Get-OCIAilanguageEvaluationResultsList', 'Get-OCIAilanguageModel',
'Get-OCIAilanguageModelsList', 'Get-OCIAilanguageModelType',
'Get-OCIAilanguageProject', 'Get-OCIAilanguageProjectsList',
'Get-OCIAilanguageWorkRequest',
'Get-OCIAilanguageWorkRequestErrorsList',
'Get-OCIAilanguageWorkRequestLogsList',
'Get-OCIAilanguageWorkRequestsList',
'Invoke-OCIAilanguageBatchDetectDominantLanguage',
'Invoke-OCIAilanguageBatchDetectLanguageEntities',
'Invoke-OCIAilanguageBatchDetectLanguageKeyPhrases',
'Invoke-OCIAilanguageBatchDetectLanguagePiiEntities',
'Invoke-OCIAilanguageBatchDetectLanguageSentiments',
'Invoke-OCIAilanguageBatchDetectLanguageTextClassification',
'Invoke-OCIAilanguageBatchLanguageTranslation',
'Invoke-OCIAilanguageDetectDominantLanguage',
'Invoke-OCIAilanguageDetectLanguageEntities',
'Invoke-OCIAilanguageDetectLanguageKeyPhrases',
'Invoke-OCIAilanguageDetectLanguageSentiments',
'Invoke-OCIAilanguageDetectLanguageTextClassification',
'Move-OCIAilanguageEndpointCompartment',
'Move-OCIAilanguageModelCompartment',
'Move-OCIAilanguageProjectCompartment', 'New-OCIAilanguageEndpoint',
'New-OCIAilanguageModel', 'New-OCIAilanguageProject',
'Remove-OCIAilanguageEndpoint', 'Remove-OCIAilanguageModel',
'Remove-OCIAilanguageProject', 'Update-OCIAilanguageEndpoint',
'Update-OCIAilanguageModel', 'Update-OCIAilanguageProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ailanguage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_45_62.ps1
|
sample_45_62.ps1
|
None
|
combined_dataset/train/non-malicious/sample_42_48.ps1
|
sample_42_48.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function Test-ScriptExtent {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[OutputType([bool], ParameterSetName='__AllParameterSets')]
[OutputType([System.Management.Automation.Language.IScriptExtent], ParameterSetName='PassThru')]
[CmdletBinding()]
param(
[Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)]
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Extent,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Inside,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$After,
[ValidateNotNullOrEmpty()]
[System.Management.Automation.Language.IScriptExtent]
$Before,
[Parameter(ParameterSetName='PassThru')]
[switch]
$PassThru
)
process {
if (-not $Extent) { return $false }
$passes = (-not $After -or $Extent.StartOffset -gt $After.EndOffset) -and
(-not $Before -or $Extent.EndOffset -lt $Before.StartOffset) -and
(-not $Inside -or ($Extent.StartOffset -ge $Inside.StartOffset -and
$Extent.EndOffset -le $Inside.EndOffset))
if (-not $PassThru.IsPresent) { return $passes }
if ($passes) {
$Extent # yield
}
}
}
# SIG # Begin signature block
# MIIn0AYJKoZIhvcNAQcCoIInwTCCJ70CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDh3KaxT3eCSr09
# 0zGLQhhCZ8P7A0AsbPcbsnG6DpAmJqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGAQ
# N+mOQZxzZyVbmfEFx8KczzZKcpC3M4HV8vsum11uMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA0E4J/fCTGnMLpepNjU8OXbd8RkTK3QSksZd4
# cqNdkMCj1ZRZ44xOAdvL5z04c3ZuPuoG7GHxEt2YmqoY9N66OLvBsjWT5Hcl+ouh
# YkHEXgHuDwG9KNBoRVCRxPBK36YtbqPlGCaE/YXoJN/P/2MZ9YjJLxdv79VakS0N
# izTvGpPUqJCcXE+R3GP1on24roZrlG7pzrQTFDLqyVjceThGul9aisEjkoIQWLH6
# Rvq1N3RpGqOlF5cQzMy9aI9QcLkSYO9gtuqj/8rQTto0a/ptTWgD8B+tebf2Qgyn
# EtvSjNGN1ZKZCJ7ALKUT2jEZa2b3bQKz//C6cBfwKZgEiR/N46GCFyswghcnBgor
# BgEEAYI3AwMBMYIXFzCCFxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAklCjNATiMIEdyVWT0qdtn3hdBrd4RXg0a
# 0EZFypaf3gIGZa6U3SvUGBMyMDI0MDEyNjAyMjcxMi4wOTZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHj372b
# mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k
# DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N
# EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35
# fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/
# jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB
# P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q
# Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs
# bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c
# Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo
# jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ
# 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb
# udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1
# 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0
# sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX
# JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL
# iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ
# 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms
# CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es
# DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq
# zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub
# 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy
# 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE
# 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOlcXjwwIhgPMjAyNDAxMjUxMjEyNDRaGA8yMDI0MDEy
# NjEyMTI0NFowdjA8BgorBgEEAYRZCgQBMS4wLDAKAgUA6VxePAIBADAJAgEAAgFA
# AgH/MAcCAQACAhGpMAoCBQDpXa+8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG
# AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQAD
# gYEAKnPA1njx/Wz26i6hGw8QcEQ9pkfs78FYof3DqqDDSUfhYhVmVcf9ljcZvoy/
# NX8HOQBd3puApv6OXVQgmCy8V/TRfwUahr0pU0DVvEcIgC7ysk87vv9+jjE1y+hI
# 6LTvBJyw+pheKl2nVk1DLvukNqOxfCD+uEhZekSoan1dQSIxggQNMIIECQIBATCB
# kzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgAB
# AAAB4zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJ
# EAEEMC8GCSqGSIb3DQEJBDEiBCAgjveegC1XcjJob8aN+nrZz4rb2HyqWIReLQ/r
# mFaxrjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9
# wha4MlxBt2Crw12PTHIy5iYqMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwIgQgEUIwYvDJir7CRXpQ725L
# gL8ISKlt4GImjKU8GjEgb5EwDQYJKoZIhvcNAQELBQAEggIALSncYC36HCCtxidh
# qjq6aU/bSnSnFPhnbq8t0vYwfLP3px7dOxsTxWOAHWSO/FojKOZHY61EYNYlF5rn
# JDu7GTUwAFFJ36P06Eza973X5HA+b0pDijjB3QD7gtuS9oC7OZZPB/GCFtC7cMVJ
# RLd0tlRC7PLUR1+KfJipodG3Mn37EciI8fIh/aOoc0VE5gqAVmcAc61zEkrRSMP2
# /Gbg713MxDqKtTIHshjepFwJKCUsdM1G2haNuIOnX5N3PIS+Cu5N7blJ15RAbXQb
# lRpfLALZPbCvRwobtpcq0+UmQN4h9L0F7H03BIZSdYnjxUWCO8KAXu/fpHlrQ9IN
# zwg77PqRa2M9w+XDSEvaiBoRuPwnRJtJB63UyIAEgpdz8O9ri1NL/3Gk/m6EpY3z
# Jq7PXWT63pN0e8BsjRT+bOk3CFNEthsETu6TPf36pw+/dlywBNj4UTzJ8ctSaK4y
# /sTNx0s+NK7hCF0clycM+UIjByjs6u2Lp2DdanpbiJd7/JzhvrLHY0Vx3u2Wx0Ua
# fLLtO5+BS7qXR6WkebcM7EQKVD1O/rbnRtL0zEZCbPsEympt7s249sTg1tsmTVJy
# uUXx88So+NV4MXmrm/hv92jaadvBVB2G3B5+mtK+eBKrb0wGDPlM3mjxk0VnqcZR
# JEfBLtxJCIjirIFzxl3j2LDKWCk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_61_15.ps1
|
sample_61_15.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
function Publish-NewServiceFabricApplication
{
<#
.SYNOPSIS
Publishes a new Service Fabric application type to Service Fabric cluster.
.DESCRIPTION
This script registers & creates a Service Fabric application.
.NOTES
Connection to service fabric cluster should be established by using 'Connect-ServiceFabricCluster' before invoking this cmdlet.
WARNING: This script creates a new Service Fabric application in the cluster. If OverwriteExistingApplication switch is provided, it deletes any existing application in the cluster with the same name.
.PARAMETER ApplicationPackagePath
Path to the folder containing the Service Fabric application package OR path to the zipped service fabric applciation package.
.PARAMETER ApplicationParameterFilePath
Path to the application parameter file which contains Application Name and application parameters to be used for the application.
.PARAMETER ApplicationName
Name of Service Fabric application to be created. If value for this parameter is provided alongwith ApplicationParameterFilePath it will override the Application name specified in ApplicationParameter file.
.PARAMETER Action
Action which this script performs. Available Options are Register, Create, RegisterAndCreate. Default Action is RegisterAndCreate.
.PARAMETER ApplicationParameter
Hashtable of the Service Fabric application parameters to be used for the application. If value for this parameter is provided, it will be merged with application parameters
specified in ApplicationParameter file. In case a parameter is found in application parameter file and on commandline, commandline parameter will override the one specified in application parameter file.
.PARAMETER OverwriteBehavior
Overwrite Behavior if an application exists in the cluster with the same name. Available Options are Never, Always, SameAppTypeAndVersion.
Never will not remove the existing application. This is the default behavior.
Always will remove the existing application even if its Application type and Version is different from the application being created.
SameAppTypeAndVersion will remove the existing application only if its Application type and Version is same as the application being created.
.PARAMETER SkipPackageValidation
Switch signaling whether the package should be validated or not before deployment.
.PARAMETER CopyPackageTimeoutSec
Timeout in seconds for copying application package to image store. Default is 600 seconds.
.PARAMETER CompressPackage
Switch signaling whether the package should be compressed or not before deployment.
.PARAMETER RegisterApplicationTypeTimeoutSec
Timeout in seconds for registering application type. Default is 600 seconds.
.PARAMETER UnregisterApplicationTypeTimeoutSec
Timeout in seconds for unregistering application type. Default is 600 seconds.
.PARAMETER StartupServicesFilePath
Absolute path of StartupServicesFilePath which contains Services and service Parameters.
.PARAMETER StartupServiceParameterFilePath
Path to the service parameter file which contains service parameters to be used for the services in the application.
.PARAMETER StartupServiceParameter
Hashtable of the Service Fabric service parameters to be used for the application. If value for this parameter is provided, it will be merged with service parameters
specified in StarupServiceParameterFilePath file. In case a parameter is found in service parameter file and on commandline, commandline parameter will override the one specified in service parameter file.
.EXAMPLE
Publish-NewServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationParameterFilePath 'Local.xml'
Registers & Creates an application with AppParameter file containing name of application and values for parameters that are defined in the application manifest.
Publish-NewServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationName 'fabric:/Application1'
Registers & Creates an application with the specified application name.
#>
[CmdletBinding(DefaultParameterSetName="ApplicationName")]
Param
(
[Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")]
[Parameter(Mandatory=$true,ParameterSetName="ApplicationName")]
[String]$ApplicationPackagePath,
[Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")]
[String]$ApplicationParameterFilePath,
[Parameter(Mandatory=$true,ParameterSetName="ApplicationName")]
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[String]$ApplicationName,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[ValidateSet('Register','Create','RegisterAndCreate')]
[String]$Action = 'RegisterAndCreate',
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[Hashtable]$ApplicationParameter,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[ValidateSet('Never','Always','SameAppTypeAndVersion')]
[String]$OverwriteBehavior = 'Never',
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[Switch]$SkipPackageValidation,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[int]$CopyPackageTimeoutSec = 600,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[Switch]$CompressPackage,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[int]$RegisterApplicationTypeTimeoutSec = 600,
[Parameter(ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[int]$UnregisterApplicationTypeTimeoutSec = 600,
[Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[String]$StartupServicesFilePath,
[Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[String]$StartupServiceParameterFilePath,
[Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")]
[Parameter(ParameterSetName="ApplicationName")]
[Hashtable]$StartupServiceParameter
)
if (!(Test-Path $ApplicationPackagePath))
{
$errMsg = "$ApplicationPackagePath is not found."
throw $errMsg
}
# Check if the ApplicationPackagePath points to a compressed package.
if (Test-Path $ApplicationPackagePath -PathType Leaf)
{
if((Get-Item $ApplicationPackagePath).Extension -eq ".sfpkg")
{
$AppPkgPathToUse=[io.path]::combine($env:Temp, (Get-Item $ApplicationPackagePath).BaseName)
Expand-ToFolder $ApplicationPackagePath $AppPkgPathToUse
}
else
{
$errMsg = "$ApplicationPackagePath is not a valid Service Fabric application package"
throw $errMsg
}
}
else
{
$AppPkgPathToUse = $ApplicationPackagePath
}
if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath') -and !(Test-Path $ApplicationParameterFilePath -PathType Leaf))
{
$errMsg = "$ApplicationParameterFilePath is not found."
throw $errMsg
}
# Check StartupServicesFilePath is valid if provided
if ($PSBoundParameters.ContainsKey('StartupServicesFilePath') -AND !(Test-Path $StartupServicesFilePath -PathType Leaf))
{
$errMsg = "$StartupServicesFilePath is not found."
throw $errMsg
}
# Check StartupServiceParameterFilePath is valid if provided
if ($PSBoundParameters.ContainsKey('ServiceParameterFilePath') -AND !(Test-Path $StartupServiceParameterFilePath -PathType Leaf))
{
$errMsg = "$StartupServiceParameterFilePath is not found."
throw $errMsg
}
try
{
[void](Test-ServiceFabricClusterConnection)
}
catch
{
Write-Warning "Unable to verify connection to Service Fabric cluster."
throw
}
# Get image store connection string
$clusterManifestText = Get-ServiceFabricClusterManifest
$imageStoreConnectionString = Get-ImageStoreConnectionStringFromClusterManifest ([xml] $clusterManifestText)
$ApplicationManifestPath = "$AppPkgPathToUse\ApplicationManifest.xml"
$ApplicationManifestPathBkp = "$AppPkgPathToUse\ApplicationManifest_bkp.xml"
if(!$SkipPackageValidation)
{
# If StartupServices file is provided, merge content from this file to ApplicationManifest. This is done to validate content of StartupServices.xml file
if($StartupServicesFilePath)
{
[xml]$AppManifestContent = Get-Content -Path $ApplicationManifestPath
[xml]$StartupServicesContent = Get-Content -Path $StartupServicesFilePath
$ServiceParamsNode = $AppManifestContent.ImportNode($StartupServicesContent.DocumentElement.Parameters, $true)
$ServiceNode = $AppManifestContent.ImportNode($StartupServicesContent.DocumentElement.Services, $true)
# If Services are present in StartupServices.xml, append them in ApplicationManifest.xml
if($ServiceNode)
{
$DefaultServices = $AppManifestContent.CreateElement($null, 'DefaultServices', "http://schemas.microsoft.com/2011/01/fabric")
$DefaultServices.InnerXml = $ServiceNode.InnerXml
#If there are multiple services, $AppManifestContent.DocumentElement.ServiceManifestImport will be of list type and count will be >0
#If there is a single service, $AppManifestContent.DocumentElement.ServiceManifestImport will be of XmlElement type and count will be null
$count = $AppManifestContent.DocumentElement.ServiceManifestImport.Count
if($count -gt 0)
{
$AppManifestContent.DocumentElement.InsertAfter($DefaultServices, $AppManifestContent.DocumentElement.ServiceManifestImport[$count-1]) | out-null
}
else
{
$AppManifestContent.DocumentElement.InsertAfter($DefaultServices, $AppManifestContent.DocumentElement.ServiceManifestImport) | out-null
}
}
# If Parameters are present in StartupServices.xml
if($ServiceParamsNode)
{
# If ApplicationManifest.xml has Application Parameters, append service parameters
$existingAppParameters = $null
foreach ($node in $AppManifestContent.DocumentElement.ChildNodes)
{
if ("Parameters" -eq $node.LocalName -and "http://schemas.microsoft.com/2011/01/fabric" -eq $node.NamespaceURI)
{
$existingAppParameters = $node;
break;
}
}
if($existingAppParameters)
{
$len = $ServiceParamsNode.ChildNodes.Count
for($i = 0; $i -lt $len; $i++)
{
# childNode gets popped up and added to AppManifestContent after each iteration
$existingAppParameters.AppendChild($ServiceParamsNode.ChildNodes[0]) | out-null
}
}
else
{
$AppManifestContent.DocumentElement.PrependChild($ServiceParamsNode) | out-null
}
}
# Move existing ApplicationManifest.xml to bkp file and write new content
Move-Item -Path $ApplicationManifestPath -Destination $ApplicationManifestPathBkp -Force
$AppManifestContent.Save($ApplicationManifestPath)
$packageValidationSuccess = (Test-ServiceFabricApplicationPackage $AppPkgPathToUse)
if (!$packageValidationSuccess)
{
$errMsg = "Validation failed for package: " + $ApplicationPackagePath
throw $errMsg
}
# If validation is successful, put back ApplicationManifest.xml file from backup file
Remove-Item $ApplicationManifestPath
Move-Item -Path $ApplicationManifestPathBkp -Destination $ApplicationManifestPath
}
$packageValidationSuccess = (Test-ServiceFabricApplicationPackage $AppPkgPathToUse)
if (!$packageValidationSuccess)
{
$errMsg = "Validation failed for package: " + $ApplicationPackagePath
throw $errMsg
}
}
# If ApplicationName is not specified on command line get application name from Application Parameter file.
if(!$ApplicationName)
{
$ApplicationName = Get-ApplicationNameFromApplicationParameterFile $ApplicationParameterFilePath
}
$names = Get-NamesFromApplicationManifest -ApplicationManifestPath $ApplicationManifestPath
if (!$names)
{
Write-Warning "Unable to read Application Type and Version from application manifest file."
return
}
if($Action.Equals("Register") -or $Action.Equals("RegisterAndCreate"))
{
# Apply OverwriteBehavior if an applciation with same name already exists.
$app = Get-ServiceFabricApplication -ApplicationName $ApplicationName
if ($app)
{
$removeApp = $false
if($OverwriteBehavior.Equals("Never"))
{
$errMsg = "An application with name '$ApplicationName' already exists, its Type is '$($app.ApplicationTypeName)' and Version is '$($app.ApplicationTypeVersion)'.
You must first remove the existing application before a new application can be deployed or provide a new name for the application."
throw $errMsg
}
if($OverwriteBehavior.Equals("SameAppTypeAndVersion"))
{
if($app.ApplicationTypeVersion -eq $names.ApplicationTypeVersion -and $app.ApplicationTypeName -eq $names.ApplicationTypeName)
{
$removeApp = $true
}
else
{
$errMsg = "An application with name '$ApplicationName' already exists, its Type is '$($app.ApplicationTypeName)' and Version is '$($app.ApplicationTypeVersion)'.
You must first remove the existing application before a new application can be deployed or provide a new name for the application."
throw $errMsg
}
}
if($OverwriteBehavior.Equals("Always"))
{
$removeApp = $true
}
if($removeApp)
{
Write-Host "An application with name '$ApplicationName' already exists in the cluster with Application Type '$($app.ApplicationTypeName)' and Version '$($app.ApplicationTypeVersion)'. Removing it."
try
{
$app | Remove-ServiceFabricApplication -Force -ForceRemove
}
catch [System.TimeoutException]
{
# Catch operation timeout and continue with force remove replica.
}
catch [System.Fabric.FabricElementNotFoundException]
{
if ($_.Exception.ErrorCode -eq [System.Fabric.FabricErrorCode]::ApplicationNotFound)
{
# Ignore
}
else
{
throw
}
}
foreach ($node in Get-ServiceFabricNode)
{
[void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove)
}
if($OverwriteBehavior.Equals("Always"))
{
# Unregsiter AppType and Version if there are no other applciations for the Type and Version.
# It will unregister the existing application's type and version even if its different from the application being created,
if((Get-ServiceFabricApplication | Where-Object {$_.ApplicationTypeVersion -eq $($app.ApplicationTypeVersion) -and $_.ApplicationTypeName -eq $($app.ApplicationTypeName)}).Count -eq 0)
{
Unregister-ServiceFabricApplicationType -ApplicationTypeName $($app.ApplicationTypeName) -ApplicationTypeVersion $($app.ApplicationTypeVersion) -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec
}
}
}
}
$reg = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $names.ApplicationTypeVersion }
if ($reg)
{
Write-Host 'Application Type '$names.ApplicationTypeName' and Version '$names.ApplicationTypeVersion' was already registered with Cluster, unregistering it...'
$reg | Unregister-ServiceFabricApplicationType -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec
if(!$?)
{
throw "Unregistering of existing Application Type was unsuccessful."
}
}
Write-Host 'Copying application to image store...'
$applicationPackagePathInImageStore = $names.ApplicationTypeName
Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $AppPkgPathToUse -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -TimeOutSec $CopyPackageTimeoutSec -CompressPackage:$CompressPackage
if(!$?)
{
throw "Copying of application package to image store failed. Cannot continue with registering the application."
}
Write-Host 'Registering application type...'
Register-ServiceFabricApplicationType -ApplicationPathInImageStore $applicationPackagePathInImageStore -ApplicationPackageCleanupPolicy Manual -Async
if(!$?)
{
throw "Registration of application type failed."
}
# Wait for app registration to finish.
$ready = $false
$retryTimeInterval = 2
$retryCount = $RegisterApplicationTypeTimeoutSec / $retryTimeInterval
$prevStatusDetail = ""
do
{
$appType = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion
if($appType.Status -eq "Available")
{
$ready = $true
}
elseif($appType.Status -eq "Failed")
{
if($appType.StatusDetails -ne "")
{
Write-Host $appType.StatusDetails
}
throw "Registration of application type failed."
}
else
{
if($appType.StatusDetails -ne "")
{
if($prevStatusDetail -ne $appType.StatusDetails)
{
Write-Host $appType.StatusDetails
}
$prevStatusDetail = $appType.StatusDetails
}
Start-Sleep -Seconds $retryTimeInterval
$retryCount--
}
} while (!$ready -and $retryCount -gt 0)
if(!$ready)
{
throw "Registration of application package is not completed in specified timeout of $RegisterApplicationTypeTimeoutSec seconds. Please consider increasing this timout by passing a value for RegisterApplicationTypeTimeoutSec parameter."
}
else
{
Write-Host "Application package is registered."
}
Write-Host 'Removing application package from image store...'
Remove-ServiceFabricApplicationPackage -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -ImageStoreConnectionString $imageStoreConnectionString
}
if($Action.Equals("Create") -or $Action.Equals("RegisterAndCreate"))
{
Write-Host 'Creating application...'
# If application parameters file is specified read values from and merge it with parameters passed on Commandline
if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath'))
{
$appParamsFromFile = Get-ApplicationParametersFromApplicationParameterFile $ApplicationParameterFilePath
if(!$ApplicationParameter)
{
$ApplicationParameter = $appParamsFromFile
}
else
{
$ApplicationParameter = Merge-Hashtables -HashTableOld $appParamsFromFile -HashTableNew $ApplicationParameter
}
}
New-ServiceFabricApplication -ApplicationName $ApplicationName -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion -ApplicationParameter $ApplicationParameter
if(!$?)
{
throw "Creation of application failed."
}
if($StartupServicesFilePath)
{
# Get content from StartupServicesFilePath
[xml]$startupServices= Get-Content -Path $StartupServicesFilePath
#Get Services from StartupServices file
$services = $startupServices.StartupServicesManifest.Services
# Get parameter from StartupServices file
$Parameters = $startupServices.StartupServicesManifest.Parameters
#Convert parameters to hashtable
$Parameters = ReadParametersAsHashTable -Parameters $Parameters
# Get parameters from ApplicationManifest.xml and over ride above Parameters
$paramsFromAppManifest = Get-ApplicationParametersFromApplicationManifestFile $ApplicationManifestPath
$Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $paramsFromAppManifest
# If service parameters file is specified read values from and merge it with service parameters passed on Commandline
if ($PSBoundParameters.ContainsKey('StartupServiceParameterFilePath'))
{
$serviceParamsFromFile = Get-ServiceParametersFromServiceParameterFile $StartupServiceParameterFilePath
if(!$StartupServiceParameter)
{
$StartupServiceParameter = $serviceParamsFromFile
}
else
{
$StartupServiceParameter = Merge-Hashtables -HashTableOld $serviceParamsFromFile -HashTableNew $StartupServiceParameter
}
}
# Merge above StartupServiceParameter to parameters read from StartupServicesFile
$Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $StartupServiceParameter
# Over ride above Parameters with ApplicationParameter populated before New-ServiceFabricApplication
$Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $ApplicationParameter
#Get content from ApplicationManifest
[xml]$ApplicationManifestContent= Get-Content -Path $ApplicationManifestPath
# Get HasPersistedState values from different serviceManifest files
$ServiceImports = $ApplicationManifestContent.ApplicationManifest.ServiceManifestImport
$PersistedStateTable = @{}
foreach($Import in $ServiceImports)
{
$PkgName = $Import.ServiceManifestRef.ServiceManifestName
$ServiceManifestPath = $AppPkgPathToUse + '\' + $PkgName + '\ServiceManifest.xml'
[xml]$ServiceManifestContent = Get-Content -Path $ServiceManifestPath
$StatefulServiceType = $ServiceManifestContent.ServiceManifest.ServiceTypes.StatefulServiceType
if($StatefulServiceType -and $StatefulServiceType.HasPersistedState)
{
$PersistedStateTable.add($StatefulServiceType.ServiceTypeName, $StatefulServiceType.HasPersistedState)
}
}
# For each service in services call New-ServiceFabricService with appropriate parameters
foreach($Service in $Services.ChildNodes)
{
$serviceType = Find-ServiceType -Service $service
if($serviceType -eq "Stateless")
{
Create-StatelessService -ApplicationName $ApplicationName -Service $service -Parameters $Parameters
if(!$?)
{
throw "Creation of stateless service : $service.Name failed."
}
}
elseif($serviceType -eq "Stateful")
{
Create-StatefulService -ApplicationName $ApplicationName -Service $service -Parameters $Parameters -PersistedStateTable $PersistedStateTable
if(!$?)
{
throw "Creation of stateful service : $service.Name failed."
}
}
else
{
# this will cover if there are some comments
continue
}
}
}
Write-Host 'Create application succeeded.'
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAhtHHB9BPoA8Lt
# 0lxy16dmZ5A2/GwkyFxAaf+Jrz7A/aCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEr4dFz6+8HLHkxNIXHS5nXl
# qcegMrAXMZZvUcwFlshmMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEA0pOoRieW1n66uV3XtdGhtrtRXwWn7+L4EilJRWGKRAZdPCwRhd+ws765
# sN4307+qKiyMLZXth7d+SpalfCF8b/vhX5Ww5NAscmgBNuqXiHuDMZrO8MtB65b2
# FDIWUVBQU47irbH1b7pUzdg2fpCLzTzaZ0IPSBxujRU29wU5MU3xStTYGIOIfUQs
# aOsvLLM217+QQtRx5sLhnsq+R+OFjC14ysBa7Yh7QMNUmkJukEVMXOo1cziTCQxB
# ZBcow105bIAF6V0yD82sx8/hShhYFIGHEwtxlSDDHqY4QHAsUFRcKfYF57yQcadj
# +WsN5Z8FIfr3Bjm2YyPKoQWzUXELYKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBQup/7babBzaPx4KvINOgP5pCNS4sB2dRLgXIZqy1yggIGZSizr7jq
# GBMyMDIzMTAxNzE4MjUyOS4zMjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAcyGpdw369lhLQABAAABzDANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MDFaFw0yNDAyMDExOTEyMDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDMsSIF8e9NmEc+83NVZGgWWZi/wBYt8zhxAfSGM7xw
# 7K7CbA/1A4GhovPvkIY873tnyzdyZe+6YHXx+Rd618lQDmmm5X4euiYG53Ld7WIK
# +Dd+hyi0H97D6HM4ZzGqovmwB0fZ3lh+phJLoPT+9yrTLFzkkKw2Vcb7wXMBziD0
# MVVYbmwRlRaypTntl39IENCEijW9j6MElTyXP2zrc0OthQN5RrMTY5iZja3MyHCF
# mYMGinmHftsaG3Ydi8Ga8BQjdtoTm5dVhnqs2qKNEOqZSon28R4Xff0tlJL5UHyI
# 3bywH/+zQeJu8qnsSCi8VFPOsZEb6cZzhXHaAiSGtdKAbQRaAIhExbIUpeJypC7l
# +wqKC3BO9ADGupB9ZgUFbSv5ECFjMDzbfm8M5zz2A4xYNPQXqZv0wGWL+jTvb7kF
# YiDPPe+zRyBbzmrSpObB7XqjqzUFNKlwp+Mx15k1F7FMs5EM2uG68IQsdAGBkZbS
# DmuGmjPbZ7dtim+XHuh3NS6JmXYPS7rikpCbUsMZMn5eWxiWFIk6f00skR4RLWmh
# 0N6Oq+KYI1fA59LzGiAbOrcxgvQkRo3OD4o1JW9z1TNMwEbkzPrXMo8rrGsuGoyY
# Wcsm9xhd0GXIRHHC64nzbI3e0G5jqEsWQc4uaQeSRyr70KRijzVyWjjYfsEtvVMl
# JwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFIKmHGRdPIdLRXtsR5XRSyM3+2kMMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB5GUMo9XviUl3g72u8oQTorIKDoAdgWZ4L
# Q9+dAEQCmaetsThkxbNm15seu7GmwpZdhMQN8TNddGki5s5Ie+aA2VEo9vZz31ll
# usHBXAVrQtpufQqtIA+2nnusfaYviitr6p5kVT609LITOYgdKRWEpfx/4yT5R9yM
# eKxoxkk8tyGiGPZK40ST5Z14OPdJfVbkYeCvlLQclsX1+WBZNx/XZvazJmXjvYjT
# uG0QbZpxw4ZO3ZoffQYxZYRzn0z41U7MDFlXo2ihfasdbHuua6kpHxJ9AIoUevh3
# mzvUxYp0u0z3wYDPpLuo+M2VYh8XOCUB0u75xG3S5+98TKmFbqZYgpgr6P+YKeao
# 2YpB1izs850YSzuwaX7kRxAURlmN/j5Hv4wabnOfZb36mDqJp4IeGmwPtwI8tEPs
# uRAmyreejyhkZV7dfgJ4N83QBhpHVZlB4FmlJR8yF3aB15QW6tw4CaH+PMIDud6G
# eOJO4cQE+lTc6rIJmN4cfi2TTG7e49TvhCXfBS2pzOyb9YemSm0krk8jJh6zgeGq
# ztk7zewfE+3shQRc74sXLY58pvVoznfgfGvy1llbq4Oey96KouwiuhDtxuKlTnW7
# pw7xaNPhIMsOxW8dpSp915FtKfOqKR/dfJOsbHDSJY/iiJz4mWKAGoydeLM6zLmo
# hRCPWk/Q5jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBO
# TuZ3uYfiihS4zRToxisDt9mJpKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Nkg1DAiGA8yMDIzMTAxNzE1MDM0
# OFoYDzIwMjMxMDE4MTUwMzQ4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDo2SDU
# AgEAMAcCAQACAjPJMAcCAQACAhcjMAoCBQDo2nJUAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAACWGiMIFDAwDnfJiTK7Ec6aeA3jSV/XYfNGR9G21deKTJcD
# ZN/6sAG3xrVlvFhd1XtElL2cBbEVj8TwLd4K5MAMdAQ0VRIXQ1qul7B+qK28nWn+
# 7jldUkBmSIBLXjypBkLlEM9SgOgJo7fDH4yyGAGEpUIVCrIjbdI437I+A5hMpLzW
# x7ZNc00B4MXxJdl9IB3DcxlPSn3kCVApsxKAa3tTgNNYhDnA4cYfIn7uV5tMOijI
# A5Ka9WAJ79luBC7o7SOYQgIe2JRRbDItFxJVZdGbpnWavRevmUOaOwbg3CmgD7Eu
# QR2r44bzLZdqQGkkLaHLyLCizSMVpk2/z1I6igwxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAcyGpdw369lhLQABAAABzDAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAKvSNZUcZQ9cW5u0jQrJPlWawO0aJu7lKdC11ISpGfqjCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINbuZQHC/sMCE+cgKVSkwKpDICfn
# efFZYgDbF4HrcFjmMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHMhqXcN+vZYS0AAQAAAcwwIgQg6ZrJ+uGm1JhJUYBT+/xap6+32kHu
# ak73INae2yo/AMQwDQYJKoZIhvcNAQELBQAEggIAkxCiJYGta4HtcW/rQERqbO0y
# cguAfxjz9Pb9JFV39WpTH8+n7iBOw2197Rdfw7hduvHi2uLMv2hkFYDhQVHUK0Vm
# Api/MVtc+Oi/opBgMYz1yETkv9wFsS4Cx8FUbRt9y9VarMq2GtX34za+a/QwVUYA
# 25r8I+CpIrRCCEVrn2Orv0yKLfF122h4fBCU3RYxiHc/XeUMh0McFdV7zsnAyrBZ
# pWnEGQA3ZnW/0TT3qO0dx5W00H5tRrl5uGhizcwBGg7/kXYDPbPwX7MT6eq5Vt7j
# jm2sLVYAJ4kfNWg2bgUShKT0uDqKbsknK5o46lCDvHtOZTvwPYz/ghmUc79L9iVi
# Y9Ekg649kvvUcsqkk+dgbJ3QiAy9juQPc+M07cZvL2aZ9Rezwx1+e6/A+oAS+1DV
# 4lkiJESwET83Dmt1qjHIEcivf5znARrChLUe/v5SvBC91qiH6kIZIhj9HpV6Chxt
# z/3U4JI37n+ZutOomLElmvOTh8hKkAIPFwQxX1OPzLb6bSnrGKrBoJMj+cwIOaS8
# DcoXcrpNjWxgP5FXcJuiEnjGrpfdj56/JdRZG5LbN0ER8UN3+dQBfDsMQXSBlZpF
# D2IXEanR/mUSkNiygpdnI1uy3Okay8IgvAtWDxM9BVv6HGBUKRryxS+7+xCQlRHr
# QDWIdU7ydeTK7Snh9Dg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_62_58.ps1
|
sample_62_58.ps1
|
function EnsureAdminPrivileges([String]$mesageOnError)
{
$identity = [Security.Principal.WindowsIdentity]::GetCurrent()
$principal = new-object Security.Principal.WindowsPrincipal $identity
if (!($principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)))
{
Write-Error $mesageOnError
throw
}
}
function GetFabricDataRootFromRegistry
{
return (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricDataRoot
}
function GetFabricLogRootFromRegistry
{
return (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricLogRoot
}
function AddWindowsFabricAcl([String]$folderPath)
{
$currAcl = Get-Acl "$folderPath"
$accessRuleWinFabAdmin = New-Object System.Security.AccessControl.FileSystemAccessRule("ServiceFabricAdministrators", "FullControl", "ContainerInherit, ObjectInherit", "None", "Allow")
$currAcl.SetAccessRule($accessRuleWinFabAdmin)
Set-Acl "$folderPath" $currAcl
}
function TestPathRobust([string]$pathToTest)
{
[int]$retryCount = 0;
do
{
$testErrors = @()
$isPathExists = (Test-Path -Path $pathToTest -ErrorAction SilentlyContinue -ErrorVariable testErrors)
if ($testErrors.Count -eq 0)
{
return $isPathExists
}
Start-Sleep -Seconds 1
$retryCount++
if($retryCount -eq 40)
{
$errorString = $testErrors -join ' '
Write-Error $errorString
throw
}
}
while($True)
}
function GetClusterScriptRootDirectory
{
$sdkInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricSDKInstallPath
$clusterScriptDir = Join-Path -Path $sdkInstallPath -ChildPath "ClusterSetup"
return $clusterScriptDir
}
function RemoveFolder([String]$folderPath)
{
$pathExists = TestPathRobust($folderPath)
if ($pathExists)
{
cmd /c rmdir /S /Q $folderPath > $null
# Even after Remove-Item returns, sometimes the folders are still being
# deleted. Sleep for few seconds before we check for existence of path.
Start-Sleep -Seconds 5
return (!(TestPathRobust($folderPath)))
}
return $true
}
function GetCertificateSetupScriptFilePath
{
$scriptDir = (GetClusterScriptRootDirectory)
$certScript = Join-Path -Path $scriptDir -ChildPath "\Secure\CertSetup.ps1"
return $certScript
}
function InstallCertificates
{
$certScript = (GetCertificateSetupScriptFilePath)
Write-Host "Installing certificates for secure cluster setup..."
invoke-expression "& '$certScript' -Install"
if (!$?)
{
Write-Error "Certificate Installation failed."
throw
}
}
function CleanExistingCluster([bool]$deleteFolders = $True)
{
Write-Host "Removing cluster configuration..."
Remove-ServiceFabricNodeConfiguration -Force > $null
# Wait for fabric processes to exit.
Get-Process Fabric -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() }
Get-Process FabricGateway -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() }
Get-Process FabricHost -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() }
if(IsMeshClusterDeployed)
{
Write-Output "Deleting Docker network and removing firewall rule..."
DeleteNetworkAndRemoveFirewallRule
}
# Clear out the reg key indicating the local cluster node count.
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value ""
# Clear out the reg key indicating the isMeshCluster.
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value ""
$certScript = (GetCertificateSetupScriptFilePath)
invoke-expression "& '$certScript' -Clean"
Write-Host "Stopping all logman sessions..."
logman stop FabricAppInfoTraces > $null
logman stop FabricCounters > $null
logman stop FabricLeaseLayerTraces > $null
logman stop FabricQueryTraces > $null
logman stop FabricTraces > $null
if($deleteFolders)
{
CleanClusterDataLogFolders
}
}
function CleanExistingLinuxCluster([bool]$deleteFolders = $True)
{
Write-Host "Removing Linux Local Cluster"
try {
if((IsWslRunning) -and (IsGenieRunning))
{
wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustercleanup.sh
}
else
{
Write-Error "WSL2 and Systemd genie inside linux distribution must be running before cleaning up local cluster."
exit 1
}
}
catch {
Write-Error "There were error while cleaning up Linux Cluster."
exit 1
}
$registryPath='HKLM:\Software\Microsoft\Service Fabric SDK'
# Clear out the reg key indicating linux cluster mode.
Set-ItemProperty -Path $registryPath -Name LinuxClusterModeEnabled -Value 'false'
# Clear out the reg key indicating the local linux cluster node count.
Set-ItemProperty -Path $registryPath -Name LocalClusterNodeCount -Value ''
Write-Host "Linux Local Service Fabric Cluster removed successfully."
}
function IsWslRunning
{
try {
$wslHostProcess = Get-Process wslhost
if ($wslHostProcess -ne $null -and $wslHostProcess -ne ""){
return $true
}
Write-Error "WSL is not running."
return $false
}
catch [SystemException] {
Write-Error "WSL is not installed or not running."
return $false
}
}
function IsGenieRunning
{
try {
$isGenieRunning = wsl genie -r
if ($isGenieRunning -eq "running"){
return $true
}
Write-Error "Genie is not running, please start systemd genie inside linux distribtution to setup or update Linux Cluster."
return $false
}
catch {
Write-Error "systemd genie is not installed, please start systemd genie inside linux distribtution to setup or update Linux Cluster. Please refer to (https://docs.microsoft.com/azure/service-fabric/service-fabric-local-linux-cluster-windows-wsl2) for details about setting up Service Fabric Linux Cluster on WSL2 based VM."
return $false
}
}
function CleanClusterDataLogFolders
{
$logFolder = GetFabricLogRootFromRegistry
$dataFolder = GetFabricDataRootFromRegistry
Write-Output "Cleaning log and data folder..."
RemoveFolder $logFolder > $null
RemoveFolder $dataFolder > $null
}
function CleanExistingClusterShallow
{
# Stop FabricHostSvc
PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Stop-Service" "Stopped" 10 5
# Remove Service Fabric Node Configuration
try
{
Remove-ServiceFabricNodeConfiguration -Force > $null
}
catch [System.Exception]
{
Write-Warning $_.Exception.ToString()
Write-Warning "Remove-ServiceFabricNodeConfiguration throws exceptions"
}
if(IsMeshClusterDeployed)
{
Write-Output "Deleting Docker network and removing firewall rule..."
DeleteNetworkAndRemoveFirewallRule
}
# Stop all logman sessions
logman stop FabricAppInfoTraces > $null
logman stop FabricCounters > $null
logman stop FabricLeaseLayerTraces > $null
logman stop FabricQueryTraces > $null
logman stop FabricTraces > $null
}
function FabricSetupOperations([string]$operationType)
{
$runtimeInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricCodePath
& "$runtimeInstallPath\FabricSetup.exe" /operation:$operationType
}
function ConstructManifestFileTemplate([string]$jsonTemplate)
{
$runtimeInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricCodePath
$deploymentmangager= Join-Path -Path $runtimeInstallPath -ChildPath "Microsoft.ServiceFabric.DeploymentManager.dll"
[Reflection.Assembly]::LoadFrom($deploymentmangager) > $null
$manifestFileTemplate = [Microsoft.ServiceFabric.DeploymentManager.Common.StandaloneUtility]::GetClusterManifestFromJsonConfig($jsonTemplate, "", "")
return $manifestFileTemplate
}
function SelectJsonFileTemplate([bool]$isSecure,
[bool]$createOneNodeCluster,
[bool]$createMeshCluster = $false)
{
$scriptDir = (GetClusterScriptRootDirectory)
$jsonFileTemplate = $ScriptDir + "\NonSecure"
if($isSecure)
{
$jsonFileTemplate = $ScriptDir + "\Secure"
}
# If Mesh SDK is installed, use the manifests specific to the mesh cluster
if($createMeshCluster -eq $true)
{
$jsonFileTemplate = $jsonFileTemplate + "_Mesh"
}
if($createOneNodeCluster)
{
$jsonFileTemplate = $jsonFileTemplate + "\OneNode"
}
else
{
$jsonFileTemplate = $jsonFileTemplate + "\FiveNode"
}
$jsonFileTemplate = $jsonFileTemplate + "\ClusterManifestTemplate.json"
if (!(TestPathRobust($jsonFileTemplate)))
{
Write-Error "Json template file not found at '$jsonFileTemplate'. Please make sure Service Fabric SDK installed correctly."
throw
}
return $jsonFileTemplate
}
function InstantiateJsonFromTemplate([string]$jsonFileTemplate,
[string]$clusterDataRoot,
[string]$clusterLogRoot,
[bool]$configureFirewall)
{
$configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json
$setupSetting = $configJson.properties.fabricSettings | where {$_.Name -eq "Setup"}
if($setupSetting -eq $null){
$setupSetting = New-Object PSObject -Property @{
name="Setup"
parameters = @()
}
$configJson.properties.fabricSettings += $setupSetting
}
$dataroot = $setupSetting.parameters | where {$_.Name -eq "FabricDataRoot"}
if($dataroot -eq $null) {
$parameter = New-Object PSObject -Property @{
name="FabricDataRoot"
value=$clusterDataRoot
}
$setupSetting.parameters += $parameter
} else {
$dataroot.value = $clusterDataRoot
}
$logroot = $setupSetting.parameters | where {$_.Name -eq "FabricLogRoot"}
if($logroot -eq $null) {
$parameter = New-Object PSObject -Property @{
name="FabricLogRoot"
value=$clusterLogRoot
}
$setupSetting.parameters += $parameter
} else {
$logroot.value = $clusterLogRoot
}
$skipFirewallConfigurationSetting = $setupSetting.parameters | where {$_.Name -eq "SkipFirewallConfiguration"}
$skipFirewallConfiguration = "true"
if($configureFirewall)
{
$skipFirewallConfiguration = "false"
}
if($skipFirewallConfigurationSetting -eq $null) {
$parameter = New-Object PSObject -Property @{
name="SkipFirewallConfiguration"
value=$skipFirewallConfiguration
}
$setupSetting.parameters += $parameter
} else {
$skipFirewallConfigurationSetting.value = $skipFirewallConfiguration
}
$parameter = New-Object PSObject -Property @{
name="IsDevCluster"
value="true"
}
$setupSetting.parameters += $parameter
$jsonObject = ConvertTo-Json $configJson -Depth 10
$temporaryConfigPath = [System.IO.Path]::GetTempFileName() + ".json"
$jsonObject > $temporaryConfigPath
Write-Host "The generated json path is $temporaryConfigPath"
return $temporaryConfigPath
}
function IsLocalClusterSetup
{
try
{
if($null -eq (Get-ServiceFabricNodeConfiguration -WarningAction SilentlyContinue))
{
return $false;
}
return $true;
}
catch [System.Exception]
{
return $false;
}
}
function IsLinuxLocalClusterSetup
{
try
{
if('true' -eq (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').LinuxClusterModeEnabled)
{
return $true;
}
return $false;
}
catch [System.Exception]
{
return $false;
}
}
function IsDirectoryEmpty([string]$dirPath)
{
if((TestPathRobust($dirPath)))
{
$dirInfo = Get-ChildItem -Path $dirPath | Measure-Object
if($dirInfo.Count -eq 0)
{
return $True
}
return $False
}
return $True;
}
function EnsureDirectoryCleaned([string]$dirPath)
{
if (!(RemoveFolder($dirPath)))
{
Write-Error "Cannot clean up $dirPath fully as references are likely being held to items in it. Please remove those and retry."
Write-Warning "Hints: Is some other process holding on to references?"
throw
}
}
function GetDefaultClusterRootRelativePath([string]$rootName)
{
if($rootName -ieq "data")
{
return "SfDevCluster\Data"
}
if($rootName -ieq "log")
{
return "SfDevCluster\Log"
}
if([System.String]::IsNullOrWhiteSpace($rootName))
{
throw
}
}
function ComputeClusterRoot([string]$clusterRoot, [string]$rootName)
{
if([System.String]::IsNullOrWhiteSpace($clusterRoot))
{
$clusterRoot = Join-Path -Path $env:SystemDrive -ChildPath (GetDefaultClusterRootRelativePath($rootName))
}
elseif(![System.IO.Path]::IsPathRooted($clusterRoot))
{
Write-Error "Invalid path provided for cluster $rootName root: $clusterRoot. Please provide a local full path."
throw
}
elseif(($clusterRoot.Length -eq 2) -or ($clusterRoot.Length -eq 3))
{
# The path supplied by user is drive itself (e.g. C: or C:\)
$clusterRoot = Join-Path -Path $clusterRoot -ChildPath (GetDefaultClusterRootRelativePath($rootName))
}
return $clusterRoot
}
function GetClusterRootValueFromJson([string]$jsonFileTemplate, [string]$name){
$configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json
$setupSetting = $configJson.properties.fabricSettings | where {$_.Name -eq "Setup"}
if(($setupSetting -eq $null) -or ($setupSetting.parameters -eq $null)){
return $null
}
$clusteroot = $setupSetting.parameters | where {$_.Name -eq $name}
if($clusteroot -eq $null){
return $null
}
return [System.Environment]::ExpandEnvironmentVariables($clusteroot.value)
}
function SetupDataAndLogRoot([string]$clusterDataRoot, [string]$clusterLogRoot, [string] $jsonFileTemplate, [bool]$isAuto = $False)
{
if([System.String]::IsNullOrWhiteSpace($clusterDataRoot)){
$clusterDataRoot = GetClusterRootValueFromJson -jsonFileTemplate $jsonFileTemplate -name "FabricDataRoot"
}
if([System.String]::IsNullOrWhiteSpace($clusterLogRoot)){
$clusterLogRoot = GetClusterRootValueFromJson -jsonFileTemplate $jsonFileTemplate -name "FabricLogRoot"
}
$clusterDataRoot = ComputeClusterRoot -clusterRoot $clusterDataRoot -rootName "data"
$clusterLogRoot = ComputeClusterRoot -clusterRoot $clusterLogRoot -rootName "log"
Write-Host ""
Write-Host "Using Cluster Data Root: $clusterDataRoot" -ForegroundColor Green
Write-Host "Using Cluster Log Root: $clusterLogRoot" -ForegroundColor Green
Write-Host ""
if(!$isAuto)
{
if(!(IsDirectoryEmpty -dirPath $clusterDataRoot))
{
Write-Host ""
Write-Warning "The cluster data root ($clusterDataRoot) is not empty. All files and subfolders under it will be deleted."
$response = Read-Host -Prompt "Do you want to continue [Y/N]?"
if($response -ine "Y") { return @($False) }
}
if(!(IsDirectoryEmpty -dirPath $clusterLogRoot))
{
Write-Host ""
Write-Warning "The cluster log root ($clusterLogRoot) is not empty. All files and subfolders under it will be deleted."
$response = Read-Host -Prompt "Do you want to continue [Y/N]?"
if($response -ine "Y") { return @($False) }
}
}
EnsureDirectoryCleaned $clusterDataRoot
EnsureDirectoryCleaned $clusterLogRoot
return @($clusterDataRoot, $clusterLogRoot)
}
function SetupImageStore([string]$clusterDataRoot, [bool]$useImageStoreService)
{
$ImageStoreConnectionString = "fabric:ImageStore";
if(!$useImageStoreService)
{
$ImageStoreShare = Join-Path -Path $clusterDataRoot -ChildPath "ImageStoreShare"
New-Item "$ImageStoreShare" -type directory -force > $null
AddWindowsFabricAcl $ImageStoreShare
$ImageStoreConnectionString = "file:" + $ImageStoreShare
}
return $ImageStoreConnectionString
}
function GetMachineName([bool]$useMachineName)
{
$machineName = "localhost";
if ($useMachineName)
{
$machineName = [System.Net.Dns]::GetHostEntry((Get-CIMInstance Win32_ComputerSystem).DNSHostName).HostName;
}
return $machineName;
}
function FindAndReplace([string]$filePath, [string]$toReplace, [string]$newString)
{
(Get-Content $filePath -Encoding UTF8) | ForEach-Object {$_ -replace $toReplace, $newString } | Set-Content $filePath
}
function IsLocalClusterRunning
{
try
{
$fabricService = Get-Service -Name "FabricHostSvc"
if ($fabricService.Status -ne "Running")
{
return $false;
}
return $true;
}
catch [System.Exception]
{
return $false;
}
}
function DockerNetworkCommandFailed( [bool]$warningOnFail )
{
Write-Warning "Unable to communicate with Docker. Validate the following"
Write-Warning " Docker is installed on the machine"
Write-Warning " Docker service is running"
Write-Warning " Docker is configured to run Windows containers"
Write-Warning " Open a command prompt and make sure the following command succeeds"
Write-Warning " docker network create -d=nat --subnet=`"$NetworkSubnet`" --gateway=`"$NetworkGateway`" $NetworkName"
$message = "Unable to communicate with Docker. Visit FAQ at https://aka.ms/sfmesh for details"
if ( -not $warningOnFail )
{
Write-Error $message
throw
}
else
{
Write-Warning $message
}
}
function EnsureDockerIsRunningAndCheckVersion(
[int] $operationMaxRetryCount = 10,
[int] $operationRetryInterval = 10)
{
# Check if docker service is present
Get-service -Name docker -ErrorAction SilentlyContinue
if(!$? )
{
Write-Error "Docker service not installed/configured to run Windows Containers. Visit FAQ at https://aka.ms/sfmesh for details"
throw
}
# Run a docker command, if it fails Restart docker service.
docker version > $null
if(!$? )
{
Write-Output "Stopping docker service"
PerformServiceOperationWithWaitforStatus "docker" "Stop-Service" "Stopped" $operationMaxRetryCount $operationRetryInterval "Unable to restart docker service, Ensure its running before setting up cluster. Visit FAQ at https://aka.ms/sfmesh for details"
Write-Output "Starting docker service"
PerformServiceOperationWithWaitforStatus "docker" "Start-Service" "Running" $operationMaxRetryCount $operationRetryInterval "Unable to restart docker service, Ensure its running before setting up cluster. Visit FAQ at https://aka.ms/sfmesh for details"
# Wait for docker service to be in a state to process commands
ExecuteDockerCommand -dockercommandParameters "network ls" -retryCommand $true -warningOnFail $true -dockerOperationMaxRetryCount $operationMaxRetryCount -dockerOperationRetryInterval $operationRetryInterval
}
# Run the command again and check if docker is configured to run windows containers
$versionContent = ExecuteDockerCommand -dockercommandParameters "version" -retryCommand $false
if( $versionContent -match "linux")
{
Write-Error "Docker configured to run Linux containers. Configure it to run Windows Containers. Visit FAQ at https://aka.ms/sfmesh for details"
throw
}
}
function ExecuteDockerCommand(
[string] $dockercommandParameters,
[string] $successStringMatchOnError = "",
[bool] $warningOnFail = $false,
[bool] $retryCommand = $true,
[int] $dockerOperationMaxRetryCount = 10,
[int] $dockerOperationRetryInterval = 10)
{
[int]$dockerOperationRetryCount = 0
$dockerOperationSucceeded = $false
$dockerOperationContent = ""
$tempErrorFile = [System.IO.Path]::GetTempFileName()
#Write-Host "Executing 'docker $dockercommandParameters'"
while($dockerOperationRetryCount -lt $dockerOperationMaxRetryCount -and $dockerOperationSucceeded -eq $false)
{
$dockerOperationContent = docker $dockercommandParameters.Split(" ") 2> $tempErrorFile
if( $? )
{
$dockerOperationSucceeded = $true
break
}
if( -not $? -and -not [string]::IsNullOrEmpty($successStringMatchOnError) )
{
(Get-Content $tempErrorFile -Encoding UTF8) -match $successStringMatchOnError
if ( $? )
{
$dockerOperationSucceeded = $true
break;
}
}
if( -not $retryCommand )
{
break
}
Start-Sleep -s $dockerOperationRetryInterval
$dockerOperationRetryCount += 1
}
if( -not $dockerOperationSucceeded )
{
DockerNetworkCommandFailed $warningOnFail
}
return $dockerOperationContent
}
function ExecuteDockerNetworkCommand(
[string] $dockercommandParameters,
[string] $successStringMatchOnError = "",
[bool] $warningOnFail = $false,
[bool] $retryCommand = $true)
{
ExecuteDockerCommand -dockercommandParameters "network $dockercommandParameters" `
-successStringMatchOnError $successStringMatchOnError `
-warningOnFail $warningOnFail `
-retryCommand $retryCommand
}
function PerformServiceOperationWithWaitforStatus(
[string] $serviceName,
[string] $operation,
[string] $intendedState,
[int] $serviceStateMaxRetryCount = 20,
[int] $serviceStateRetryInterval = 5,
[string] $failureMsg = "")
{
Write-Host "Performing" $operation "on:" $serviceName ". This may take a few minutes..."
& $operation $serviceName -WarningAction SilentlyContinue -ErrorAction SilentlyContinue > $null
# Check if IntendedServiceState is achieved
[int]$retryCount = 0
while($retryCount++ -le $serviceStateMaxRetryCount)
{
$serviceState = Get-Service -Name $serviceName
if ($serviceState.Status -ne $intendedState)
{
Start-Sleep -s $serviceStateRetryInterval
}
else
{
return;
}
}
if($failureMsg -eq "")
{
$errorStr = [string]::Format( "Could not perform the operation:{0} on the service:{1}.", $operation, $serviceName)
Write-Error $errorStr
}
else
{
Write-Error $failureMsg
}
throw
}
function CreateNetworkAndAddFirewallRule(
[string] $jsonFileTemplate)
{
# unconditionally delete the firewall rule
Remove-NetFirewallRule -Name "SF Container to host" -ErrorAction Ignore
# check if docker is configured to run windows containers
EnsureDockerIsRunningAndCheckVersion
# get network configuration information from template file
$configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json
$hostingSetting = $configJson.properties.fabricSettings | Where-Object {$_.Name -eq "Hosting"}
if( $hostingSetting -eq $null )
{
Write-Error "Hosting section has to be specified in ClusterManifestTemplate.json"
throw
}
$localNatIpProviderNetworkName = $hostingSetting.parameters | Where-Object {$_.Name -eq "LocalNatIpProviderNetworkName"}
if( $localNatIpProviderNetworkName.value -eq $null )
{
Write-Error "LocalNatIpProviderNetworkName has to be specified in ClusterManifestTemplate.json under Hosting."
throw
}
else
{
$NetworkName = $localNatIpProviderNetworkName.value
if( $NetworkName -eq $null )
{
Write-Error "LocalNatIpProviderNetworkName in ClusterManifestTemplate.json cannot be empty"
throw
}
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalNatIpProviderNetworkName -Value $NetworkName
}
$localNatIpProviderNetworkRange = $hostingSetting.parameters | Where-Object {$_.Name -eq "LocalNatIpProviderNetworkRange"}
if( $localNatIpProviderNetworkRange.value -eq $null )
{
Write-Error "LocalNatIpProviderNetworkRange has to be specified in ClusterManifestTemplate.json under Hosting."
throw
}
else
{
$NetworkSubnet = $localNatIpProviderNetworkRange.value
if ( $NetworkSubnet -match '^(([0-9]{1,3}\.){3})[0-9]{1,3}(\/([0-9]|[1-2][0-9]|3[0-2]))?$' )
{
$val = $Matches[1] + "1"
}
else
{
Write-Error "LocalNatIpProviderNetworkRange specified is not a valid subnet range. Please enter a valid CIDR format subnet."
throw
}
$NetworkGateway = $val
}
# unconditionally try to delete the network
$ignore = ExecuteDockerNetworkCommand -dockercommandParameters "rm $NetworkName" -successStringMatchOnError "No such network:"
# try to create the network
$ignore = ExecuteDockerNetworkCommand -dockercommandParameters "create -d=nat --subnet=`"$NetworkSubnet`" --gateway=`"$NetworkGateway`" $NetworkName"
# inspect to check if the network was created
$inspectContent = ExecuteDockerNetworkCommand -dockercommandParameters "inspect $NetworkName"
# some additional checks to see if create succeeded
$inspectSubnet = ($inspectContent | Convertfrom-Json)[0].IPAM.Config.Subnet
$inspectGatewayIP = ($inspectContent | Convertfrom-Json)[0].IPAM.Config.Gateway
if( $inspectSubnet -ne $NetworkSubnet -or $inspectGatewayIP -ne $NetworkGateway)
{
DockerNetworkCommandFailed $false
}
New-NetFirewallRule -Name "SF Container to host" -DisplayName "SF Container to host" -LocalAddress $NetworkGateway -RemoteAddress $NetworkSubnet > $null
}
function DeleteNetworkAndRemoveFirewallRule
{
# unconditionally delete the firewall rule
Remove-NetFirewallRule -Name "SF Container to host" -ErrorAction Ignore
$NetworkName = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').LocalNatIpProviderNetworkName
if( $NetworkName -eq $null -or $NetworkName -eq "" )
{
return
}
EnsureDockerIsRunningAndCheckVersion
# unconditionally try to delete the network
$ignore = ExecuteDockerNetworkCommand -dockercommandParameters "rm $NetworkName" -successStringMatchOnError "No such network:" -warningOnFail $true
# Clear out the reg key indicating the LocalNatIpProviderNetworkName.
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalNatIpProviderNetworkName -Value ""
}
function PrepareClusterManifest([string]$manifestFileTemplate,
[string]$imageStoreConnectionString,
[string]$machineName,
[bool]$isSecure = $False,
[bool]$isMeshCluster = $False)
{
$manifestFile = Join-Path -Path $env:TEMP -ChildPath "$env:computername-Server-ScaleMin.xml"
Copy-Item $manifestFileTemplate $manifestFile -Force
FindAndReplace -filePath $manifestFile -toReplace "ComputerFullName" -newString $machineName
FindAndReplace -filePath $manifestFile -toReplace "ImageStoreConnectionStringPlaceHolder" -newString $imageStoreConnectionString
if ($isSecure -or $isMeshCluster)
{
$srcStoreScope = "LocalMachine"
$srcStoreName = "My"
$srcStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $srcStoreName, $srcStoreScope
$srcStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly)
$cert = $srcStore.certificates -match "CN=ServiceFabricDevClusterCert"
if($isSecure)
{
# Replace cluster cert thumbprint.
FindAndReplace -filePath $manifestFile -toReplace "ServiceFabricDevClusterCertParameter" -newString $cert.Thumbprint.ToString()
}
# Replace EncryptionCertificateThumbprint used by SecretService, this certificate is needed both for secured and unsecured clusters.
FindAndReplace -filePath $manifestFile -toReplace "EncryptionCertificateThumbprintParameter" -newString $cert.Thumbprint.ToString()
$srcStore.Close()
}
Test-ServiceFabricClusterManifest -ClusterManifestPath "$manifestFile" > $null
if (!$?)
{
Write-Error "Could not validate cluster manifest '$manifestFile'"
throw
}
return $manifestFile
}
function DeployNodeConfiguration([string]$clusterDataRoot,
[string]$clusterLogRoot,
[bool]$isSecure = $False,
[bool]$useMachineName = $True,
[bool]$createOneNodeCluster = $False,
[bool]$configureFirewall = $False,
[bool]$createMeshCluster = $False,
[bool]$useImageStoreService = $False)
{
$jsonFileTemplate = SelectJsonFileTemplate -isSecure $isSecure -createOneNodeCluster $createOneNodeCluster -createMeshCluster $createMeshCluster
$jsonTemplate = InstantiateJsonFromTemplate -jsonFileTemplate $jsonFileTemplate -clusterDataRoot $clusterDataRoot -clusterLogRoot $clusterLogRoot $configureFirewall
$manifestFileTemplate = ConstructManifestFileTemplate -jsonTemplate $jsonTemplate
if($createMeshCluster -eq $true)
{
Write-Output "Creating Docker network and adding firewall rule..."
CreateNetworkAndAddFirewallRule -jsonFileTemplate $jsonFileTemplate
}
# Use Image Store Service when configuring firewall.
$imageStoreConnectionString = SetupImageStore -clusterDataRoot $clusterDataRoot -useImageStoreService $useImageStoreService
$machineName = GetMachineName -useMachineName $useMachineName
$manifestFile = PrepareClusterManifest $manifestFileTemplate $imageStoreConnectionString $machineName $isSecure $createMeshCluster
# Stop Fabric Host Service (if running just in case)
PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Stop-Service" "Stopped" 10 5
New-ServiceFabricNodeConfiguration -ClusterManifest "$manifestFile" -FabricDataRoot "$clusterDataRoot" -FabricLogRoot "$clusterLogRoot" -RunFabricHostServiceAsManual
if (!$?)
{
Write-Error "Could not create Node configuration for '$manifestFile'"
throw
}
if($createOneNodeCluster)
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value 1
if($createMeshCluster -eq $false)
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "false"
}
else
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "true"
}
}
else
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value 5
if($createMeshCluster -eq $false)
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "false"
}
else
{
Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "true"
}
}
# Saves Connection Parameters in dataRoot for REST based powershell to consume.
SaveConnectionParameters -dataRoot $clusterDataRoot -isSecure $isSecure -useMachineName $useMachineName
}
function StartLocalCluster
{
# Start Service Fabric on this Node
PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Start-Service" "Running" 60 10
}
function GetConnectionParameters([bool]$isSecure = $False, [bool]$useMachineName = $False)
{
[HashTable]$connParams = @{}
$machineName = GetMachineName -useMachineName $useMachineName
$connectionEndpoint = [string]::Concat($machineName, ":19000")
$connParams.Add("ConnectionEndpoint", $connectionEndpoint)
if ($isSecure)
{
$connParams.Add("X509Credential", $True)
$connParams.Add("ServerCommonName", "ServiceFabricDevClusterCert")
$connParams.Add("FindType", 'FindBySubjectName')
$connParams.Add("FindValue", 'CN=ServiceFabricDevClusterCert')
$connParams.Add("StoreLocation", 'LocalMachine')
$connParams.Add("StoreName", "MY")
}
return $connParams
}
function SaveConnectionParameters([string] $dataRoot, [bool]$isSecure = $False, [bool]$useMachineName = $False)
{
# Saves Connection Parameters in dataRoot for REST based powershell to consume.
$connectInfoFile = $dataRoot + "\ServiceFabricLocalClusterConnectionParams.json"
$httpConnectionEndpoint = "http://" + $machineName + ":19080"
if ($isSecure)
{
$httpConnectionEndpoint = "https://" + $machineName + ":19080"
}
$connParams = GetConnectionParameters -isSecure $isSecure -useMachineName $useMachineName
$connParams.Add("HttpConnectionEndpoint", $httpConnectionEndpoint)
$connParams | ConvertTo-Json -Depth 10 | Out-File $connectInfoFile
}
function TryConnectToCluster([HashTable]$connParams, [int]$waitTime)
{
[int]$connRetryInterval = 10
[int]$maxExpConnTime = $waitTime
[int]$timeSpentConn = 0
$connParams.Add("TimeoutSec", $connRetryInterval)
$connParams.Add("WarningAction", 'SilentlyContinue')
$IsConnSuccesfull = $False
Write-Host ""
Write-Host "Waiting for Service Fabric Cluster to be ready. This may take a few minutes..."
do
{
try
{
[void](Connect-ServiceFabricCluster @connParams)
#Test the connection
$testWarnings = @()
$IsConnSuccesfull = (Test-ServiceFabricClusterConnection -TimeoutSec 5 -WarningAction SilentlyContinue -WarningVariable testWarnings)
if (($IsConnSuccesfull -eq $True) -and ($testWarnings.Count -eq 0))
{
Write-Host "Local Cluster ready status: 100% completed."
return
}
}
catch [System.Exception]
{
# Retry
}
if($timeSpentConn -ge $maxExpConnTime)
{
Write-Warning "Service Fabric Cluster is taking longer than expected to connect."
return
}
Start-Sleep -s $connRetryInterval
# Print progress and retry
$timeSpentConn += $connRetryInterval
$progress = [int]($timeSpentConn * 100 / $maxExpConnTime)
Write-Host "Local Cluster ready status: $progress% completed."
}
while($True)
}
function CheckNamingServiceReady([HashTable]$connParams, [int]$waitTime)
{
CheckServiceReady $connParams "fabric:/System/NamingService" $waitTime
}
function CheckServiceReady([HashTable]$connParams, [string]$serviceName, [int]$waitTime)
{
[int]$RetryInterval = 10
[int]$maxExpTime = $waitTime
[int]$timeSpent = 0
Write-Host ""
Write-Host "Waiting for $serviceName to be ready. This may take a few minutes..."
[void](Connect-ServiceFabricCluster @connParams)
do
{
try
{
$nsPartitions = Get-ServiceFabricPartition -ServiceName $serviceName
$isReady = $true
foreach ($partition in $nsPartitions)
{
if(!$partition.PartitionStatus.Equals([System.Fabric.Query.ServicePartitionStatus]::Ready))
{
$isReady = $false
break
}
}
if($isReady)
{
Write-Host "$serviceName is ready now..."
Write-Host ""
return;
}
}
catch [System.Exception]
{
# Retry
}
if($timeSpent -ge $maxExpTime)
{
Write-Warning "$serviceName is taking longer than expected to be ready..."
return
}
Start-Sleep -s $RetryInterval
# Print progress and retry
$timeSpent += $RetryInterval
$progress = [int]($timeSpent * 100 / $maxExpTime)
Write-Host "$serviceName ready status: $progress% completed."
}
while($true)
}
function CleanTicketFiles
{
$clusterDataRoot = GetFabricDataRootFromRegistry
$tktFileDirRelPath = "Fabric\Work"
$firstLevelDirs = Get-ChildItem -Path $clusterDataRoot -Directory
ForEach($dir in $firstLevelDirs)
{
$ticketFileDir = Join-Path -Path $dir.FullName -ChildPath $tktFileDirRelPath
if(Test-Path($ticketFileDir))
{
Get-ChildItem -Path $ticketFileDir -File -Filter *.tkt |
ForEach ($_) { Remove-Item $_.FullName -ErrorAction SilentlyContinue }
}
}
}
function LaunchLocalClusterManager
{
Write-Output "Launching Service Fabric Local Cluster Manager..."
Write-Output "You can use Service Fabric Local Cluster Manager (system tray application) to manage your local dev cluster."
Start-Process "ServiceFabricLocalClusterManager.exe"
}
function DeployAddonService ([HashTable]$connParams, [string]$appName, [string]$nuPkgName, [int]$waitTime, [HashTable]$appParams, [string]$nugetRoot)
{
$version = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricVersion
# if add on service not present in the cluster
if(!(IsApplicationDeployed $appName))
{
Write-Host "Deploying Addon Service:$appName in the cluster..."
$tempAppDir = $env:temp + "\$appName"
$tempAppPackage = $tempAppDir + "\$appName"
Remove-Item $tempAppDir -Recurse -ErrorAction Ignore
New-Item -ItemType directory -Path $tempAppDir
$srcNugetPath = (Get-ChildItem -Path $nugetRoot | where-object {$_.Name -match $nuPkgName }).FullName
#extract nuget at $tempAppDir location
Add-Type -AssemblyName System.IO.Compression.FileSystem;
[System.IO.Compression.ZipFile]::ExtractToDirectory($srcNugetPath,$tempAppDir);
# deploy service from temp location
Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $tempAppPackage -ShowProgress -CompressPackage
Register-ServiceFabricApplicationType $appName
$appType = $appName+"Type"
New-ServiceFabricApplication fabric:/$appName $appType $version -ApplicationParameter $appParams
# wait for service ready
CheckServiceReady $connParams "fabric:/$appName/Service" $waitTime
Remove-Item -Path $tempAppDir -Recurse -Force
}
else
{
Write-Host "Addon Service:$appName already deployed in the cluster..."
}
}
function DeployAddonServices ([HashTable]$connParams, [int]$waitTime, [bool]$oneNodeCluster)
{
# This function is for deploying any addon services needed for this cluster.
# This feature will be repleaced with Optional Components as the model for shipping addons going forwards.
if(IsMeshSDKInstalled)
{
[void](Connect-ServiceFabricCluster @connParams)
# App parameters:
$InstanceCount = 1
$ListenPort = 19100
$nugetRoot = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricMeshToolsPath + "\AddonServices"
$appParams = @{"InstanceCount" = "$InstanceCount"; "ListenPort" = "$ListenPort" }
DeployAddonService $connParams "AzureFilesVolumePlugin" "Microsoft.ServiceFabric.AzureFiles.VolumePlugin" $waitTime $appParams $nugetRoot
}
}
function IsMeshSDKInstalled
{
$retVal = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Service Fabric SDK').FabricMeshSDKVersion
if($retVal -ne $null)
{
return $true
}
else
{
return $false
}
}
function IsMeshClusterDeployed
{
$keyValue = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').IsMeshCluster
if($keyValue -match "true")
{
return $true
}
else
{
return $false
}
}
function IsApplicationDeployed([string]$appName)
{
$retVal = Get-ServiceFabricApplication -ApplicationName fabric:/$appName
if($retVal -ne $null)
{
return $true
}
return $false
}
function DeployLinuxCluster([string]$clusterDataRoot,
[string]$linuxDistribution,
[bool]$createOneNodeCluster = $False)
{
Write-Host "Setting up Linux Local Cluster..." -ForegroundColor Green
$sdkRegistryPath='HKLM:\Software\Microsoft\Service Fabric SDK'
try {
if((IsWslRunning) -and (IsGenieRunning))
{
if($createOneNodeCluster)
{
wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustersetup.sh --createonenodecluster
Set-ItemProperty -Path $sdkRegistryPath -Name LocalClusterNodeCount -Value 1
}
else
{
wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustersetup.sh
Set-ItemProperty -Path $sdkRegistryPath -Name LocalClusterNodeCount -Value 5
}
}
else
{
Write-Error "WSL2 in Windows host and Systemd genie inside linux guest distribution must be running before setting up local cluster. Please refer to (https://docs.microsoft.com/azure/service-fabric/service-fabric-local-linux-cluster-windows-wsl2) for details about setting up Service Fabric Linux Cluster on WSL2 based VM."
exit 1
}
}
catch {
Write-Error "There were error while setting up Linux Cluster."
exit 1
}
Set-ItemProperty -Path $sdkRegistryPath -Name LinuxClusterModeEnabled -Value 'true'
# Connect-ServiceFabricCluster cmdlet loads config from FabricHostSettings.xml. Copying this ensures that this cmdlet connects to
# linux local cluster without connection endpoint
$fabricSettingsPath = "\\wsl$\" + $linuxDistribution + "\home\sfuser\sfdevcluster\data\FabricHostSettings.xml"
if(Test-Path $fabricSettingsPath)
{
Copy-Item $fabricSettingsPath $clusterDataRoot
}
else
{
Write-Error "$fabricSettingsPath doesn't exist and is not copied to $clusterDataRoot. This will break Connect-ServiceFabricCluster cmdlet and Visual Studio Integration for linux local cluster."
exit 1
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAf46jbFjK57ql
# 9bIgfHI4BsuLJ6N4MCyzlZg28UEal6CCDYUwggYDMIID66ADAgECAhMzAAADTU6R
# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+
# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd
# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k
# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x
# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH
# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD
# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT
# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq
# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY
# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN
# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv
# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE
# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH
# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z
# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab
# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA
# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM/A
# buTckETF/vu0wC5Pw4rW3WRwqgoS8XAzL84LM8B0MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEANHP0rMFc1X2d389I0pRH0OUrBKQEVH8kehGA
# fKtHJa5rqsm8kvhBuYpdGut0+KaAzQtCZqRi64pHrjqDCMDI9VVMqLf0urxzLWY6
# cn2Pj9vpP7NtUSVS64k3Tusi9XJ/gsy1KQwUZE+PnrtEqPD3hQ7qZHMdnJS5KloG
# KUKxps7s6c6HqbLpQ5CxukpP7S8wWOrOs+6lkbIb0e+Kz6RcqMXimBfuPVNpaUhF
# wd4vdUzLNAFozCzAF34a9VGGb8kg+tjUaMK1F65nPIjeaZEiD5Av1ljOec0KNSNG
# bXwdX3SpFtOlo7dpzeF1vKt5cuLdc4RXUE5oTa0UENiM0wmjVaGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCjjoXZ6hYnG3H6w5R61f8pPwLdtJbDUGJI
# +KGNCeXJ3gIGZSid4J4xGBMyMDIzMTAxNzE4MjUzMS42NDJaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAAB
# AAAB1DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzA1MjUxOTEyMjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybW
# cSAbu8FLwTEtOvw3uXMpa1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4
# CpXB1Hwn1YYovuYujoQV9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyyS
# vjwPvZuxH8RNcOOB8ABDhJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1
# F3lt7Ni47pJMGMLqZQCK7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQ
# P/7c7oPJPDFgpbGB2HRJaE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1Ls
# JmFWJHbqGr6o0irW7IqDkf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBk
# rmil0H/tv3HYyE6A490ZFEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/
# ZGHJ2cbuIer9umQYu/Fz1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qm
# YRymjDmpfzZvfvGBGUbOpx+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuN
# X1Tpz4KZLM8GlzZLje3aHfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/
# wHCt4HyXW4WgTGPizyExTQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6
# EoB5Hedcsru0DHZJMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdR
# hYlZ9Bk4/bLzLOzq+wcC7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL
# 4PizKnStLDBsWT+ds1hayNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04
# PGjcFhH1gGRphz+tcDNK/CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcT
# V9W13cm2FD5F/XWO37Ti+G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40
# YIkTNnuco6ny7vEBmWFjcr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rv
# EQ/PUJi3popYsrQKuogphdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHh
# eQNd/a3X/2zpSwEROOcy1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+R
# XUB4A6UL1E1Xjtzr/b9qz9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYA
# TVI2lwL9QDSEt8F0RW6LekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71Hyil
# telaMhRUsNVkaKzAJrUoESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy
# 3vUDJpjUTYLtaTWkQtz6UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQAtM12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6NkK0TAi
# GA8yMDIzMTAxNzEzMjk1M1oYDzIwMjMxMDE4MTMyOTUzWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDo2QrRAgEAMAcCAQACAgxjMAcCAQACAhLaMAoCBQDo2lxRAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBADBGHzvjpypDTUrk11BX/Rug7BI6
# pHuLxXSv/Ru4Mi48ICirudS0rxwEyoS8dO6cjgjvyidJe0/HXEf9nHADp/xO+TBb
# oP033gI/DGoBaAlcx+fObRAmP+2K2u6mLLfRcHt1ZjxFy8PVMVAwrpqasMo2xEOg
# 10P4cimz0BAsICF9zs4qVuVAg7vIS7gFrOS3J7zy0IvLtz+bTKheCvzTbjaiPR+y
# Fsn53zMuEho0sKz4+aqq4c/4zcxkK3JnLQSTsAUYNNewVcbU9NKaaWmIbyjQ0v2T
# T2qmrrQbKoQ8PAt3GFpGxTpXaJYHVcV3f8hohvgLLZ+L4vAkNe2scVW4654xggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdTk
# 6QMvwKxprAABAAAB1DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAIEnirKxorekedAO7fmgIAqcMQ
# 7Wic6Fd0RBTCrw0txTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzqh/rY
# FKXOlzvWS5xCtPi9aU+fBUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQglSBccjx5
# 9C5sMkuCtpoIozrgkg44I70ey15asV3Va2MwDQYJKoZIhvcNAQELBQAEggIAOGY9
# lthFN7Bggs0g+eYikFeJeZzqUikyF2jo9oPlctLCHVySJyhyiPRv75YOJgzqbU6x
# IBqAkdPOlK7YUFJmxmLidvRPylmxwDxJ0RrLTKobvc73x9NPjt/McZSPyDUZH3FJ
# bMbmk1zvy8ZTTMN37oz7Jx63bIGmSaqy1JSMJziei4mSDtlSSBn5SjG09+q/PDUy
# PSRR7xHU28dhydv/WiQN7uGYRBVmkXFTRaQc/v0OYGFk2jG4IjOdnbY2C1kCp9Pd
# ko9ymUaPqhkx9asaXQlayLXPN/kpvHeMoxEkLGxochRKUqrTU+wM0DWZIgUExrcb
# SZJb1B59lnB5WxjeGxXKg70MxTpze3rr4wX88Zv5E/fjkvsBkm8NNCHYtqbDBCQd
# O3sLAPNOvWg8Pgchbl4Bl0soRG1gNkgJakuqK6oleOst0+3Up5iWysUEB+S2Is+2
# 2de2yvJPf4p2LEEGpiOJACsmzcQIrwUb+HwWGD8UhXTHc6ebLzF+I9GVlZwNv4yp
# a2Ij6bOLjWl/SzZyKl9phyGhERHy6KcLO1ZknwlDSorU3CBwnYLQMixT57Zr4BaN
# 9YU2h1Bt15rPeSJ8i1cULJRIViYXggna20Ydz7/yr/+3knJXAGaQTmqJGcNvW6Ce
# YBvSzVTxSfsSj46qosKwTOMLZ0OQYKR7kxwDOlo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/LibraryMSCS_1.ps1
|
LibraryMSCS_1.ps1
|
# ------------------------------------------------------------------------
### <Script>
### <Author>
### Chad Miller
### </Author>
### <Description>
### Defines functions for working with Microsoft Cluster Service (MSCS)
### </Description>
### <Usage>
### . ./LibraryMSCS.ps1
### </Usage>
### </Script>
# ------------------------------------------------------------------------
#######################
function Get-Cluster
{
param($cluster)
gwmi -class "MSCluster_Cluster" -namespace "root\\mscluster" -computername $cluster
} #Get-Cluster
#######################
function Get-ClusterName
{
param($cluster)
Get-Cluster $cluster | select -ExpandProperty name
} #Get-ClusterName
#######################
function Get-ClusterNode
{
param($cluster)
gwmi -class MSCluster_Node -namespace "root\\mscluster" -computername $cluster | add-member -pass NoteProperty Cluster $cluster
} #Get-ClusterNode
#######################
function Get-ClusterSQLVirtual
{
param($cluster)
gwmi -class "MSCluster_Resource" -namespace "root\\mscluster" -computername $cluster | where {$_.type -eq "SQL Server"} | Select @{n='Cluster';e={$cluster}}, Name, State, @{n='VirtualServerName';e={$_.PrivateProperties.VirtualServerName}}, @{n='InstanceName';e={$_.PrivateProperties.InstanceName}}, `
@{n='ServerInstance';e={("{0}\\{1}" -f $_.PrivateProperties.VirtualServerName,$_.PrivateProperties.InstanceName).TrimEnd('\\')}}, `
@{n='Node';e={$(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($_.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name)}}
} #Get-ClusterSQLVirtual
#######################
function Get-ClusterNetworkName
{
param($cluster)
gwmi -class "MSCluster_Resource" -namespace "root\\mscluster" -computername $cluster | where {$_.type -eq "Network Name"} | Select @{n='Cluster';e={$cluster}}, Name, State, @{n='NetworkName';e={$_.PrivateProperties.Name}}, `
@{n='Node';e={$(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($_.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name)}}
} #Get-ClusterNetworkName
#######################
function Get-ClusterResource
{
param($cluster)
gwmi -ComputerName $cluster -Namespace "root\\mscluster" -Class MSCluster_Resource | add-member -pass NoteProperty Cluster $cluster |
add-member -pass ScriptProperty Node `
{ gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($this.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name } |
add-member -pass ScriptProperty Group `
{ gwmi -ComputerName $cluster -Namespace "root\\mscluster" -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($this.Name)'} WHERE AssocClass = MSCluster_ResourceGroupToResource" | Select -ExpandProperty Name }
} #Get-ClusterResource
#######################
function Get-ClusterGroup
{
param($cluster)
gwmi -class MSCluster_ResourceGroup -namespace "root\\mscluster" -computername $cluster | add-member -pass NoteProperty Cluster $cluster |
add-member -pass ScriptProperty Node `
{ gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_ResourceGroup.Name='$($this.Name)'} WHERE AssocClass = MSCluster_NodeToActiveGroup" | Select -ExpandProperty Name } |
add-member -pass ScriptProperty PreferredNodes `
{ @(,(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_ResourceGroup.Name='$($this.Name)'} WHERE AssocClass = MSCluster_ResourceGroupToPreferredNode" | Select -ExpandProperty Name)) }
} #Get-ClusterGroup
|
combined_dataset/train/non-malicious/3712.ps1
|
3712.ps1
|
function Test-AzureRmIotHubRoutingLifecycle
{
$azureStorageResourceGroupName = 'pshardcodedrg1234'
$azureStorageSubscriptionId = '91d12660-3dec-467a-be2a-213b5544ddc0'
$ascConnectionString = 'DefaultEndpointsProtocol=https;AccountName=pshardcodedstorage1234;AccountKey=W1ujKNLtPmMtaNqZfOCUU5cnYMI8bQeF9ODce4riISyT2RSXiIxcwuwQhzCmIuwPWi82ParLfbq1bOF5ypUnPw==;EndpointSuffix=core.windows.net'
$containerName1 = 'container1'
$containerName2 = 'container2'
$Location = Get-Location "Microsoft.Devices" "IotHubs" "WEST US 2"
$IotHubName = getAssetName
$ResourceGroupName = getAssetName
$namespaceName = getAssetName 'eventHub'
$eventHubName = getAssetName
$authRuleName = getAssetName
$endpointName = getAssetName
$endpointName1 = getAssetName
$endpointName2 = getAssetName
$routeName = getAssetName
$enrichmentName = getAssetName
$enrichmentValue = getAssetName
$enrichmentUpdatedValue = getAssetName
$endpoints = @($endpointName1,$endpointName2)
$Sku = "S1"
$EndpointTypeEventHub = [Microsoft.Azure.Commands.Management.IotHub.Models.PSEndpointType] "EventHub"
$EndpointTypeAzureStorage = [Microsoft.Azure.Commands.Management.IotHub.Models.PSEndpointType] "AzureStorageContainer"
$RoutingSourceTwinChangeEvents = [Microsoft.Azure.Commands.Management.IotHub.Models.PSRoutingSource] "TwinChangeEvents"
$RoutingSourceDeviceMessages = [Microsoft.Azure.Commands.Management.IotHub.Models.PSRoutingSource] "DeviceMessages"
$resourceGroup = New-AzResourceGroup -Name $ResourceGroupName -Location $Location
$iothub = New-AzIotHub -Name $IotHubName -ResourceGroupName $ResourceGroupName -Location $Location -SkuName $Sku -Units 1
$eventHubNamespace = New-AzEventHubNamespace -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -Location $Location
Wait-Seconds 15
Assert-True {$eventHubNamespace.ProvisioningState -eq "Succeeded"}
$regexMatches = $eventHubNamespace.Id | Select-String -Pattern '^/subscriptions/(.*)/resourceGroups/(.*)/providers/(.*)$'
$eventHubSubscriptionId = $regexMatches.Matches.Groups[1].Value
$eventHubResourceGroup = $regexMatches.Matches.Groups[2].Value
$msgRetentionInDays = 3
$partionCount = 2
$eventHub = New-AzEventHub -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -MessageRetentionInDays $msgRetentionInDays -PartitionCount $partionCount
$rights = "Listen","Send"
$authRule = New-AzEventHubAuthorizationRule -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -AuthorizationRuleName $authRuleName -Rights $rights
$keys = Get-AzEventHubKey -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -AuthorizationRuleName $authRuleName
$ehConnectionString = $keys.PrimaryConnectionString
$routingEndpoints = Get-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $routingEndpoints.Count -eq 0}
$newRoutingEndpoint = Add-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName -EndpointType $EndpointTypeEventHub -EndpointResourceGroup $eventHubResourceGroup -EndpointSubscriptionId $eventHubSubscriptionId -ConnectionString $ehConnectionString
Assert-True { $newRoutingEndpoint.ResourceGroup -eq $eventHubResourceGroup}
Assert-True { $newRoutingEndpoint.SubscriptionId -eq $eventHubSubscriptionId}
Assert-True { $newRoutingEndpoint.Name -eq $endpointName}
$newRoutingEndpoint1 = Add-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName1 -EndpointType $EndpointTypeAzureStorage -EndpointResourceGroup $azureStorageResourceGroupName -EndpointSubscriptionId $azureStorageSubscriptionId -ConnectionString $ascConnectionString -ContainerName $containerName1 -Encoding json
Assert-True { $newRoutingEndpoint1.Name -eq $endpointName1}
Assert-True { $newRoutingEndpoint1.ResourceGroup -eq $azureStorageResourceGroupName}
Assert-True { $newRoutingEndpoint1.SubscriptionId -eq $azureStorageSubscriptionId}
Assert-True { $newRoutingEndpoint1.Encoding -eq "json"}
$newRoutingEndpoint2 = Add-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName2 -EndpointType $EndpointTypeAzureStorage -EndpointResourceGroup $azureStorageResourceGroupName -EndpointSubscriptionId $azureStorageSubscriptionId -ConnectionString $ascConnectionString -ContainerName $containerName2
Assert-True { $newRoutingEndpoint2.Name -eq $endpointName2}
Assert-True { $newRoutingEndpoint2.ResourceGroup -eq $azureStorageResourceGroupName}
Assert-True { $newRoutingEndpoint2.SubscriptionId -eq $azureStorageSubscriptionId}
Assert-True { $newRoutingEndpoint2.Encoding -eq "avro"}
$updatedRoutingEndpoints = Get-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $updatedRoutingEndpoints.Count -eq 3}
Assert-True { $updatedRoutingEndpoints[0].Name -eq $endpointName}
Assert-True { $updatedRoutingEndpoints[0].EndpointType -eq $EndpointTypeEventHub}
Assert-True { $updatedRoutingEndpoints[1].Name -eq $endpointName1}
Assert-True { $updatedRoutingEndpoints[1].EndpointType -eq $EndpointTypeAzureStorage}
Assert-True { $updatedRoutingEndpoints[2].Name -eq $endpointName2}
Assert-True { $updatedRoutingEndpoints[2].EndpointType -eq $EndpointTypeAzureStorage}
$enrichments = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $enrichments.Count -eq 0}
$newEnrichment = Add-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Value $enrichmentValue -Endpoint $endpointName1
Assert-True { $newEnrichment.Key -eq $enrichmentName}
Assert-True { $newEnrichment.Value -eq $enrichmentValue}
Assert-True { $newEnrichment.EndpointNames -eq $endpointName1}
$enrichments = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $enrichments.Count -eq 1}
$enrichment = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName
Assert-True { $enrichment.Key -eq $enrichmentName}
Assert-True { $enrichment.Value -eq $enrichmentValue}
Assert-True { $enrichment.EndpointNames -eq $endpointName1}
$updatedEnrichment = Set-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Value $enrichmentUpdatedValue
Assert-True { $updatedEnrichment.Key -eq $enrichmentName}
Assert-True { $updatedEnrichment.Value -eq $enrichmentUpdatedValue}
Assert-True { $updatedEnrichment.EndpointNames -eq $endpointName1}
$updatedEnrichment = Set-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Endpoint $endpointName1,$endpointName2
Assert-True { $updatedEnrichment.Key -eq $enrichmentName}
Assert-True { $updatedEnrichment.Value -eq $enrichmentUpdatedValue}
Assert-True { $updatedEnrichment.EndpointNames.Count -eq 2}
Assert-True { $updatedEnrichment.EndpointNames[0] -eq $endpointName1}
Assert-True { $updatedEnrichment.EndpointNames[1] -eq $endpointName2}
$result = Remove-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Passthru
Assert-True { $result }
$result = Remove-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName1 -Passthru
Assert-True { $result }
$result = Remove-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName2 -Passthru
Assert-True { $result }
$updatedRoutingEndpoints = Get-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $updatedRoutingEndpoints.Count -eq 1}
Assert-True { $updatedRoutingEndpoints[0].ResourceGroup -eq $eventHubResourceGroup}
Assert-True { $updatedRoutingEndpoints[0].SubscriptionId -eq $eventHubSubscriptionId}
Assert-True { $updatedRoutingEndpoints[0].Name -eq $endpointName}
$routes = Get-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $routes.Count -eq 0}
$newRoute = Add-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Source $RoutingSourceDeviceMessages -EndpointName $endpointName
Assert-True { $newRoute.Name -eq $routeName}
Assert-True { $newRoute.Source -eq $RoutingSourceDeviceMessages}
Assert-True { $newRoute.EndpointNames -eq $endpointName}
Assert-False { $newRoute.IsEnabled }
$routes = Get-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName
Assert-True { $routes.Count -eq 1}
Assert-True { $routes[0].Name -eq $routeName}
Assert-True { $routes[0].Source -eq $RoutingSourceDeviceMessages}
Assert-True { $routes[0].EndpointNames -eq $endpointName}
Assert-False { $routes[0].IsEnabled }
$updatedRoute = Set-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Source $RoutingSourceTwinChangeEvents -Enabled
Assert-True { $updatedRoute.Name -eq $routeName}
Assert-True { $updatedRoute.Source -eq $RoutingSourceTwinChangeEvents}
Assert-True { $updatedRoute.EndpointNames -eq $endpointName}
Assert-True { $updatedRoute.IsEnabled }
$testRouteOutput = Test-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -Source $RoutingSourceTwinChangeEvents
Assert-True { $testRouteOutput.Count -eq 1}
Assert-True { $testRouteOutput[0].Name -eq $routeName}
Assert-True { $testRouteOutput[0].Source -eq $RoutingSourceTwinChangeEvents}
Assert-True { $testRouteOutput[0].EndpointNames -eq $endpointName}
Assert-True { $testRouteOutput[0].IsEnabled }
$result = Remove-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Passthru
Assert-True { $result }
$result = Remove-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName -Passthru
Assert-True { $result }
Remove-AzIotHub -ResourceGroupName $ResourceGroupName -Name $IotHubName
}
|
combined_dataset/train/non-malicious/3631.ps1
|
3631.ps1
|
function Test-CreateServerCommunicationLink
{
$locationOverride = "North Europe"
$serverVersion = "12.0"
$rg = Create-ResourceGroupForTest $locationOverride
$server1 = Create-ServerForTest $rg $locationOverride
$server2 = Create-ServerForTest $rg $locationOverride
try
{
$linkName = Get-ElasticPoolName
$ep1 = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName `
-LinkName $linkName -PartnerServer $server2.ServerName
Assert-NotNull $ep1
Assert-AreEqual $linkName $ep1.Name
Assert-AreEqual $server2.ServerName $ep1.PartnerServer
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetServerCommunicationLink
{
$locationOverride = "North Europe"
$serverVersion = "12.0"
$rg = Create-ResourceGroupForTest $locationOverride
$server1 = Create-ServerForTest $rg $locationOverride
$server2 = Create-ServerForTest $rg $locationOverride
$linkName = Get-ElasticPoolName
$job = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName `
-LinkName $linkName -PartnerServer $server2.ServerName -AsJob
$job | Wait-Job
$ep1 = $job.Output
Assert-NotNull $ep1
Assert-AreEqual $linkName $ep1.Name
Assert-AreEqual $server2.ServerName $ep1.PartnerServer
try
{
$gep1 = Get-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName `
-LinkName $ep1.Name
Assert-NotNull $gep1
Assert-AreEqual $linkName $gep1.Name
Assert-AreEqual $server2.ServerName $gep1.PartnerServer
$all = $server1 | Get-AzSqlServerCommunicationLink -LinkName *
Assert-AreEqual $all.Count 1
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveServerCommunicationLink
{
$locationOverride = "North Europe"
$serverVersion = "12.0"
$rg = Create-ResourceGroupForTest $locationOverride
$server1 = Create-ServerForTest $rg $locationOverride
$server2 = Create-ServerForTest $rg $locationOverride
$linkName = Get-ElasticPoolName
$ep1 = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName `
-LinkName $linkName -PartnerServer $server2.ServerName
Assert-NotNull $ep1
try
{
Remove-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName -LinkName $ep1.Name -Force
$all = $server1 | Get-AzSqlServerCommunicationLink
Assert-AreEqual $all.Count 0
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
|
combined_dataset/train/non-malicious/sample_65_65.ps1
|
sample_65_65.ps1
|
##########################################################################
# DELL PROPRIETARY INFORMATION
#
# This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this
# software to you under the terms of a license agreement,nondisclosure agreement or both.
# You may not copy, disclose, or use this software except in accordance with those terms.
#
# Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved.
#
# DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE,
# EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
# DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING,
# MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.
#
#
#
##########################################################################
<#
This is a Resource designer script which generates a mof schema for DCPP_POSTBehavior resource in DellBIOSProvider module.
#>
$category = New-xDscResourceProperty -name Category -Type String -Attribute Key
$externalusbport = New-xDscResourceProperty -name ExternalUSBPort -Type String -Attribute Write -ValidateSet @("Enabled", "Disabled")
$usb30controller = New-xDscResourceProperty -name USB30Controller -Type String -Attribute Write -ValidateSet @("Enabled", "Disabled")
$Password = New-xDscResourceProperty -Name Password -Type string -Attribute Write -Description "Password"
$SecurePassword = New-xDscResourceProperty -Name SecurePassword -Type string -Attribute Write -Description "SecurePassword"
$PathToKey = New-xDscResourceProperty -Name PathToKey -Type string -Attribute Write
$properties = @($category, $externalusbport, $usb30controller,$Password,$SecurePassword,$PathToKey)
New-xDscResource -ModuleName DellBIOSProviderX86 -Name DCPP_USBConfiguration -Property $properties -Path 'C:\Program Files\WindowsPowerShell\Modules' -FriendlyName "USBConfiguration" -Force -Verbose
# SIG # Begin signature block
# MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBQoRVTkP7Li0Mo
# A3XwLKFvbbSkIQQpqpA+fyrMwThTNKCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m
# jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE
# ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s
# ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv
# ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx
# MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu
# MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq
# gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l
# OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr
# +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d
# vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1
# HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn
# DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig
# nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z
# HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK
# Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u
# DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC
# AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw
# FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG
# AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn
# MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp
# MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O
# BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp
# UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7
# BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+
# LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv
# 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF
# VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX
# bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG
# ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50
# cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My
# MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT
# MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB
# gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW
# RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6
# YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n
# aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW
# xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j
# R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk
# j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW
# FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg
# tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr
# 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3
# i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm
# Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC
# ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn
# +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB
# BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB
# BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG
# A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js
# MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX
# MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1
# YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3
# diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc
# VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw
# Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX
# 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY
# KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V
# HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL
# eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA
# S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM
# ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw
# HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500
# H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE
# CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg
# Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5
# MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv
# biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP
# RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG
# 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7
# 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv
# 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs
# 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29
# p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu
# 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH
# yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2
# +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7
# AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj
# ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi
# yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr
# BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0
# MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu
# Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE
# PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l
# dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT
# ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh
# 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj
# xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu
# AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c
# QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb
# fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq
# 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS
# zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ
# 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm
# DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF
# A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl
# ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm
# hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3
# AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx
# IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi
# BCDB3G7eY7UDo0VlUt/oUwJaEPuXbKIKlF99SqrdfpLaJTANBgkqhkiG9w0BAQEF
# AASCAYCdj95ktb4FAnmnLs+J7q7rPvGcB3ymkF/i78FuBcTfe8E/oI/XqDDf7HKZ
# Ceg9JV+0vuSwrlYuvJFAWUx9Es5hAheaRInb/V6vMDYRrHxjYU0dtDcAok1mnpxo
# 1V+UW/lhATOh7zcAjijlTV94nHcXJkwThxjJOq7jiODmpz19nYKbC9uzDNEZE9A2
# Ye2ifATVxrE+0b+9ErSyuWS66sCtCzagbP0gu/qZu+8uMM9/7OP34BbqH/XQ7riu
# bNWsw97As7uG8tWmqj1k53luR05KD3vh+MQr73dZFtpBFpmCQ0mSxJNQ4eoT+snU
# 1gLKkXDSPGmR2nXCm6U/JeZaKv6R1Cr3EpC1Huns0FyIju04lBiWwxvaHkkZGbHy
# hCRrblXbygdyVhUztsjcsFrcZwTVEW9caEoFE0jW+GHDj/QKzQNX/49jgWT6t3Av
# dqUMP7Flmnniq9WpKvUih0mx33qoT8DUH6mPlbJUnwP5BhLOEE2LmdehJs5UCzBF
# A4U/b2yhghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4
# MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C
# AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgcDpxpxbXAdQV3m2x/7lh
# /HrIz7aKR6AW7acwoJL0WTsCCC0b67iOx7tiGA8yMDI0MDQxODA3MzI0OVowAwIB
# AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT
# Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz
# dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO
# QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0
# Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j
# LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv
# b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa
# Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0
# LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp
# ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm
# Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc
# Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN
# CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT
# SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV
# EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf
# e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM
# 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I
# H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp
# OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL
# XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB
# o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD
# VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo
# MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF
# BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG
# A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww
# HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ
# Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd
# ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU
# +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql
# z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G
# w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi
# e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6
# yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F
# ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE
# Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv
# cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL
# MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu
# dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg
# zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM
# GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG
# sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4
# yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI
# fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P
# 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0
# spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu
# 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W
# EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6
# l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB
# AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb
# zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV
# HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J
# +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5
# +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH
# lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2
# oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84
# CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f
# G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD
# DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c
# 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr
# JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h
# ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m
# 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2
# EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt
# IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT
# AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv
# cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4
# Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj
# C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I
# 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb
# Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s
# F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS
# h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo
# FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8
# 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad
# scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/
# BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue
# JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T
# AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw
# FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF
# BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov
# L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk
# oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE
# AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG
# +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh
# MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC
# S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI
# WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP
# EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk
# 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII
# 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz
# 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk
# uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK
# SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8
# a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF
# gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk
# +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD
# VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp
# bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa
# BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx
# ODA3MzI0OVowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN
# AQENME8GCSqGSIb3DQEJBDFCBEASdCZV6YwH//oSawA1LxzHDh1IhziLyuRT3FbI
# h/5GyAmbfyTb3jSFlB8RXmvI6ugCy9C5eVX/Ef/ksr7Tj2QgMIHQBgsqhkiG9w0B
# CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS
# ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw
# ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl
# BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7
# hfYR9W27bjALBgkqhkiG9w0BAQ0EggIARljdhll8S3Dpta583w8utCRgZbeVzIhm
# sz7kEc1YPxr200DlouLl4qG/o7XuUJzxz3qt/bDtt/EY6bNKtKbdOuUou1UL+AXT
# gSHvlXnVhmTY+zBDTjiafvZ31tIdtciioGAl5XpD15UiXGzOLf9/HMxCRMpYh+w5
# bVBVcgJGDaZMdjPWWmSHSgzXppamGfyiy5GiLTTPHkwRniUleX/NjbTTAJ5UOg7O
# x0fXjrsAKc4izIHgUIq5IDdmv0PZHs3sz+xIO+twdPYL+c+7P3OvTobm6GxA6PEu
# 1iJ/HucCj7ObodCXREWSTco45KFaYRlx5pLTwqfpsUlGWu3OTaMqolbk9Dv1VzCx
# 4EfBE+euEoS4lxCc0rpJivSpFwJapFEoDegsLNqXDzs2RqeA/E8lIaKrFeTbhs0y
# U5vgSKJLyfvLIdcFCs5he5u+/m9Qdf2sS/RSUe9Hl6i2/5eHXeagb4EWiLYWy/D1
# vqwqCNwUYZMJVegKobM5yrep7kZ2dfSfZcVYOD/hNuSz0Xy8klC2sF49AewoVtvy
# emv6vK4//YdbM/09DVGH4TK7OCXGfpdfNCp3X7p3fchwAXnRNVcf287ZY0NfG0di
# osfu67S4W+de8HpUf3VDAqIiGa8qpiSQDP3Ov1Ppc84ReGnuYEvBtoqeSzvkPxMk
# IqGAu2Y1fpk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2414.ps1
|
2414.ps1
|
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[string]$Name,
[Parameter(Mandatory)]
[string]$Manufacturer,
[Parameter(Mandatory)]
[ValidatePattern('[-+]?([0-9]*\.[0-9]+|[0-9]+)')]
[string]$SoftwareVersion,
[Parameter()]
[string]$Owner = 'Adam Bertram',
[Parameter()]
[string]$SupportContact = 'Adam Bertram',
[Parameter(Mandatory)]
[ValidateScript({ Test-Path -Path $_ -PathType Container })]
[string]$SourceFolderPath,
[Parameter(Mandatory)]
[string]$InstallationProgram,
[Parameter()]
[ValidateScript({ Test-Path -Path $_ -PathType Container })]
[string]$RootPackageFolderPath = '\\server\dfs\softwarelibrary\software_packages',
[Parameter()]
[ValidateScript({ Test-Path -Path $_ -PathType 'Leaf' })]
[string]$IconLocationFilePath,
[Parameter()]
[string]$InstallationBehaviorType = 'InstallForSystem',
[Parameter()]
[string]$InstallationProgramVisibility = 'Hidden',
[Parameter()]
[string]$MaximumAllowedRunTimeMinutes = '15',
[Parameter()]
[string]$EstimatedInstallationTimeMinutes = '5',
[Parameter()]
[string]$RebootBehavior = 'ForceReboot',
[Parameter()]
[string]$DistributionPointGroup = 'All DPs',
[Parameter()]
[string]$SiteCode = 'UHP',
[Parameter()]
[string]$InstallScriptTemplateFilePath = '\\server\dfs\softwarelibrary\software_packages\_Template_Files\install.ps1'
)
begin {
$ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop
Set-StrictMode -Version Latest
try {
Write-Verbose 'Ensuring the ConfigurationManager module is available and importing it...'
if (!(Test-Path "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1")) {
throw 'Configuration Manager module not found. Is the admin console intalled?'
} elseif (!(Get-Module 'ConfigurationManager')) {
Import-Module "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1"
}
Write-Verbose 'Performing prereq setup things...'
$Location = (Get-Location).Path
$PackageFolderName = "$($Manufacturer.Replace(' ','_'))_$($Name.Replace(' ','_'))_$($SoftwareVersion.Replace(' ','_'))"
$ContentFolderPath = "$RootPackageFolderPath\$PackageFolderName"
} catch {
Write-Error $_.Exception.Message
}
}
process {
try {
Write-Verbose "Creating the content folder '$ContentFolderPath'..."
if (!(Test-Path $ContentFolderPath)) {
mkdir $ContentFolderPath | Out-Null
} else {
throw "The folder at '$ContentFolderPath' already exists."
}
Write-Verbose "Copying files from source folder '$SourceFolderPath' to '$ContentFolderPath'..."
Copy-Item -Path "$SourceFolderPath\*" -Destination $ContentFolderPath -Recurse -Force
Write-Verbose "Copying the installer template fiel at '$InstallScriptTemplateFilePath' to '$ContentFolderPath'..."
Copy-Item -Path $InstallScriptTemplateFilePath -Destination $ContentFolderPath
Write-Verbose "Creating the application '$Name'..."
$NewCmApplicationParams = @{
'Name' = $Name;
'Owner' = $Owner;
'SupportContact' = $SupportContact;
'IconLocationFile' = $IconLocationFilePath;
'Publisher' = $Manufacturer;
'SoftwareVersion' = $SoftwareVersion
}
Set-Location "$($SiteCode):"
New-CMApplication @NewCmApplicationParams | Out-Null
Write-Verbose 'Creating the deployment type...'
$AddCmDeploymentTypeParams = @{
'ApplicationName' = $ApplicationName;
'ScriptInstaller' = $true;
'ManualSpecifyDeploymentType' = $true;
'DeploymentTypeName' = "Deploy $Name";
'InstallationProgram' = $InstallationProgram;
'ContentLocation' = $ContentFolderPath;
'InstallationBehaviorType' = $InstallationBehaviorType;
'InstallationProgramVisibility' = $InstallationProgramVisibility;
'MaximumAllowedRunTimeMinutes' = $MaximumAllowedRunTimeMinutes;
'EstimatedInstallationTimeMinutes' = $EstimatedInstallationTimeMinutes;
}
Add-CMDeploymentType @AddCmDeploymentTypeParams
Write-Verbose 'Setting reboot behavior for the deployment type...'
$SetCmDeploymentTypeParams = @{
'RebootBehavior' = $RebootBehavior;
'DeploymentTypeName' = "Deploy $ApplicationName";
'ApplicationName' = $ApplicationName;
'MsiOrScriptInstaller' = $true;
}
Set-CMDeploymentType @SetCmDeploymentTypeParams
Write-Verbose 'Distributing content...'
Start-CMContentDistribution -DistributionPointGroupName $DistributionPointGroup -PackageName $Name
Write-Verbose 'Creating the OSD package...'
$PackageConversionScriptFilePath = 'C:\Dropbox\Powershell\scripts\complete\Convert-CMApplicationToPackage.ps1'
if (Test-Path $PackageConversionScriptFilePath) {
& $PackageConversionScriptFilePath -ApplicationName $Name -SkipRequirements -DistributeContent -OsdFriendlyPowershellSyntax
} else {
Write-Warning "OSD package could not be created because the script '$PackageConversionScriptFilePath' does not exist"
}
Write-Verbose 'Done.'
} catch {
Write-Error $_.Exception.Message
exit
}
}
|
combined_dataset/train/non-malicious/sample_38_12.ps1
|
sample_38_12.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loggingsearch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loggingsearch.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6721daff-25e3-4454-8b3d-3eda7d2b1f62'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loggingsearch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingsearch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Invoke-OCILoggingsearchSearchLogs'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingsearch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Connect-AccessDB_1.ps1
|
Connect-AccessDB_1.ps1
|
# Functions for connecting to and working with Access databases
# Matt Wilson
# May 2009
function Connect-AccessDB ($global:dbFilePath) {
# Test to ensure valid path to database file was supplied
if (-not (Test-Path $dbFilePath)) {
Write-Error "Invalid Access database path specified. Please supply full absolute path to database file!"
}
# TO-DO: Add check to ensure file is either MDB or ACCDB
# Create a new ADO DB connection COM object, which will give us useful methods & properties such as "Execute"!
$global:AccessConnection = New-Object -ComObject ADODB.Connection
# Actually open the database so we can start working with its contents
# Access 00-03 (MDB) format has a different connection string than 2007
if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.mdb$") {
Write-Host "Access 2000-2003 format (MDB) detected! Using Microsoft.Jet.OLEDB.4.0."
$AccessConnection.Open("Provider = Microsoft.Jet.OLEDB.4.0; Data Source= $dbFilePath")
}
# Here's the check for if 2007 connection is necessary
if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.accdb$") {
Write-Host "Access 2007 format (ACCDB) detected! Using Microsoft.Ace.OLEDB.12.0."
$AccessConnection.Open("Provider = Microsoft.Ace.OLEDB.12.0; Persist Security Info = False; Data Source= $dbFilePath")
}
}
function Open-AccessRecordSet ($global:SqlQuery) {
# Ensure SQL query isn't null
if ($SqlQuery.length -lt 1) {
Throw "Please supply a SQL query for the recordset selection!"
}
# Variables used for the connection itself. Leave alone unless you know what you're doing.
$adOpenStatic = 3
$adLockOptimistic = 3
# Create the recordset object using the ADO DB COM object
$global:AccessRecordSet = New-Object -ComObject ADODB.Recordset
# Finally, go and get some records from the DB!
$AccessRecordSet.Open($SqlQuery, $AccessConnection, $adOpenStatic, $adLockOptimistic)
}
function Get-AccessRecordSetStructure {
# TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records
# Cycle through the fields in the recordset, but only pull out the properties we care about
Write-Output $AccessRecordSet.Fields | Select-Object Name,Attributes,DefinedSize,type
}
function Convert-AccessRecordSetToPSObject {
# TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records
# Get an array of field names which we will later use to create custom PoSh object names
$fields = Get-AccessRecordSetStructure
# Move to the very first record in the RecordSet before cycling through each one
$AccessRecordSet.MoveFirst()
# Cycle through each RECORD in the set and create that record to an object
do {
# Create a SINGLE blank object we can use in a minute to add properties/values to
$record = New-Object System.Object
# For every FIELD in the DB, lookup the CURRENT value of that field and add a new PoSh object property with that name and value
foreach ($field in $fields) {
$fieldName = $field.Name # This makes working with the name a LOT easier in Write-Host, etc.
#Write-Host "Working with field: $fieldName"
#Write-Host "Preparing to set value to: $($AccessRecordset.Fields.Item($fieldName).Value)"
$record | Add-Member -type NoteProperty -name $fieldName -value $AccessRecordSet.Fields.Item($fieldName).Value
}
# Output the custom object we just created
Write-Output $record
# Tell the recordset to advance forward one before doing this again with another object
$AccessRecordset.MoveNext()
} until ($AccessRecordset.EOF -eq $True)
}
function Execute-AccessSQLStatement ($query) {
$AccessConnection.Execute($query)
}
function Convert-AccessTypeCode ([string]$typeCode) {
# Build some lookup tables for our Access type codes so we can convert values pretty easily
$labelLookupHash = @{"AutoNumber"="3"; "Text"="202"; "Memo"="203"; "Date/Time"="7"; "Currency"="6"; "Yes/No"="11"; "OLE Object"="205"; "Byte"="17"; "Integer"="2"; "Long Integer"="3"; "Single"="4"; "Double"="5"}
$codeLookupHash = @{"3"="AutoNumber"; "202"="Text"; "203"="Memo"; "7"="Date/Time"; "6"="Currency"; "11"="Yes/No"; "205"="OLE Object"; "17"="Byte"; "2"="Integer"; "3"="Long Integer"; "4"="Single"; "5"="Double"}
# Convert a value depending on what type of data was supplied
if ($typeCode -match [regex]"^\\d{1,3}$") {
$valueFound = $codeLookupHash.$typeCode
if ($valueFound) {
Write-Output $valueFound
} else { Write-Output "Unknown" }
} else {
$valueFound = $labelLookupHash.$typeCode
if ($valueFound) {
Write-Output $valueFound
} else { Write-Output "Unknown" }
}
}
function Close-AccessRecordSet {
$AccessRecordSet.Close()
}
function Disconnect-AccessDB {
$AccessConnection.Close()
}
# Connect-AccessDB "C:\\fso\\ConfigurationMaintenance.accdb"
# Open-AccessRecordSet "SELECT * FROM printers"
# $printersDB = Convert-AccessRecordSetToPSObject | Select-Object caption,driverName | Format-Table -AutoSize; $printersDB
# Close-AccessRecordSet
# Disconnect-AccessDB
|
combined_dataset/train/non-malicious/2968.ps1
|
2968.ps1
|
$nugetBinPath = Join-Path -Path $env:ChocolateyInstall -ChildPath 'bin'
$packageBatFileName = Join-Path -Path $nugetBinPath -ChildPath 'psake.bat'
$psakeDir = Split-Path -Path $MyInvocation.MyCommand.Definition -Parent
$path = Join-Path -Path $psakeDir -ChildPath 'psake/psake.cmd'
Write-Host "Adding $packageBatFileName and pointing to $path"
"@echo off
""$path"" %*" | Out-File $packageBatFileName -encoding ASCII
Write-Host "PSake is now ready. You can type 'psake' from any command line at any path. Get started by typing 'psake /?'"
|
combined_dataset/train/non-malicious/sample_24_98.ps1
|
sample_24_98.ps1
|
$MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent
. "$MyPath\mesa_init_msvc.ps1"
# we want more secure TLS 1.2 for most things, but it breaks SourceForge
# downloads so must be done after Chocolatey use
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 -bor [Net.SecurityProtocolType]::Tls13;
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue "deps" | Out-Null
$depsInstallPath="C:\mesa-deps"
Get-Date
Write-Host "Cloning DirectX-Headers"
git clone -b v1.611.0 --depth=1 https://github.com/microsoft/DirectX-Headers deps/DirectX-Headers
if (!$?) {
Write-Host "Failed to clone DirectX-Headers repository"
Exit 1
}
Write-Host "Building DirectX-Headers"
$dxheaders_build = New-Item -ItemType Directory -Path ".\deps\DirectX-Headers" -Name "build"
Push-Location -Path $dxheaders_build.FullName
meson .. --backend=ninja -Dprefix="$depsInstallPath" --buildtype=release -Db_vscrt=mt && `
ninja -j32 install
$buildstatus = $?
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $dxheaders_build
if (!$buildstatus) {
Write-Host "Failed to compile DirectX-Headers"
Exit 1
}
Get-Date
Write-Host "Cloning zlib"
git clone -b v1.2.13 --depth=1 https://github.com/madler/zlib deps/zlib
if (!$?) {
Write-Host "Failed to clone zlib repository"
Exit 1
}
Write-Host "Downloading zlib meson build files"
Invoke-WebRequest -Uri "https://wrapdb.mesonbuild.com/v2/zlib_1.2.13-1/get_patch" -OutFile deps/zlib.zip
Expand-Archive -Path deps/zlib.zip -Destination deps/zlib
# Wrap archive puts build files in a version subdir
Move-Item deps/zlib/zlib-1.2.13/* deps/zlib
$zlib_build = New-Item -ItemType Directory -Path ".\deps\zlib" -Name "build"
Push-Location -Path $zlib_build.FullName
meson .. --backend=ninja -Dprefix="$depsInstallPath" --default-library=static --buildtype=release -Db_vscrt=mt && `
ninja -j32 install
$buildstatus = $?
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $zlib_build
if (!$buildstatus) {
Write-Host "Failed to compile zlib"
Exit 1
}
Get-Date
Write-Host "Cloning libva"
git clone https://github.com/intel/libva.git deps/libva
if (!$?) {
Write-Host "Failed to clone libva repository"
Exit 1
}
Push-Location -Path ".\deps\libva"
Write-Host "Checking out libva df3c584bb79d1a1e521372d62fa62e8b1c52ce6c"
# libva-win32 is released with libva version 2.17 (see https://github.com/intel/libva/releases/tag/2.17.0)
git checkout 2.17.0
Pop-Location
Write-Host "Building libva"
# libva already has a build dir in their repo, use builddir instead
$libva_build = New-Item -ItemType Directory -Path ".\deps\libva" -Name "builddir"
Push-Location -Path $libva_build.FullName
meson .. -Dprefix="$depsInstallPath"
ninja -j32 install
$buildstatus = $?
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $libva_build
if (!$buildstatus) {
Write-Host "Failed to compile libva"
Exit 1
}
Get-Date
Write-Host "Cloning LLVM release/15.x"
git clone -b release/15.x --depth=1 https://github.com/llvm/llvm-project deps/llvm-project
if (!$?) {
Write-Host "Failed to clone LLVM repository"
Exit 1
}
Get-Date
Write-Host "Cloning SPIRV-LLVM-Translator"
git clone -b llvm_release_150 https://github.com/KhronosGroup/SPIRV-LLVM-Translator deps/llvm-project/llvm/projects/SPIRV-LLVM-Translator
if (!$?) {
Write-Host "Failed to clone SPIRV-LLVM-Translator repository"
Exit 1
}
Get-Date
# slightly convoluted syntax but avoids the CWD being under the PS filesystem meta-path
$llvm_build = New-Item -ItemType Directory -ErrorAction SilentlyContinue -Force -Path ".\deps\llvm-project" -Name "build"
Push-Location -Path $llvm_build.FullName
Write-Host "Compiling LLVM and Clang"
cmake ../llvm `
-GNinja `
-DCMAKE_BUILD_TYPE=Release `
-DLLVM_USE_CRT_RELEASE=MT `
-DCMAKE_PREFIX_PATH="$depsInstallPath" `
-DCMAKE_INSTALL_PREFIX="$depsInstallPath" `
-DLLVM_ENABLE_PROJECTS="clang" `
-DLLVM_TARGETS_TO_BUILD="AMDGPU;X86" `
-DLLVM_OPTIMIZED_TABLEGEN=TRUE `
-DLLVM_ENABLE_ASSERTIONS=TRUE `
-DLLVM_INCLUDE_UTILS=OFF `
-DLLVM_INCLUDE_RUNTIMES=OFF `
-DLLVM_INCLUDE_TESTS=OFF `
-DLLVM_INCLUDE_EXAMPLES=OFF `
-DLLVM_INCLUDE_GO_TESTS=OFF `
-DLLVM_INCLUDE_BENCHMARKS=OFF `
-DLLVM_BUILD_LLVM_C_DYLIB=OFF `
-DLLVM_ENABLE_DIA_SDK=OFF `
-DCLANG_BUILD_TOOLS=ON `
-DLLVM_SPIRV_INCLUDE_TESTS=OFF `
-Wno-dev && `
ninja -j32 install
$buildstatus = $?
Pop-Location
if (!$buildstatus) {
Write-Host "Failed to compile LLVM"
Exit 1
}
Get-Date
$libclc_build = New-Item -ItemType Directory -Path ".\deps\llvm-project" -Name "build-libclc"
Push-Location -Path $libclc_build.FullName
Write-Host "Compiling libclc"
# libclc can only be built with Ninja, because CMake's VS backend doesn't know how to compile new language types
cmake ../libclc `
-GNinja `
-DCMAKE_BUILD_TYPE=Release `
-DCMAKE_CXX_FLAGS="-m64" `
-DCMAKE_POLICY_DEFAULT_CMP0091=NEW `
-DCMAKE_MSVC_RUNTIME_LIBRARY=MultiThreaded `
-DCMAKE_INSTALL_PREFIX="$depsInstallPath" `
-DLIBCLC_TARGETS_TO_BUILD="spirv-mesa3d-;spirv64-mesa3d-" && `
ninja -j32 install
$buildstatus = $?
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $libclc_build
if (!$buildstatus) {
Write-Host "Failed to compile libclc"
Exit 1
}
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $llvm_build
Get-Date
Write-Host "Cloning SPIRV-Tools"
git clone -b "sdk-$env:VULKAN_SDK_VERSION" --depth=1 https://github.com/KhronosGroup/SPIRV-Tools deps/SPIRV-Tools
if (!$?) {
Write-Host "Failed to clone SPIRV-Tools repository"
Exit 1
}
git clone -b "sdk-$env:VULKAN_SDK_VERSION" --depth=1 https://github.com/KhronosGroup/SPIRV-Headers deps/SPIRV-Tools/external/SPIRV-Headers
if (!$?) {
Write-Host "Failed to clone SPIRV-Headers repository"
Exit 1
}
Write-Host "Building SPIRV-Tools"
$spv_build = New-Item -ItemType Directory -Path ".\deps\SPIRV-Tools" -Name "build"
Push-Location -Path $spv_build.FullName
# SPIRV-Tools doesn't use multi-threaded MSVCRT, but we need it to
cmake .. `
-GNinja `
-DCMAKE_BUILD_TYPE=Release `
-DCMAKE_POLICY_DEFAULT_CMP0091=NEW `
-DCMAKE_MSVC_RUNTIME_LIBRARY=MultiThreaded `
-DCMAKE_INSTALL_PREFIX="$depsInstallPath" && `
ninja -j32 install
$buildstatus = $?
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $spv_build
if (!$buildstatus) {
Write-Host "Failed to compile SPIRV-Tools"
Exit 1
}
function Remove-Symlinks {
Get-ChildItem -Force -ErrorAction SilentlyContinue @Args | Where-Object { if($_.Attributes -match "ReparsePoint"){$_.Delete()} }
}
Remove-Symlinks -Path "deps" -Recurse
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "deps" | Out-Null
Get-Date
Write-Host "Complete"
|
combined_dataset/train/non-malicious/sample_4_27.ps1
|
sample_4_27.ps1
|
ConvertFrom-StringData @'
id_sql_setup_collect_bootstrap_logs=Collecting SQL Setup Bootstrap Logs
id_sql_setup_collect_2005_logs=Collecting SQL 2005 Bootstrap Logs
id_sql_setup_collect_2008_2008r2_logs=Collecting SQL 2008 and 2008R2 Bootstrap Logs
id_sql_setup_collect_2012_logs=Collecting SQL 2012 Bootstrap Logs
id_sql_setup_collect_2014_logs=Collecting SQL 2014 Bootstrap Logs
id_sql_setup_collect_2016_logs=Collecting SQL 2016 Bootstrap Logs
id_sql_setup_collect_2017_logs=Collecting SQL 2017 Bootstrap Logs
id_sql_setup_collect_2019_logs=Collecting SQL 2019 Bootstrap Logs
id_sql_setup_collect_2022_logs=Collecting SQL 2022 Bootstrap Logs
'@
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBN1HW3g6+o8v5O
# 1Co0PA/ROdGGc1/ArhUldiKVkmeYU6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKRU
# zyHKG3L1VyICK8zib1/Ki/v6VEkUWkdGkXWN8Y6CMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAhVLVon1nxGGz78tCSriVcUF0JtBUc+1JzreH
# 9jRXdbeXvh6jJHa8C9tFJaYtMVkB+Wy93DNklPLAsvNdNcNIcB89exLgiZ8hoFGa
# 4CcojXsodwq5Y8wJa8NGnIsl3xBYP/sUOWHwu+7jCmrwgYhfUpGHyZeguuI0o3AL
# 0iMAM9BJdBarBB/rIDli1plpaze0sPCYmITcGn7f4uBgXrGRRo8Bxev8pyzZt9P5
# U062tn9G26aPoJX3VkzSxFVulAMruOkbeCC90xG32HIgrZQCNTkG42jecGkAXudU
# nqRde+07cxFENBMRdW1PKQWDG8zLygM8ulRPtVCO5brnLGi13qGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCsLibv86XdvvufYENSj2AgXwbvxHXy5zjj
# 3ZMWv1BPVwIGZutZ6YISGBMyMDI0MTAyODExNDA0MC43MDNaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX
# qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF
# IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN
# XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6
# cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN
# h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69
# l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC
# qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt
# xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V
# 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH
# 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+
# nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL
# ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i
# O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q
# +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF
# RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d
# 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di
# rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+
# yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M
# k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb
# YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l
# T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip
# L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0
# MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA
# AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr
# /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3
# qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3
# 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk
# wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP
# 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQgR1FD8ixiRoBKcELe+iVjb4suDyJuefFMjQV8tNAZpB4wgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI
# k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad
# RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAEW5bt1r+EFXSIQZD9HlMw8vkqGLqv5L
# ZoKeCmtJRNY8INT96PQbeQ5H/dgCujsOwxir0kErwTamjt+XlZL56SgRRnjdBHsq
# nzD6jzT0sYkEDsaaPGRIpYIm0EBk7g3tOm95Lxzxn3BXaZzzi6RYrgYP6fBNTpNo
# Ztl7gUMHyhG2iR1oBfqAQiaKO18b4vH9Fxy4JUK1G8OHVvnOtgZeVXdXb1jdgn7l
# SUM2PnPu2YdOhrE0EeVa3MkvKwPWo94baBToME65/naAArK8M2y877n0SPWU9jr5
# Gzv/c4zZ2hDJm7WWUN/bhL+lJh0y3Sw7dnD+FAxmu5FgM0JaMofAJm+SEG+poEQm
# 5GS+VyfAltlIlntSWhiaHybuSviAXh0lGuGvotfuCMLkMNhJKc/9DwXF604kCKp8
# XFCvVFUirNKDWHtd5RyNQOHaf9SXPRv4VJCMcCPdEGHiTQrXLVFXuZts8qXiXZkF
# DsWGeIRfJc8rz/7eavbhPS+2RT3BU3UF1fFxicI6z1/EDQgIgYiqa+jcq9b//1CG
# QjMqni7Oji2jLgirqKw2PppHCaX5roiR8wnwLsIFlKZBkALe1Hlb1q/USdZhbEeE
# eX3s4cGuJVP7ixjmaX7aPduinrnv3XefBcugB3+4fGI5Ai7H6NtThJip4JhkL0Zg
# r6hL9ynFjhOZ
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_61.ps1
|
sample_49_61.ps1
|
#
# Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance',
'Enable-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneAssignedSubscription',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList',
'Get-OCITenantmanagercontrolplaneAvailableRegionsList',
'Get-OCITenantmanagercontrolplaneDomain',
'Get-OCITenantmanagercontrolplaneDomainGovernance',
'Get-OCITenantmanagercontrolplaneDomainGovernancesList',
'Get-OCITenantmanagercontrolplaneDomainsList',
'Get-OCITenantmanagercontrolplaneLink',
'Get-OCITenantmanagercontrolplaneLinksList',
'Get-OCITenantmanagercontrolplaneOrder',
'Get-OCITenantmanagercontrolplaneOrganization',
'Get-OCITenantmanagercontrolplaneOrganizationsList',
'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList',
'Get-OCITenantmanagercontrolplaneOrganizationTenancy',
'Get-OCITenantmanagercontrolplaneRecipientInvitation',
'Get-OCITenantmanagercontrolplaneRecipientInvitationsList',
'Get-OCITenantmanagercontrolplaneSenderInvitation',
'Get-OCITenantmanagercontrolplaneSenderInvitationsList',
'Get-OCITenantmanagercontrolplaneSubscription',
'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList',
'Get-OCITenantmanagercontrolplaneSubscriptionMapping',
'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList',
'Get-OCITenantmanagercontrolplaneSubscriptionsList',
'Get-OCITenantmanagercontrolplaneWorkRequest',
'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList',
'Get-OCITenantmanagercontrolplaneWorkRequestLogsList',
'Get-OCITenantmanagercontrolplaneWorkRequestsList',
'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer',
'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation',
'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer',
'New-OCITenantmanagercontrolplaneChildTenancy',
'New-OCITenantmanagercontrolplaneDomain',
'New-OCITenantmanagercontrolplaneDomainGovernance',
'New-OCITenantmanagercontrolplaneSenderInvitation',
'New-OCITenantmanagercontrolplaneSubscriptionMapping',
'Receive-OCITenantmanagercontrolplaneRecipientInvitation',
'Remove-OCITenantmanagercontrolplaneDomain',
'Remove-OCITenantmanagercontrolplaneDomainGovernance',
'Remove-OCITenantmanagercontrolplaneGovernance',
'Remove-OCITenantmanagercontrolplaneLink',
'Remove-OCITenantmanagercontrolplaneOrganizationTenancy',
'Remove-OCITenantmanagercontrolplaneSubscriptionMapping',
'Restore-OCITenantmanagercontrolplaneOrganizationTenancy',
'Stop-OCITenantmanagercontrolplaneSenderInvitation',
'Update-OCITenantmanagercontrolplaneDomain',
'Update-OCITenantmanagercontrolplaneDomainGovernance',
'Update-OCITenantmanagercontrolplaneOrganization',
'Update-OCITenantmanagercontrolplaneRecipientInvitation',
'Update-OCITenantmanagercontrolplaneSenderInvitation'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2841.ps1
|
2841.ps1
|
function ResolveError
{
[CmdletBinding()]
param(
[Parameter(ValueFromPipeline=$true)]
$ErrorRecord=$Error[0],
[Switch]
$Short
)
process {
if ($_ -eq $null) { $_ = $ErrorRecord }
$ex = $_.Exception
if (-not $Short) {
$error_message = "$($script:nl)ErrorRecord:{0}ErrorRecord.InvocationInfo:{1}Exception:$($script:nl){2}"
$formatted_errorRecord = $_ | format-list * -force | out-string
$formatted_invocationInfo = $_.InvocationInfo | format-list * -force | out-string
$formatted_exception = ''
$i = 0
while ($null -ne $ex) {
$i++
$formatted_exception += ("$i" * 70) + $script:nl +
($ex | format-list * -force | out-string) + $script:nl
$ex = $ex | SelectObjectWithDefault -Name 'InnerException' -Value $null
}
return $error_message -f $formatted_errorRecord, $formatted_invocationInfo, $formatted_exception
}
$lastException = @()
while ($null -ne $ex) {
$lastMessage = $ex | SelectObjectWithDefault -Name 'Message' -Value ''
$lastException += ($lastMessage -replace $script:nl, '')
if ($ex -is [Data.SqlClient.SqlException]) {
$lastException += "(Line [$($ex.LineNumber)] " +
"Procedure [$($ex.Procedure)] Class [$($ex.Class)] " +
" Number [$($ex.Number)] State [$($ex.State)] )"
}
$ex = $ex | SelectObjectWithDefault -Name 'InnerException' -Value $null
}
$shortException = $lastException -join ' --> '
$header = $null
$header = (($_.InvocationInfo |
SelectObjectWithDefault -Name 'PositionMessage' -Value '') -replace $script:nl, ' '),
($_ | SelectObjectWithDefault -Name 'Message' -Value ''),
($_ | SelectObjectWithDefault -Name 'Exception' -Value '') |
Where-Object { -not [String]::IsNullOrEmpty($_) } |
Select-Object -First 1
$delimiter = ''
if ((-not [String]::IsNullOrEmpty($header)) -and
(-not [String]::IsNullOrEmpty($shortException)))
{ $delimiter = ' [<<==>>] ' }
return "$($header)$($delimiter)Exception: $($shortException)"
}
}
|
combined_dataset/train/non-malicious/sample_14_77.ps1
|
sample_14_77.ps1
|
ConvertFrom-StringData @'
id_clustercsvd=Cluster Shared Volume information
id_clustercsvdesc=Obtaining information about Cluster Shared Volumes
'@
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA6jMF5R6lNHZ44
# g5qoqJ2Mw40O57aFcdd0fFEsd0lZCqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHIL
# /aeO7eNiei1Wz8N36XI+vQ+WYBCTmoPA/yi2LYiuMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAZPH802s0S83nKu+EyXmTrBs0/Sxoi4hvDOJD
# lFX8M5bgviWO73hUzEvwY/j7+lsgby1M2WHHpeDfEBMML6cmgIsZ67XebAJIaEfp
# M+wCCSF5Id8IR4ACrlQpvbl/iv5IfcDRFVMCEtAEZYgHijtOQPdAiyHGWcvrfyj3
# tpP6he/BSYdnAUVsQU25KFQRFxkd3bo8jF2st4+EHN7cpfCJZ9BuTzAXpnFveVfr
# CgiS4zL0OIY8WcWOlzZhf0FZyG2rqGkP4Pqx2zTlyCHfa9lUWukKJYdf/f1Y0nsY
# oPJdQNR3kC8YOAdV7k6nrRb0oCQK/VNXohhiPONpUoxO+M+7B6GCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAqFg9tgSakNB6BgNxH1yLHlbACD6Fm+NDl
# +zszDOa+1gIGZxp9zsotGBMyMDI0MTAyODExNDA0My4zOTdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB
# AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq
# YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz
# 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo
# mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI
# YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc
# QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x
# uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE
# 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL
# CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ
# wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF
# kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+
# cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM
# jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc
# 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15
# j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s
# gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA
# GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0
# SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B
# 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ
# n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v
# ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5
# aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ
# IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0
# 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAi
# GA8yMDI0MTAyODA1MDIwN1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDqyZlPAgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurP
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQ
# Mnw+EyRSLq+zprTP8t/0ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdM
# u9b2d8cWo3hrWDMqssZAAGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFji
# SAij1Vxwohz3Men9w/M4fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8w
# we3Z+xy/ccjeORHi3Um6IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOy
# lqGX8SZTVNxQg8uGM0FRAEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDgLAlAM7wwI1OlN8dbKwFG
# uutLsS+7rk46QbqEb5FwbjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8
# 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCV
# SbXiruUvANYshaHmkS8aAUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIA
# ROrQZlCSAGxFY5w8rijYhlkbHs0VO1QG1IEFvAFcPGSOOWZs9QXn+IPt4dV1rB4E
# 8vTsvR1jqlpQeW+IuOH+qzOGlxlBqR1/Lm3upNGZlkTrl78RWRGE9kNcyFRMid5/
# Fz7+zAPezNRBjxTvIbedBUJyV2wf0jFMAlXWWqHgEVyxUs2vKKF5vzVmHlTvxFbD
# 9JbqBMi6J3w/auiZq0+kdh8/x20JRh3tZqZTZyjg7Bhharh+YS6XmaJppRUIp4qv
# xM+/WH+YQtx7Htm59xB1elnbNT2IiGnLT184x4GvwJCR2T9SkolYo0c5vC695ZsP
# 4AZ8d3jyq0UwaEhH+tcKQhLo7MyGYFejJIcmvHlGEiyysqS0oaZjmwsIuIwBY/aV
# aR518RTLqUesSjkME3HpMQtwZ7w+K3PIt6/8gd3w2b09IaIXpBbuQluUOhqG9zoP
# 95W3JbYqMEXxr2iv/eNMoDlQMGpbD/TO/WXN+R3rcHK7TOIie7uLdHYtLSTZs9Ch
# 4dAxFYY3hwQ+xjTM0LT4qGpfHT5IO7y+SG5Yj/27KoveO/2bUxvXarlkxZa85YqT
# Za72wnIDD+vCHVKJVMg3+Y/EIo16lGixqIGUWyaFa6Xs/A6DynNJRwKs0FOj1qfL
# YdwCltk2iz2fLMKKhaFPSqu3ICyfXQ1sRMWkTXwbrVU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/989.ps1
|
989.ps1
|
class MigrationLogger {
[string]$CurrentCommandPath
[string]$OutputFilePath
[string]$ScriptName
[DateTime]$StartDate
MigrationLogger([string] $CurrentCommandPath) {
$this.StartDate = Get-Date
$this.CurrentCommandPath = $CurrentCommandPath
$this.ScriptName = Split-Path $CurrentCommandPath -Leaf
$fileName = [string]::Concat("log.", $this.ScriptName, ".", $this.FormatDate($this.StartDate), ".txt")
$this.OutputFilePath = $this.ReplaceLastSubstring($CurrentCommandPath, $this.ScriptName, $fileName)
}
[string] FormatDate($date) {
return $date.ToString("yyyyMMdd_HHmmss")
}
[string] FormatCurrentDate() {
$currentDate = Get-Date
return $this.FormatDate($currentDate)
}
[string] ReplaceLastSubstring([string]$str, [string]$substr, [string]$newstr)
{
$lastIndex = $str.LastIndexOf($substr)
$result = $str.Remove($lastIndex,$substr.Length).Insert($lastIndex,$newstr)
return $result
}
[void] LogError([string] $Message)
{
$logDate = $this.FormatCurrentDate()
$logMessage = [string]::Concat($logDate, "[ERROR]-", $Message)
$logMessage | Out-File -FilePath $this.OutputFilePath -Append
Write-Host $logMessage -ForegroundColor Yellow
}
[void] LogErrorAndThrow([string] $Message)
{
$logDate = $this.FormatCurrentDate()
$logMessage = [string]::Concat($logDate, "[ERROR]-", $Message)
$logMessage | Out-File -FilePath $this.OutputFilePath -Append
Write-Error $logMessage
}
[void] LogTrace([string] $Message)
{
$logDate = $this.FormatCurrentDate()
$logMessage = [string]::Concat($logDate, "[LOG]-", $Message)
$logMessage | Out-File -FilePath $this.OutputFilePath -Append
Write-Host $logMessage
}
}
Function New-AsrLoggerInstance($CommandPath)
{
return [MigrationLogger]::new($CommandPath)
}
|
combined_dataset/train/non-malicious/3191.ps1
|
3191.ps1
|
Function ConvertTo-FlatObject {
[cmdletbinding()]
param(
[parameter( Mandatory = $True,
ValueFromPipeline = $True)]
[PSObject[]]$InputObject,
[string[]]$Exclude = "",
[bool]$ExcludeDefault = $True,
[string[]]$Include = $null,
[string[]]$Value = $null,
[int]$MaxDepth = 10
)
Begin
{
Function IsIn-Include {
param($prop)
if(-not $Include) {$True}
else {
foreach($Inc in $Include)
{
if($Prop -like $Inc)
{
$True
}
}
}
}
Function IsIn-Value {
param($val)
if(-not $Value) {$True}
else {
foreach($string in $Value)
{
if($val -like $string)
{
$True
}
}
}
}
Function Get-Exclude {
[cmdletbinding()]
param($obj)
if($ExcludeDefault)
{
Try
{
$DefaultTypeProps = @( $obj.gettype().GetProperties() | Select -ExpandProperty Name -ErrorAction Stop )
if($DefaultTypeProps.count -gt 0)
{
Write-Verbose "Excluding default properties for $($obj.gettype().Fullname):`n$($DefaultTypeProps | Out-String)"
}
}
Catch
{
Write-Verbose "Failed to extract properties from $($obj.gettype().Fullname): $_"
$DefaultTypeProps = @()
}
}
@( $Exclude + $DefaultTypeProps ) | Select -Unique
}
Function Recurse-Object {
[cmdletbinding()]
param(
$Object,
[string[]]$path = '$Object',
[psobject]$Output,
$depth = 0
)
Write-Verbose "Working in path $Path at depth $depth"
Write-Debug "Recurse Object called with PSBoundParameters:`n$($PSBoundParameters | Out-String)"
$Depth++
$ExcludeProps = @( Get-Exclude $object )
$Children = $object.psobject.properties | Where {$ExcludeProps -notcontains $_.Name }
Write-Debug "Working on properties:`n$($Children | select -ExpandProperty Name | Out-String)"
foreach($Child in @($Children))
{
$ChildName = $Child.Name
$ChildValue = $Child.Value
Write-Debug "Working on property $ChildName with value $($ChildValue | Out-String)"
if($ChildName -match '[^a-zA-Z0-9_]')
{
$FriendlyChildName = "'$ChildName'"
}
else
{
$FriendlyChildName = $ChildName
}
if((IsIn-Include $ChildName) -and (IsIn-Value $ChildValue) -and $Depth -le $MaxDepth)
{
$ThisPath = @( $Path + $FriendlyChildName ) -join "."
$Output | Add-Member -MemberType NoteProperty -Name $ThisPath -Value $ChildValue
Write-Verbose "Adding member '$ThisPath'"
}
if($ChildValue -eq $null)
{
Write-Verbose "Skipping NULL $ChildName"
continue
}
if(
(
$ChildValue.GetType() -eq $Object.GetType() -and
$ChildValue -is [datetime]
) -or
(
$ChildName -eq "SyncRoot" -and
-not $ChildValue
)
)
{
Write-Verbose "Skipping $ChildName with type $($ChildValue.GetType().fullname)"
continue
}
if (($ChildValue.GetType()).basetype.Name -eq "Array") {
$IsArray = $true
}
else {
$IsArray = @($ChildValue).count -gt 1
}
$count = 0
$CurrentPath = @( $Path + $FriendlyChildName ) -join "."
$ExcludeProps = @( Get-Exclude $ChildValue )
$ChildrensChildren = $ChildValue.psobject.properties | Where {$ExcludeProps -notcontains $_.Name }
$HashKeys = if($ChildValue.Keys -notlike $null -and $ChildValue.Values)
{
$ChildValue.Keys
}
else
{
$null
}
Write-Debug "Found children's children $($ChildrensChildren | select -ExpandProperty Name | Out-String)"
if(
(@($ChildrensChildren).count -ne 0 -or $HashKeys) -and
$Depth -lt $MaxDepth
)
{
if($HashKeys)
{
Write-Verbose "Working on hashtable $CurrentPath"
foreach($key in $HashKeys)
{
Write-Verbose "Adding value from hashtable $CurrentPath['$key']"
$Output | Add-Member -MemberType NoteProperty -name "$CurrentPath['$key']" -value $ChildValue["$key"]
$Output = Recurse-Object -Object $ChildValue["$key"] -Path "$CurrentPath['$key']" -Output $Output -depth $depth
}
}
else
{
if($IsArray)
{
foreach($item in @($ChildValue))
{
Write-Verbose "Recursing through array node '$CurrentPath'"
$Output = Recurse-Object -Object $item -Path "$CurrentPath[$count]" -Output $Output -depth $depth
$Count++
}
}
else
{
Write-Verbose "Recursing through node '$CurrentPath'"
$Output = Recurse-Object -Object $ChildValue -Path $CurrentPath -Output $Output -depth $depth
}
}
}
}
$Output
}
}
Process
{
Foreach($Object in $InputObject)
{
Recurse-Object -Object $Object -Output $( New-Object -TypeName PSObject )
}
}
}
|
combined_dataset/train/non-malicious/sample_40_83.ps1
|
sample_40_83.ps1
|
#
# Module manifest for module 'OCI.PSModules.Redis'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Redis.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'bd4757ae-2cb1-4507-acfd-0f3be713db44'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Redis Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Redis.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRedisCluster', 'Get-OCIRedisClustersList',
'Get-OCIRedisWorkRequest', 'Get-OCIRedisWorkRequestErrorsList',
'Get-OCIRedisWorkRequestLogsList', 'Get-OCIRedisWorkRequestsList',
'Move-OCIRedisClusterCompartment', 'New-OCIRedisCluster',
'Remove-OCIRedisCluster', 'Stop-OCIRedisWorkRequest',
'Update-OCIRedisCluster'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Redis'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/running regions in ISE.ps1
|
running regions in ISE.ps1
|
function invoke-caretline
{
invoke-expression $([Regex]::Split($psISE.CurrentOpenedFile.Editor.text,"`r`n" )[$psISE.CurrentOpenedFile.Editor.caretline-1])
}
$psISE.CustomMenu.Submenus.Add("Run single line", {invoke-caretline} , 'f7')
function invoke-region([int] $num)
{
$ed = $psISE.CurrentOpenedFile.Editor
$lines = [Regex]::Split($ed.text,"`r`n" )
$foundfirst = -1
$foundlast = -1
for($count = 0;$count -le $lines.length-1;$count++)
{
if ($lines[$count].startswith("#region") -and $lines[$count].contains("@$num"))
{ $foundfirst = $count;break}
}
if($foundfirst -gt -1)
{
for ($count = $foundfirst; $count -le $lines.length-1;$count++)
{
if ($lines[$count].startswith("#endregion") )
{ $foundlast = $count;break}
}
if ($foundlast -gt -1)
{
$torun = ""
$lines[$foundfirst..$foundlast] | % { $torun+=$_ + "`r`n"}
invoke-expression $torun
}
}
}
$psISE.CustomMenu.Submenus.Add("run region 1", {invoke-region 1 }, 'ctrl+1')
$psISE.CustomMenu.Submenus.Add("run region 2", {invoke-region 2 }, 'ctrl+2')
$psISE.CustomMenu.Submenus.Add("run region 3", {invoke-region 3 }, 'ctrl+3')
$psISE.CustomMenu.Submenus.Add("run region 4", {invoke-region 4 }, 'ctrl+4')
$psISE.CustomMenu.Submenus.Add("run region 5", {invoke-region 5 }, 'ctrl+5')
|
combined_dataset/train/non-malicious/Clear-XCAttributes.ps1
|
Clear-XCAttributes.ps1
|
param(
[Parameter(Position=0,ValueFromPipeline=$True)]
[ValidateNotNullorEmpty()] $User,
[switch]$ClearXCAttributes
)
begin{
$Global:LegacyXCUsers = @()
# attributes to be nulled according to:
# http://blogs.technet.com/b/exchange/archive/2006/10/13/3395089.aspx
$XCattributes=@(
"adminDisplayName","altRecipient","authOrig","autoReplyMessage","deletedItemFlags","delivContLength","deliverAndRedirect","displayNamePrintable",
"dLMemDefault","dLMemRejectPerms","dLMemSubmitPerms","extensionAttribute1","extensionAttribute10","extensionAttribute11","extensionAttribute12",
"extensionAttribute13","extensionAttribute14","extensionAttribute15","extensionAttribute2","extensionAttribute3","extensionAttribute4","extensionAttribute5",
"extensionAttribute6","extensionAttribute7","extensionAttribute8","extensionAttribute9","folderPathname","garbageCollPeriod","homeMDB","homeMTA",
"internetEncoding","legacyExchangeDN","mail","mailNickname","mAPIRecipient","mDBOverHardQuotaLimit","mDBOverQuotaLimit","mDBStorageQuota","mDBUseDefaults",
"msExchADCGlobalNames","msExchControllingZone","msExchExpansionServerName","msExchFBURL","msExchHideFromAddressLists","msExchHomeServerName",
"msExchMailboxGuid","msExchMailboxSecurityDescriptor","msExchPoliciesExcluded","msExchPoliciesIncluded","msExchRecipLimit","msExchResourceGUID",
"protocolSettings","proxyAddresses","publicDelegates","securityProtocol","showInAddressBook","submissionContLength","targetAddress","textEncodedORAddress",
"unauthOrig"
)
}
process{
$Global:LegacyXCUsers += (get-aduser -Identity $User -Properties *)
if ($ClearXCAttributes){
write-verbose "all XC attributes will be cleared for $user"
set-aduser -Identity $User -Clear $XCattributes
}
}
end{
$Global:LegacyXCUsers
}
|
combined_dataset/train/non-malicious/sample_37_10.ps1
|
sample_37_10.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
<#
PowerShell Diagnostics Module
This module contains a set of wrapper scripts that
enable a user to use ETW tracing in Windows
PowerShell.
#>
$script:Logman="$env:windir\system32\logman.exe"
$script:wsmanlogfile = "$env:windir\system32\wsmtraces.log"
$script:wsmprovfile = "$env:windir\system32\wsmtraceproviders.txt"
$script:wsmsession = "wsmlog"
$script:pssession = "PSTrace"
$script:psprovidername="Microsoft-Windows-PowerShell"
$script:wsmprovidername = "Microsoft-Windows-WinRM"
$script:oplog = "/Operational"
$script:analyticlog="/Analytic"
$script:debuglog="/Debug"
$script:wevtutil="$env:windir\system32\wevtutil.exe"
$script:slparam = "sl"
$script:glparam = "gl"
function Start-Trace
{
Param(
[Parameter(Mandatory=$true,
Position=0)]
[string]
$SessionName,
[Parameter(Position=1)]
[ValidateNotNullOrEmpty()]
[string]
$OutputFilePath,
[Parameter(Position=2)]
[ValidateNotNullOrEmpty()]
[string]
$ProviderFilePath,
[Parameter()]
[Switch]
$ETS,
[Parameter()]
[ValidateSet("bin", "bincirc", "csv", "tsv", "sql")]
$Format,
[Parameter()]
[int]
$MinBuffers=0,
[Parameter()]
[int]
$MaxBuffers=256,
[Parameter()]
[int]
$BufferSizeInKB = 0,
[Parameter()]
[int]
$MaxLogFileSizeInMB=0
)
Process
{
$executestring = " start $SessionName"
if ($ETS)
{
$executestring += " -ets"
}
if ($null -ne $OutputFilePath)
{
$executestring += " -o ""$OutputFilePath"""
}
if ($null -ne $ProviderFilePath)
{
$executestring += " -pf ""$ProviderFilePath"""
}
if ($null -ne $Format)
{
$executestring += " -f $Format"
}
if ($MinBuffers -ne 0 -or $MaxBuffers -ne 256)
{
$executestring += " -nb $MinBuffers $MaxBuffers"
}
if ($BufferSizeInKB -ne 0)
{
$executestring += " -bs $BufferSizeInKB"
}
if ($MaxLogFileSizeInMB -ne 0)
{
$executestring += " -max $MaxLogFileSizeInMB"
}
& $script:Logman $executestring.Split(" ")
}
}
function Stop-Trace
{
param(
[Parameter(Mandatory=$true,
Position=0)]
$SessionName,
[Parameter()]
[switch]
$ETS
)
Process
{
if ($ETS)
{
& $script:Logman update $SessionName -ets
& $script:Logman stop $SessionName -ets
}
else
{
& $script:Logman update $SessionName
& $script:Logman stop $SessionName
}
}
}
function Enable-WSManTrace
{
# winrm
"{04c6e16d-b99f-4a3a-9b3e-b8325bbc781e} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii
# winrsmgr
"{c0a36be8-a515-4cfa-b2b6-2676366efff7} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
# WinrsExe
"{f1cab2c0-8beb-4fa2-90e1-8f17e0acdd5d} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
# WinrsCmd
"{03992646-3dfe-4477-80e3-85936ace7abb} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
# IPMIPrv
"{651d672b-e11f-41b7-add3-c2f6a4023672} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
#IpmiDrv
"{D5C6A3E9-FA9C-434e-9653-165B4FC869E4} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
# WSManProvHost
"{6e1b64d7-d3be-4651-90fb-3583af89d7f1} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
# Event Forwarding
"{6FCDF39A-EF67-483D-A661-76D715C6B008} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append
Start-Trace -SessionName $script:wsmsession -ETS -OutputFilePath $script:wsmanlogfile -Format bincirc -MinBuffers 16 -MaxBuffers 256 -BufferSizeInKB 64 -MaxLogFileSizeInMB 256 -ProviderFilePath $script:wsmprovfile
}
function Disable-WSManTrace
{
Stop-Trace $script:wsmsession -ETS
}
function Enable-PSWSManCombinedTrace
{
param (
[switch] $DoNotOverwriteExistingTrace
)
$provfile = [io.path]::GetTempFilename()
$traceFileName = [string][Guid]::NewGuid()
if ($DoNotOverwriteExistingTrace) {
$fileName = [string][guid]::newguid()
$logfile = $PSHOME + "\\Traces\\PSTrace_$fileName.etl"
} else {
$logfile = $PSHOME + "\\Traces\\PSTrace.etl"
}
"Microsoft-Windows-PowerShell 0 5" | Out-File $provfile -Encoding ascii
"Microsoft-Windows-WinRM 0 5" | Out-File $provfile -Encoding ascii -Append
if (!(Test-Path $PSHOME\Traces))
{
New-Item -ItemType Directory -Force $PSHOME\Traces | Out-Null
}
if (Test-Path $logfile)
{
Remove-Item -Force $logfile | Out-Null
}
Start-Trace -SessionName $script:pssession -OutputFilePath $logfile -ProviderFilePath $provfile -ETS
Remove-Item $provfile -Force -ea 0
}
function Disable-PSWSManCombinedTrace
{
Stop-Trace -SessionName $script:pssession -ETS
}
function Set-LogProperties
{
param(
[Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true)]
[Microsoft.PowerShell.Diagnostics.LogDetails]
$LogDetails,
[switch] $Force
)
Process
{
if ($LogDetails.AutoBackup -and !$LogDetails.Retention)
{
throw (New-Object System.InvalidOperationException)
}
$enabled = $LogDetails.Enabled.ToString()
$retention = $LogDetails.Retention.ToString()
$autobackup = $LogDetails.AutoBackup.ToString()
$maxLogSize = $LogDetails.MaxLogSize.ToString()
$osVersion = [Version] (Get-CimInstance Win32_OperatingSystem).Version
if (($LogDetails.Type -eq "Analytic") -or ($LogDetails.Type -eq "Debug"))
{
if ($LogDetails.Enabled)
{
if($osVersion -lt 6.3.7600)
{
& $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled
}
else
{
& $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled
}
}
else
{
if($osVersion -lt 6.3.7600)
{
& $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize
}
else
{
& $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize
}
}
}
else
{
if($osVersion -lt 6.3.7600)
{
& $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize
}
else
{
& $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize
}
}
}
}
function ConvertTo-Bool([string]$value)
{
if ($value -ieq "true")
{
return $true
}
else
{
return $false
}
}
function Get-LogProperties
{
param(
[Parameter(Mandatory=$true, ValueFromPipeline=$true, Position=0)] $Name
)
Process
{
$details = & $script:wevtutil $script:glparam $Name
$indexes = @(1,2,8,9,10)
$value = @()
foreach($index in $indexes)
{
$value += @(($details[$index].SubString($details[$index].IndexOf(":")+1)).Trim())
}
$enabled = ConvertTo-Bool $value[0]
$retention = ConvertTo-Bool $value[2]
$autobackup = ConvertTo-Bool $value[3]
New-Object Microsoft.PowerShell.Diagnostics.LogDetails $Name, $enabled, $value[1], $retention, $autobackup, $value[4]
}
}
function Enable-PSTrace
{
param(
[switch] $Force,
[switch] $AnalyticOnly
)
$Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog)
if (!$Properties.Enabled) {
$Properties.Enabled = $true
if ($Force) {
Set-LogProperties $Properties -Force
} else {
Set-LogProperties $Properties
}
}
if (!$AnalyticOnly) {
$Properties = Get-LogProperties ($script:psprovidername + $script:debuglog)
if (!$Properties.Enabled) {
$Properties.Enabled = $true
if ($Force) {
Set-LogProperties $Properties -Force
} else {
Set-LogProperties $Properties
}
}
}
}
function Disable-PSTrace
{
param(
[switch] $AnalyticOnly
)
$Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog)
if ($Properties.Enabled) {
$Properties.Enabled = $false
Set-LogProperties $Properties
}
if (!$AnalyticOnly) {
$Properties = Get-LogProperties ($script:psprovidername + $script:debuglog)
if ($Properties.Enabled) {
$Properties.Enabled = $false
Set-LogProperties $Properties
}
}
}
Add-Type @"
using System;
namespace Microsoft.PowerShell.Diagnostics
{
public class LogDetails
{
public string Name
{
get
{
return name;
}
}
private string name;
public bool Enabled
{
get
{
return enabled;
}
set
{
enabled = value;
}
}
private bool enabled;
public string Type
{
get
{
return type;
}
}
private string type;
public bool Retention
{
get
{
return retention;
}
set
{
retention = value;
}
}
private bool retention;
public bool AutoBackup
{
get
{
return autoBackup;
}
set
{
autoBackup = value;
}
}
private bool autoBackup;
public int MaxLogSize
{
get
{
return maxLogSize;
}
set
{
maxLogSize = value;
}
}
private int maxLogSize;
public LogDetails(string name, bool enabled, string type, bool retention, bool autoBackup, int maxLogSize)
{
this.name = name;
this.enabled = enabled;
this.type = type;
this.retention = retention;
this.autoBackup = autoBackup;
this.maxLogSize = maxLogSize;
}
}
}
"@
if (Get-Command logman.exe -Type Application -ErrorAction SilentlyContinue)
{
Export-ModuleMember Disable-PSTrace, Disable-PSWSManCombinedTrace, Disable-WSManTrace, Enable-PSTrace, Enable-PSWSManCombinedTrace, Enable-WSManTrace, Get-LogProperties, Set-LogProperties, Start-Trace, Stop-Trace
}
else
{
# Currently we only support these cmdlets as logman.exe is not available on systems like Nano and IoT
Export-ModuleMember Disable-PSTrace, Enable-PSTrace, Get-LogProperties, Set-LogProperties
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzuFp8c8UN6ilP
# /hSmUPDtAUbo8uWTs6wUbaR/ZpM1B6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEgd441WP1jGfFhxRg3sMtiU
# C5JDLIMXuzkPYRsZdTzgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAfrns6dpwB8J5PFqn9EY3w1jyXLch6Hu+cnUuHnMRtURhQGmV6npmTceC
# f03h5PrA/RMvd1MxmJHwwus1l0JWyM5qnaAiNjSw+7s0dGX55b4RTfKHI5TRimCz
# GX9BJLVHiexkkb7D96jjoFbFa4Z6KZrd5ZGsCq88xYOS0naSWkvQ8i5eQDA7Uevs
# IQAv0CDZeklxhozTg5pdYkO3ZRIZJI8DJLqTUTnqo1pFU1GcWxlayIwZKg28x76Q
# OdAtue/YvXdiO/6Uj7uvrQgtCXT9bWVWx7Qo3ffP8yMDmBOyGKmYvRU4DiBBywG4
# M6ONybBa2gMS6RqBqvQ3raclfZFdm6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD8Qgy33jQQavSA/SWfEYCZDuBMGqfPhAh2f5fecr4F/gIGZdXka4Ur
# GBMyMDI0MDIyNjAzMDQwOC4zMzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA
# 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf
# 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq
# bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw
# h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgW51EBT0WjUDrMMAxpSj+YB/mABkwlcJ1xQYPmQbWn+gwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X
# MA0GCSqGSIb3DQEBCwUABIICAIcXurDQsp4z3mkgu9/7PQ+DOxNKy5uyOfB/iHEn
# Se+qjruwxahxunbfK2p6JdPMHerZJ+hyXe6zFpUpA0iJ1JJq+0MdW9tZ5rq2RDJg
# G+4LxMuxPJjXq/s6LydtEEktfellP8fDdHGLFmUjYj8lNWDV6lg0xJVIf7UXe/nY
# qRg9PCfT8wShGJ8LjudMFUXKmAQXS+U47CfA5qXKwELJNt+PH8zRbvn1ytK93gIQ
# YELYzUxeldS5MzipGjC3BBTdxvMBU/4QrJpYPVdv7M64wtWEy/QeWDUcYmTbYUvs
# HHzEeU9qp0DuFbrlG5t51X05AgvOz9SepiN8o+CG5h6nZZ96zfC+p4PBNpDKYrwI
# Yq2RgwzsBYurP+a7fr25btLSfdle3KCB6/hXemXvssTjfPKUGCCqq9fVsOpdJczf
# zqP7kV6yB32/5pqrInkZErW4N483iPQg+LxxF7qhgE/1R/M/IOUQTOEsP2JYSZ8b
# J08cAIUoscP0bhlYcMLVqW4YgmMdOfcfAyapz9mAkFUqQxv1wTUny5TRFb2ySbb2
# pWnBmt1qzfMJHSJ0iyt6pl7TkhAZPCbtSl7gk1FnnAgsYiWxWL5/UtVI9cx8olUO
# E/FA9stiKB1ZxlSJ5gIWo5Cyj2oIlBWfWmsrgGr8o/dDm6HuqJGlFOI43h0h2l77
# 9mE2
# SIG # End signature block
|
combined_dataset/train/non-malicious/get-uuid_allHVs_1.ps1
|
get-uuid_allHVs_1.ps1
|
#The PowerShell Talk
#Building a HyperVisor Independent Script
#
#This script will take a VM (or host) object from the pipline,
#and from that determine if you're connected to XenServer
#or VMware, and return the apropriate UUID.
Begin {
#VMware VM Host (ESX) UUID
$VMHost_UUID = @{
Name = "VMHost_UUID"
Expression = { $_.Summary.Hardware.Uuid }
}
#XenServer Host UUID
$XenHost_UUID = @{
Name = "XenHost_UUID"
Expression = { $_.Uuid }
}
}
Process {
#Get the type of object we have
$InputTypeName = $_.GetType().Name
#Do something with that object
#is it VMware?
if ( $InputTypeName -eq "VMHostImpl" ) {
$output = $_ | Get-View | Select-Object $VMHost_UUID
#is it Xen?
} elseif ($InputTypeName -eq "Host"){
$output = $_ | Select-Object $XenHost_UUID
#Otherwise throw an error
} else {
Write-Host "`nPlease pass this script either a VMHost or VM object on the pipeline.`n"
}
$output
}
|
combined_dataset/train/non-malicious/Get-WMIVersions_1.ps1
|
Get-WMIVersions_1.ps1
|
#Requires -Version 2
param ( $Credential, $ComputerName )
# The official way to detect .NET versions is to look at their known location on the hard drive as per
# this article: http://msdn.microsoft.com/en-us/kb/kb00318785.aspx
# thanks to David M (http://twitter.com/makovec) for the WQL
$query = "select name from win32_directory where name like 'c:\\\\windows\\\\microsoft.net\\\\framework\\\\v%'"
$res = Get-WmiObject -query $query -Credential $Credential -ComputerName $ComputerName | ForEach-Object {
Split-Path $_.name -Leaf } | # returns directories
Where-Object { $_ -like 'v*' } | # only include those that start with v
ForEach-Object { [system.version]( $_ -replace "^v" ) } # remove "v" from the string and convert to version object
# Create hashtable with computername and version details
$prop = @{
ComputerName = $ComputerName
V1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 0 } ) { $true } }
V1_1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 1 } ) { $true } }
V2Present = &{ if ( $res | Where-Object { $_.Major -eq 2 -and $_.Minor -eq 0 } ) { $true } }
V3_5Present = &{ if ( $res | Where-Object { $_.Major -eq 3 -and $_.Minor -eq 5 } ) { $true } }
VersionDetails = $res
}
# Create and output PSobject using hashtable
New-Object PSObject -Property $prop
|
combined_dataset/train/non-malicious/843.ps1
|
843.ps1
|
Param(
[parameter(Mandatory=$true)]
$CsvFilePath
)
$ErrorActionPreference = "Stop"
$scriptsPath = $PSScriptRoot
if ($PSScriptRoot -eq "") {
$scriptsPath = "."
}
. "$scriptsPath\asr_logger.ps1"
. "$scriptsPath\asr_common.ps1"
. "$scriptsPath\asr_csv_processor.ps1"
Function ProcessItemImpl($processor, $csvItem, $reportItem) {
$reportItem | Add-Member NoteProperty "TestFailoverJobId" $null
$reportItem | Add-Member NoteProperty "TestFailoverState" $null
$reportItem | Add-Member NoteProperty "TestFailoverStateDescription" $null
$vaultName = $csvItem.VAULT_NAME
$sourceAccountName = $csvItem.ACCOUNT_NAME
$sourceMachineName = $csvItem.SOURCE_MACHINE_NAME
$sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER
$targetTestFailoverVNET = $csvItem.TESTFAILOVER_VNET
$targetVNETRG = $csvItem.TARGET_VNET_RG
$protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer)
if ($protectedItem -ne $null) {
if ($protectedItem.AllowedOperations.Contains('TestFailover')) {
$processor.Logger.LogTrace("Starting TestFailover operation for item '$($sourceMachineName)'")
$targetTestFailoverVNETObj = Get-AzureRmVirtualNetwork `
-Name $targetTestFailoverVNET `
-ResourceGroupName $targetVNETRG
$testFailoverJob = Start-AzureRmRecoveryServicesAsrTestFailoverJob `
-ReplicationProtectedItem $protectedItem `
-AzureVMNetworkId $targetTestFailoverVNETObj.Id `
-Direction PrimaryToRecovery
$reportItem.TestFailoverJobId = $testFailoverJob.ID
} else {
$processor.Logger.LogTrace("TestFailover operation not allowed for item '$($sourceMachineName)'")
$reportItem.TestFailoverState = $protectedItem.TestFailoverState
$reportItem.TestFailoverStateDescription = $protectedItem.TestFailoverStateDescription
}
}
}
Function ProcessItem($processor, $csvItem, $reportItem)
{
try {
ProcessItemImpl $processor $csvItem $reportItem
}
catch {
$exceptionMessage = $_ | Out-String
$processor.Logger.LogError($exceptionMessage)
throw
}
}
$logger = New-AsrLoggerInstance -CommandPath $PSCommandPath
$asrCommon = New-AsrCommonInstance -Logger $logger
$processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem
$processor.ProcessFile($CsvFilePath)
|
combined_dataset/train/non-malicious/sample_49_27.ps1
|
sample_49_27.ps1
|
#
# Module manifest for module 'OCI.PSModules.Aianomalydetection'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Aianomalydetection.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a3b1179d-3494-46fe-b212-09c2eaebfa09'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Aianomalydetection Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aianomalydetection.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAianomalydetectionAiPrivateEndpoint',
'Get-OCIAianomalydetectionAiPrivateEndpointsList',
'Get-OCIAianomalydetectionDataAsset',
'Get-OCIAianomalydetectionDataAssetsList',
'Get-OCIAianomalydetectionDetectAnomalyJob',
'Get-OCIAianomalydetectionDetectAnomalyJobsList',
'Get-OCIAianomalydetectionModel',
'Get-OCIAianomalydetectionModelsList',
'Get-OCIAianomalydetectionProject',
'Get-OCIAianomalydetectionProjectsList',
'Get-OCIAianomalydetectionWorkRequest',
'Get-OCIAianomalydetectionWorkRequestErrorsList',
'Get-OCIAianomalydetectionWorkRequestLogsList',
'Get-OCIAianomalydetectionWorkRequestsList',
'Invoke-OCIAianomalydetectionDetectAnomalies',
'Move-OCIAianomalydetectionAiPrivateEndpointCompartment',
'Move-OCIAianomalydetectionDataAssetCompartment',
'Move-OCIAianomalydetectionDetectAnomalyJobCompartment',
'Move-OCIAianomalydetectionModelCompartment',
'Move-OCIAianomalydetectionProjectCompartment',
'New-OCIAianomalydetectionAiPrivateEndpoint',
'New-OCIAianomalydetectionDataAsset',
'New-OCIAianomalydetectionDetectAnomalyJob',
'New-OCIAianomalydetectionModel',
'New-OCIAianomalydetectionProject',
'Remove-OCIAianomalydetectionAiPrivateEndpoint',
'Remove-OCIAianomalydetectionDataAsset',
'Remove-OCIAianomalydetectionDetectAnomalyJob',
'Remove-OCIAianomalydetectionModel',
'Remove-OCIAianomalydetectionProject',
'Stop-OCIAianomalydetectionWorkRequest',
'Update-OCIAianomalydetectionAiPrivateEndpoint',
'Update-OCIAianomalydetectionDataAsset',
'Update-OCIAianomalydetectionDetectAnomalyJob',
'Update-OCIAianomalydetectionModel',
'Update-OCIAianomalydetectionProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aianomalydetection'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_2.ps1
|
Send-HTMLFormattedEmail_2.ps1
|
##################################################
# cmdlets
##################################################
#-------------------------------------------------
# Send-HTMLFormattedEmail
#-------------------------------------------------
# Usage: Send-HTMLFormattedEmail -?
#-------------------------------------------------
function Send-HTMLFormattedEmail {
<#
.Synopsis
Used to send an HTML Formatted Email.
.Description
Used to send an HTML Formatted Email that is based on an XSLT template.
.Parameter To
Email address or addresses for whom the message is being sent to.
Addresses should be seperated using ;.
.Parameter ToDisName
Display name for whom the message is being sent to.
.Parameter CC
Email address if you want CC a recipient.
Addresses should be seperated using ;.
.Parameter BCC
Email address if you want BCC a recipient.
Addresses should be seperated using ;.
.Parameter From
Email address for whom the message comes from.
.Parameter FromDisName
Display name for whom the message comes from.
.Parameter Subject
The subject of the email address.
.Parameter Content
The content of the message (to be inserted into the XSL Template).
.Parameter Relay
FQDN or IP of the SMTP relay to send the message to.
.XSLPath
The full path to the XSL template that is to be used.
#>
param(
[Parameter(Mandatory=$True)][String]$To,
[Parameter(Mandatory=$True)][String]$ToDisName,
[String]$CC,
[String]$BCC,
[Parameter(Mandatory=$True)][String]$From,
[Parameter(Mandatory=$True)][String]$FromDisName,
[Parameter(Mandatory=$True)][String]$Subject,
[Parameter(Mandatory=$True)][String]$Content,
[Parameter(Mandatory=$True)][String]$Relay,
[Parameter(Mandatory=$True)][String]$XSLPath
)
try {
# Load XSL Argument List
$XSLArg = New-Object System.Xml.Xsl.XsltArgumentList
$XSLArg.Clear()
$XSLArg.AddParam("To", $Null, $ToDisName)
$XSLArg.AddParam("Content", $Null, $Content)
# Load Documents
$BaseXMLDoc = New-Object System.Xml.XmlDocument
$BaseXMLDoc.LoadXml("<root/>")
$XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform
$XSLTrans.Load($XSLPath)
#Perform XSL Transform
$FinalXMLDoc = New-Object System.Xml.XmlDocument
$MemStream = New-Object System.IO.MemoryStream
$XMLWriter = [System.Xml.XmlWriter]::Create($MemStream)
$XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter)
$XMLWriter.Flush()
$MemStream.Position = 0
# Load the results
$FinalXMLDoc.Load($MemStream)
$Body = $FinalXMLDoc.Get_OuterXML()
# Create Message Object
$Message = New-Object System.Net.Mail.MailMessage
# Now Populate the Message Object.
$Message.Subject = $Subject
$Message.Body = $Body
$Message.IsBodyHTML = $True
# Add From
$MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName
$Message.From = $MessFrom
# Add To
$To = $To.Split(";") # Make an array of addresses.
$To | foreach {$Message.To.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
# Add CC
if ($CC){
$CC = $CC.Split(";") # Make an array of addresses.
$CC | foreach {$Message.CC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
}
# Add BCC
if ($BCC){
$BCC = $BCC.Split(";") # Make an array of addresses.
$BCC | foreach {$Message.BCC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object.
}
# Create SMTP Client
$Client = New-Object System.Net.Mail.SmtpClient $Relay
# Send The Message
$Client.Send($Message)
}
catch {
throw $_
}
}
##################################################
# Main
##################################################
Export-ModuleMember Send-HTMLFormattedEmail
### XSLT Template Example
<?xml version="1.0"?>
<xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform">
<xsl:output media-type="xml" omit-xml-declaration="yes" />
<xsl:param name="To"/>
<xsl:param name="Content"/>
<xsl:template match="/">
<html>
<head>
<title>My First Formatted Email</title>
</head>
<body>
<div width="400px">
<p>Dear <xsl:value-of select="$To" />,</p>
<p></p>
<p><xsl:value-of select="$Content" /></p>
<p></p>
<p><strong>Please do not respond to this email!</strong><br />
An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p>
<p></p>
<Address>
Many thanks from your:<br />
Really Cool IT Team<br />
</Address>
</div>
</body>
</html>
</xsl:template>
</xsl:stylesheet>
|
combined_dataset/train/non-malicious/WinFirewall-Disabled.ps1
|
WinFirewall-Disabled.ps1
|
function WinFirewall-Disabled(){
param (
$computer
)
c:\\PsTools\\PsExec.exe \\\\"$computer" sc config sharedaccess start= disabled
}
|
combined_dataset/train/non-malicious/3599.ps1
|
3599.ps1
|
function Get-AzureRmSecurityPricing-SubscriptionScope
{
$pricings = Get-AzSecurityPricing
Validate-Pricings $pricings
}
function Get-AzureRmSecurityPricing-SubscriptionLevelResource
{
$pricings = Get-AzSecurityPricing -Name "VirtualMachines"
Validate-Pricings $pricings
}
function Get-AzureRmSecurityPricing-ResourceId
{
$pricing = Get-AzSecurityPricing | Select -First 1
$fetchedPricing = Get-AzSecurityPricing -ResourceId $pricing.Id
Validate-Pricing $fetchedPricing
}
function Set-AzureRmSecurityPricing-SubscriptionLevelResource
{
Set-AzSecurityPricing -Name "VirtualMachines" -PricingTier "Standard"
}
function Validate-Pricings
{
param($pricings)
Assert-True { $pricings.Count -gt 0 }
Foreach($pricing in $pricings)
{
Validate-Pricing $pricing
}
}
function Validate-Pricing
{
param($pricing)
Assert-NotNull $pricing
}
|
combined_dataset/train/non-malicious/3236.ps1
|
3236.ps1
|
class LogMessage {
[datetime]$DateTime = (Get-Date).ToUniversalTime()
[string]$Class
[string]$Method
[LogSeverity]$Severity = [LogSeverity]::Normal
[LogLevel]$LogLevel = [LogLevel]::Info
[string]$Message
[object]$Data
LogMessage() {
}
LogMessage([string]$Message) {
$this.Message = $Message
}
LogMessage([string]$Message, [object]$Data) {
$this.Message = $Message
$this.Data = $Data
}
LogMessage([LogSeverity]$Severity, [string]$Message) {
$this.Severity = $Severity
$this.Message = $Message
}
LogMessage([LogSeverity]$Severity, [string]$Message, [object]$Data) {
$this.Severity = $Severity
$this.Message = $Message
$this.Data = $Data
}
hidden [string]Compact([string]$Json) {
$indent = 0
$compacted = ($Json -Split '\n' | ForEach-Object {
if ($_ -match '[\}\]]') {
$indent--
}
$line = (' ' * $indent * 2) + $_.TrimStart().Replace(': ', ': ')
if ($_ -match '[\{\[]') {
$indent++
}
$line
}) -Join "`n"
return $compacted
}
[string]ToJson() {
$json = [ordered]@{
DataTime = $this.DateTime.ToString('u')
Class = $this.Class
Method = $this.Method
Severity = $this.Severity.ToString()
LogLevel = $this.LogLevel.ToString()
Message = $this.Message
Data = foreach ($item in $this.Data) {
if ($item.GetType().BaseType.ToString() -eq 'System.Management.Automation.Job') {
continue
}
if ($item -is [System.Management.Automation.ErrorRecord]) {
[ExceptionFormatter]::Summarize($item)
} else {
$item
}
}
} | ConvertTo-Json -Depth 10 -Compress
return $json
}
[string]ToString() {
return $this.ToJson()
}
}
|
combined_dataset/train/non-malicious/sample_67_40.ps1
|
sample_67_40.ps1
|
#
# Module manifest for module 'OCI.PSModules.Email'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Email.dll'
# Version number of this module.
ModuleVersion = '90.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Email Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIEmailConfiguration', 'Get-OCIEmailDkim',
'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain',
'Get-OCIEmailDomainsList', 'Get-OCIEmailReturnPath',
'Get-OCIEmailReturnPathsList', 'Get-OCIEmailSender',
'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression',
'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest',
'Get-OCIEmailWorkRequestErrorsList',
'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList',
'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment',
'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailReturnPath',
'New-OCIEmailSender', 'New-OCIEmailSuppression',
'Remove-OCIEmailDkim', 'Remove-OCIEmailDomain',
'Remove-OCIEmailReturnPath', 'Remove-OCIEmailSender',
'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim',
'Update-OCIEmailDomain', 'Update-OCIEmailReturnPath',
'Update-OCIEmailSender'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2190.ps1
|
2190.ps1
|
param(
[parameter(Mandatory=$true)]
$IPRangeOld,
[parameter(Mandatory=$true)]
$IPRangeNew
)
Begin {
$ReferenceObject = $IPRangeOld.Split(",")
$ReferenceObjectCount = [System.Math]::Round(($ReferenceObject | Measure-Object).Count / 2)
$DifferenceObject = $IPRangeNew.Split(",")
$DifferenceObjectCount = [System.Math]::Round(($DifferenceObject | Measure-Object).Count / 2)
if ($ReferenceObjectCount -ge $DifferenceObjectCount) {
$SyncWindow = $ReferenceObjectCount
}
else {
$SyncWindow = $DifferenceObjectCount
}
}
Process {
Compare-Object -ReferenceObject $ReferenceObject -DifferenceObject $DifferenceObject -SyncWindow $SyncWindow | ForEach-Object {
if ($_.SideIndicator -like "=>") {
$Object = New-Object -TypeName PSObject
$Object | Add-Member -MemberType NoteProperty -Name Difference -Value ($_.InputObject)
$Object | Add-Member -MemberType NoteProperty -Name Origin -Value ($_.SideIndicator)
Write-Output $Object
}
}
}
|
combined_dataset/train/non-malicious/sample_7_38.ps1
|
sample_7_38.ps1
|
#************************************************
# DC_RDSRDWeb.ps1
# Version 1.0.1
# Date: 21-01-2012
# Author: Daniel Grund - dgrund@microsoft.com
# Description:
# This script gets the IIS config
# 1.0.0 Beta release
# 1.0.1 Release
# TODO get windows\web\rdweb dir
#************************************************
PARAM(
[string] $TargetHost = "localhost",
$OutputFileName
)
$IISConfig = (C:\WINDOWS\SYSTEM32\INETSRV\APPCMD list config)
if ($null -ne $IISConfig)
{
$savepath = $TargetHost + "_IISConfig.txt"
[array]$OutputFileName += $savepath
$IISConfig | Out-File $savepath
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD9+PNMwhf5kMaz
# ON0qnIh8J95W070RF7L2itRGeWpnAKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHw6
# tntOk1lPhNQIhgUoYfH6CzKvo1vPCW2gQcBubJSKMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAeBiLxwUfwvm9xS4kx4c1B0IiHtuHX6zqKKTC
# tnAp3X5ysglB7HFXtG9XB8fnU1itkIPAADdgm5C81hWUFMl8Vsi6/KEuFAiUQlmO
# iCPCrkbybkuANtxs3R1oK2cgrTWPI7CbsnnYV2aSWBTjfLvJpN6uvHatvuzP9fHA
# cVI4O5fQXgfJLmZzhF3lGBiMRJU+/R3d/KPFkEGI18WWErUJ/gneNvNXqGZ61Ebm
# xWZ99UwT6jrCa0m0jCVVRDt54cK69GOnOpUrZ6fvU3yFVcGSgZpyxqpUMDiEEyMR
# t2D5ctAKg6vwgQ0d3bwMvFDF5XcurBrb7jBJJzikpYprhMUewKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAObf0SNhXvlcvDynyKAVha097GqFfnlzX3
# bChIO4FDMwIGZusiCs74GBMyMDI0MTAyODExNDA0NC41MjRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg
# dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3
# k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW
# 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8
# U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH
# TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn
# 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE
# 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX
# D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI
# vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ
# QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G
# qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb
# QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL
# zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0
# G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt
# qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b
# a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB
# VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM
# H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N
# iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG
# 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V
# VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB
# jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0
# MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA
# AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd
# uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0
# GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578
# OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI
# /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN
# ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgPhnK8zlpV74QlpVhujWfRv9Vm/R8AkS8oLwnHxgw6lcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So
# IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b
# gvEVMA0GCSqGSIb3DQEBCwUABIICAG4Wyjhtnzsyw4+eYkRaTI0tv8wgSZDboX6h
# GsoawSosl8e/kTZqfcYNgUeVByOAK6NZblCFGQ94cJLpJAvgtUs+3fQUlFaaleJI
# XrPrYarkjQSA/ZGfYZ/zK1KMYTDZH5L4Mg3biXAGPDJHUwzQ97n+fjmhS90A7E1m
# qj2s9+sdEGiqq5mckIEqvwLeZfEOYFuqxXoiFRxwBznbI3OGSfds4dM3C4izJGjB
# 8gRCCzHuJXoSxiUe4eGVtKy3n1en0UvIbFgua/hbwmYwlI/i6F0Wj8J+uI8geE7t
# kHC1PTUgpvTlLejsv7tZwCkVITKpe7PBhs2skUKYt1t3FZTCaZvBY+uWLuUNTe2B
# CCz5C7IgmAGr2wMbTIZqgM6KbZq/KO9RXV9PKdVUdmZMVYZle740OAQVCfIrHXbQ
# HIqbiq603btotoqvxdsR6zjclxxIAz6vmcFKtZBGzR3vdTmoP2kjpwc7pfQSk/mQ
# gm2tS6i8iluRdbbdFyT5ZD1nWOy0OBRwKvTXuuiYmjj3oF329mdXNqUcZ21HompX
# iGbb3f8/AUvShL/1PxQNmH9+Po1EyzwDOyW3aANQzsVQoRWamebwuhS/OywlbzAI
# etf3DMT8pdOnIgCG8BSdTOdfKeCBxHNUp52yPA06vQcDwbrq0slJH2OLVgEnHd6Z
# wCpoeHYz
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_8_70.ps1
|
sample_8_70.ps1
|
###########################################################################
# DC_Get-Network
# Version 1.0
# Date: 09-26-2012
# Author: mifannin
# Description: Creates Autotuning.txt, Firewall.txt, Netsh.txt, Winsock.txt,
# Bitsadmin.txt, WPAD & PAC File Collection
###########################################################################
Import-LocalizedData -BindingVariable Net -FileName DC_Get_Network -UICulture en-us
Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Autotuning
$separator = "==========================================================================="
function DoCommand ($cmd)
{
$CommandLineToExecute = "cmd.exe /c $cmd >> $OutputFile"
RunCmD -commandToRun $CommandLineToExecute
$separator | Out-File ($OutputFile) -append
}
<#
function firewall ($cmd)
{
Invoke-Expression -Command $cmd | Out-File -Append $outputfile -Encoding ascii
}
#>
#Netsh_Autotuning.txt
if ($OSVersion.Major -gt 6)
{
$OutputFile = $ComputerName + "_Netsh_Autotuning.txt"
logStart
$Header = "Querying Active State..."
#$Header | Out-File $OutputFile
$cmd = "netsh interface tcp show global"
DoCommand $cmd
Add-Content $OutputFile "To view Auto-Tuning settings: netsh interface tcp show global" -Encoding unknown
Add-content $Outputfile "To Disable Auto-Tuning: netsh interface tcp set global autotuninglevel=disabled (requires restart)" -Encoding Unknown
Add-content $OutputFile "Enable Auto-Tuning: netsh interface tcp set global autotuninglevel=normal (requires restart)" -Encoding Unknown
CollectFiles -filesToCollect $OutputFile -fileDescription "Netsh Autotuning" -sectionDescription "Network Configuration"
logStop
}
#Collecting Netstat.txt
Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Netstat
$OutputFile = $ComputerName + "_Netstat.txt"
logstart
$CommandLineToExecute = "cmd.exe /c netstat -ano > $OutputFile"
RunCmD -commandToRun $CommandLineToExecute -filesToCollect ($OutputFile) -fileDescription "Netstat" -sectionDescription "Network Configuration"
logstop
#Network.txt
Write-DiagProgress -Activity $Net.ID_Network -Status "Collecting ipconfig, srv/wks stats, arp, netbt, netstat"
$OutputFile = $ComputerName + "_Network.txt"
logstart
$Header = "ipconfig /all"
DoCommand $Header
#net statistics Workstation
$Header = "net statistics workstation"
DoCommand $Header
#arp -a
$Header = "arp -a "
DoCommand $Header
#nbtstat -c
$Header = "nbtstat -c"
DoCommand $Header
$Header = "netstat -r"
DoCommand $Header
#ipconfig /displaydns
$Header = "ipconfig /displaydns"
DoCommand $Header
CollectFiles -filesToCollect $OutputFile -fileDescription "Network.txt" -sectionDescription "Network Configuration"
logstop
#Winsock.txt
Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Winsock
$ComputerName = $ENV:COMPUTERNAME
$OutputFile = $ComputerName + "_Winsock.txt"
logstart
$Header = "netsh winsock show catalog "
DoCommand $Header
$Header = "netsh winsock show helper"
DoCommand $Header
$Header = "netsh winsock show alias"
DoCommand $Header
$Header = "REG.exe QUERY HKLM\SYSTEM\CurrentControlSet\Services\WinSock /s"
DoCommand $Header
$Header = "REG QUERY HKLM\SYSTEM\CurrentControlSet\Services\WinSock2 /s"
DoCommand $Header
CollectFiles -filesToCollect $OutputFile -fileDescription "Winsock.txt" -sectionDescription "Network Configuration"
logstop
$OutputFile = ""
# WPAD and PAC Files
#Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_PAC
#"Start collecting PAC and WPAD Files" | WriteTo-StdOut
if ($OSVersion.Major -gt 6)
{
$source = "$ENV:HOMEDRIVE\Users"
"Windows Vista or higher detected" | WriteTo-StdOut
"Setting profile path to " + $source | WriteTo-StdOut
}
else
{
"Windows XP or 2003 detected" | WriteTo-StdOut
$source = "$ENV:HOMEDRIVE\Documents and Settings"
"Setting profile path to " + $source | WriteTo-StdOut
}
<#
function get-wpad ($dir)
{
Get-ChildItem -Recurse -Force $dir -Include *.dat | Where-Object {$_.Name -like "*wpad*"} | ForEach-Object {
Get-Content $_.FullName} | ForEach-Object {
$OutputFile = $ComputerName + "_WPAD.DAT_" + $fName
"Collecting " + $OutputFile | WriteTo-StdOut
}
CollectFiles -filesToCollect $OutputFile -fileDescription "WPAD File" -sectionDescription "Network Configuration"
Get-ChildItem -Recurse -Force $dir -Include *.dat | Where-Object {$_.Name -like "*pac*"} | ForEach-Object {
Get-Content $_.FullName} | ForEach-Object {
$OutputFile = $ComputerName + "_PACFile_" + $fName
"Collecting " + $OutputFile | WriteTo-StdOut
}
CollectFiles -filesToCollect $OutputFile -fileDescription "PAC File" -sectionDescription "Network Configuration"
}
#$dir = $ENV:HOMEPATH
#$fName = $ENV:USERNAME + ".txt"
#get-wpad $dir
#$dir = $source + "\NetworkService"
#$fName = "NetworkService.txt"
#get-wpad $dir
#$dir = $source + "\Default User"
#$fName = "DefaultUser.txt"
#get-wpad $dir
#$dir = $source + "\Administrator"
#$fName = "Administrator.txt"
#get-wpad $dir
#$dir = $source + "\LocalService"
#$fName = "LocalService.txt"
#get-wpad $dir
#"Finished collecting PAC and WPAD Files" | WriteTo-StdOut
#>
# Bitsadmin
$AllUsers = $Env:ALLUSERSPROFILE
$OutputFile = $ComputerName + "_BitsAdmin.txt"
logstart
Add-Content $OutputFile "bitsadm.txt"
function DoBits ($bitscmd)
{
#$CommandLineToExecute = "cmd.exe /c bitsadmin.exe $bitscmd >> $OutputFile"
#$separator | Out-File -Append $OutputFile
#$CommandLineToExecute
Invoke-Expression -command $bitscmd | Out-File -Append $outputfile -Encoding ascii
#RunCmD -commandToRun $CommandLineToExecute
}
$bitscmd = "bitsadmin.exe /list /allusers /verbose"
DoBits $bitscmd
$bitscmd = "bitsadmin.exe /util /GetIEProxy LocalSystem"
DoBits $bitscmd
$bitscmd = "bitsadmin.exe util /GetIEProxy networkservice"
DoBits $bitscmd
$bitscmd = "bitsadmin.exe /util /version /verbose"
DoBits $bitscmd
Get-ChildItem "$AllUsers\Application Data\Microsoft\Network\Downloader\*.*" | Out-File $OutputFile -Append -Encoding ascii
#$CommandLineToExecute = "cmd.exe /c dir `"$AllUsers\Application Data\Microsoft\Network\Downloader\*.*`" /X /OD /TC /S /L >> $OutputFile"
#DoBits $bitscmd
CollectFiles -filesToCollect $OutputFile -fileDescription "BITS Data" -sectionDescription "Network Configuration"
logstop
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDa2IABzZ2vZYxL
# JS0iNnflk5jYTKP+yLcw9m1sFLuOTKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDnqG8GxCfOevjyZ30aATa2T
# 30wxKR3bPfRazotFQ24nMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAm0ZM77Qt2+AkrXALXi1uvVlUpBczcZcduYAZpVdxusDi2MZMsUx9MY3C
# ZY0X7AfS4BKB+5hIX72PoePcVVPDBHIzeNhSu5oMEoMvbP8/Fo2+NDgiLUsEPPyi
# MclD+P7EPMokBCa2v25+TGMZFXsEAiAvY8dT2yv0wdP15wAe/btHJljM6pX6CCvY
# x9C5a/5P+rh7OnFf4bSedfSD+q8Duiwd8ef/MNEsLLPKqagb7lvomdrFefyzhTKt
# hu5+3kHs9On83kEY6OvWLs/SO9BkPNFh3+Q/dt/sUafIOaZXWOEUYhcqSQehairT
# XRDOBPQuJogSHSY92g8tPqp11936pKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAG3SUD9ehhOmgZ7JZ7CwDQKc5eophjguqkzvDG2zSl/AIGZus6esod
# GBMyMDI0MTAyODExNDA0NC45MjNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT
# j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt
# gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh
# 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY
# X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd
# F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI
# J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc
# QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry
# 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn
# Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5
# olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+
# Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ
# I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf
# hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI
# hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut
# Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8
# cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo
# riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt
# g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A
# W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm
# Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe
# bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w
# MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9
# YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK
# AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch
# wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL
# Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq
# gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu
# 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy
# dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo
# dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgSk1OoJC5KWuj
# efUtlc8x+GJ+tNsz9WtGlzndmUphDJgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5
# MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB
# CwUABIICABMkyb1npZoOvPic54ZawOnMdRk/G4AQYU5cHI+JWdlNE3mezaRwVU5I
# UJgPYXs9uLQlRgIoxOISbZPFmkb7VFt4AutUT2qsfBZm5t4CUUMjd5SZc6dx9hly
# dunEKTt6V4ycEUwZKjVw0JoVlqGcKzL+Dv6qV1YjijEXjzOGPmUoVgHxf4yReM/U
# Y3rD7tAVRJF9G3SDRqDCQtobZST4cS0/FF03yQh+4NaZsi5OvZ9UJuizTo5Ryn8c
# AM+94v05PNUJ+k+nsR8VLKg+bwbGwoL+m35VOT4y4lB5MVkS9I+VB56tGo2IVClj
# preLlsJ8FkseiLGh5XDqg4EVCR5OKBsblVOUe5koW1o++tMOC6Gz1nj/rTqRojiQ
# ZJIf62vfXS53og5rMgyKMaVTvDXI7A8uHpcxlIdNqm5XhW6DICM7OrabZ+KMtW9S
# JpCPXNA5gfJzY/PQ/zqS8OH78E+gLAff786foWgKYjknjMvHt9UuujyPSFhJXkAN
# sKuCcljONadxXpaQwHzGmM6p5TYqZUzFOdT2Xy4PiOl71RqX/w3fH54x0gtC+6fW
# 2aJQNFA0S7+KqviOMlmhgQsYulfpwUzxMP1681UcB6zw3VgQUwtr/VOm1HjiG2zY
# silwGD4A9JrNU+cMjUNRDfhpfii6XooVPHFs+T8zyPXDbW9Z0l0j
# SIG # End signature block
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.