full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/1270.ps1
1270.ps1
function Start-CDscPullConfiguration { [CmdletBinding(DefaultParameterSetName='WithCredentials')] param( [Parameter(Mandatory=$true,ParameterSetName='WithCredentials')] [string[]] $ComputerName, [Parameter(ParameterSetName='WithCredentials')] [PSCredential] $Credential, [Parameter(ParameterSetName='WithCimSession')] [Microsoft.Management.Infrastructure.CimSession[]] $CimSession, [string[]] $ModuleName ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $credentialParam = @{ } if( $PSCmdlet.ParameterSetName -eq 'WithCredentials' ) { if( $Credential ) { $credentialParam.Credential = $Credential } $CimSession = New-CimSession -ComputerName $ComputerName @credentialParam if( -not $CimSession ) { return } } $CimSession = Get-DscLocalConfigurationManager -CimSession $CimSession | ForEach-Object { if( $_.RefreshMode -ne 'Pull' ) { Write-Error ('The Local Configuration Manager on ''{0}'' is not in Pull mode (current RefreshMode is ''{1}'').' -f $_.PSComputerName,$_.RefreshMode) return } foreach( $session in $CimSession ) { if( $session.ComputerName -eq $_.PSComputerName ) { return $session } } } if( -not $CimSession ) { return } Invoke-Command -ComputerName $CimSession.ComputerName @credentialParam -ScriptBlock { $modulesRoot = Join-Path -Path $env:ProgramFiles -ChildPath 'WindowsPowerShell\Modules' Get-ChildItem -Path $modulesRoot -Filter '*_tmp' -Directory | Remove-Item -Recurse } if( $ModuleName ) { Invoke-Command -ComputerName $CimSession.ComputerName @credentialParam -ScriptBlock { param( [string[]] $ModuleName ) $dscProcessID = Get-WmiObject msft_providers | Where-Object {$_.provider -like 'dsccore'} | Select-Object -ExpandProperty HostProcessIdentifier Stop-Process -Id $dscProcessID -Force $modulesRoot = Join-Path -Path $env:ProgramFiles -ChildPath 'WindowsPowerShell\Modules' Get-ChildItem -Path $modulesRoot -Directory | Where-Object { $ModuleName -contains $_.Name } | Remove-Item -Recurse } -ArgumentList (,$ModuleName) } $win32OS = Get-CimInstance -CimSession $CimSession -ClassName 'Win32_OperatingSystem' $results = Invoke-CimMethod -CimSession $CimSession ` -Namespace 'root/microsoft/windows/desiredstateconfiguration' ` -Class 'MSFT_DscLocalConfigurationManager' ` -MethodName 'PerformRequiredConfigurationChecks' ` -Arguments @{ 'Flags' = [uint32]1 } $successfulComputers = $results | Where-Object { $_ -and $_.ReturnValue -eq 0 } | Select-Object -ExpandProperty 'PSComputerName' $CimSession | Where-Object { $successfulComputers -notcontains $_.ComputerName } | ForEach-Object { $session = $_ $startedAt= $win32OS | Where-Object { $_.PSComputerName -eq $session.ComputerName } | Select-Object -ExpandProperty 'LocalDateTime' Get-CDscError -ComputerName $session.ComputerName -StartTime $startedAt -Wait } | Write-CDscError }
combined_dataset/train/non-malicious/sample_17_81.ps1
sample_17_81.ps1
$ErrorActionPreference = "Stop" Set-StrictMode -Version Latest Set-Variable -Option Constant -Name CameraPnPClassName -Value "Camera" Set-Variable -Option Constant -Name ImagePnPClassName -Value "Image" Set-Variable -Option Constant -Name DeviceParametersKeyName -Value "Device Parameters" Set-Variable -Option Constant -Name EnumRegistryPath -Value "HKLM:\SYSTEM\CurrentControlSet\Enum" Set-Variable -Option Constant -Name EnableDshowRedirectionPropName -Value "EnableDshowRedirection" Set-Variable -Option Constant -Name EnableDshowBridgeBitMask -Value 1 Set-Variable -Option Constant -Name AutoDecodeMJPEGBitMask -Value 2 Set-Variable -Option Constant -Name EnableDshowRedirectionValue -Value ($EnableDshowBridgeBitMask -bOr $AutoDecodeMJPEGBitMask) # Evaluates to 3 # Dock ingest device whitelisted IDs $DockIds = @( "VID_046D&PID_0863", # Logitech SmartDock "VID_046D&PID_0876", # Logitech Flare "VID_14BE&PID_0025", # Crestron SR "VID_095D&PID_9203", # Polycom MSR "VID_17EF&PID_7219", # Lenovo Hub 500 "VID_17EF&PID_7222", # Lenovo Hub 500 2nd "VID_03F0&PID_0E67", # HP Elite Slice "VID_14BE&PID_0029", # Crestron HD-CONV-USB-200 "VID_14BE&PID_0030", # Crestron HD-CONV-USB-250 "VID_14BE&PID_0031", # Crestron HD-CONV-USB-260 "VID_14BE&PID_004D", # Crestron HD-CONV-USB-300 "VID_6993&PID_B00C", # Yealink MShare "VID_6993&PID_B00E", # Yealink MShare-raw "VID_6993&PID_B086", # Yealink MTouch Plus "VID_17EF&PID_721F", # Lenovo Hub 700 "VID_17EF&PID_722F", # Lenovo HUB 60 "VID_0B8C&PID_C000", # SMART SR LRS "VID_095D&PID_9160", # Poly MTR v2 "VID_6993&PID_B032", # Yealink Core 2 Rigel "VID_17EF&PID_7237", # Lenovo ThinkSmart Corekit "VID_03F0&PID_4384", # HP Smart "VID_17EF&PID_723A", # Lenovo ThinkSmart Video Ingest "VID_1FF7&PID_0FF6", # CVTE MAXHUB "VID_03F0&PID_09B7", # HP OBI WAN "VID_17EF&PID_F00B", # Lenovo ThinkSmart Edition Tiny "VID_17EF&PID_F008", # Lenovo ThinkSmart Gen2 "VID_17EF&PID_F009", # Lenovo ThinkSmart Gen2 2nd "VID_1FF7&PID_0F75", # CVTE XCore Kit Pro "VID_1FF7&PID_0F33", # CVTE Interactive Whiteboard "VID_0543&PID_A030" # ViewSonic MTR ) # Logging constants Import-Module (Join-Path $PSScriptRoot "Events.psm1") # Loops through the white-listed ingest IDs until it finds a PnPEntity that is a camera/imaging device and has a Device ID containing a white-listed ID function Get-IngestCameraDeviceEntity { foreach ($CameraId in $DockIds) { $PnpEntityResult = Get-WmiObject Win32_PnpEntity | where {($_.PNPClass -eq $CameraPnPClassName -or $_.PNPClass -eq $ImagePnPClassName) -and $_.DeviceId -match $CameraId} if ($PnpEntityResult -ne $null) { return $PnpEntityResult } } return $null } # If the registry entry for the ingest camera device does not exist, returns null # Otherwise, returns the path to the 'Device Parameters' key under the ingest device node, # creating that key if it does not already exist function Create-DeviceParametersRegistryPath { param ([String]$deviceId) $DevicePath = Join-Path -Path $EnumRegistryPath -ChildPath $deviceId if (-not (Test-Path($DevicePath))) { Write-EventLog @EVLCameraPathNotFound return $Null } Write-EventLog @EVLCameraPathFound $DeviceParametersPath = Join-Path -Path $DevicePath -ChildPath $DeviceParametersKeyName if (-not (Test-Path($DeviceParametersPath))) { Write-EventLog @EVLDeviceParamsKeyNotPresent New-Item -Path $DevicePath -Name $DeviceParametersKeyName } else { Write-EventLog @EVLDeviceParamsKeyAlreadyPresent } return $DeviceParametersPath } # Returns -1 if EnableDshowRedirection property does not exist, otherwise returns value of the 'EnableDshowRedirection' property under the given path Function Get-EnableDshowRedirection { Param ([String]$DeviceParamsPath) $DeviceParamsKey = Get-ItemProperty -Path $DeviceParamsPath $CameraDeviceMemberProperty = Get-Member -InputObject $DeviceParamsKey -Name $EnableDshowRedirectionPropName if ($CameraDeviceMemberProperty) { Write-Output ($DeviceParamsKey | Select -ExpandProperty $EnableDshowRedirectionPropName) } else { Write-Output -1 } } # Sets the value of the 'EnableDshowRedirection' property under the given path to 0x3 # See Dshow Bridge documentation: https://docs.microsoft.com/en-us/windows-hardware/drivers/stream/dshow-bridge-implementation-guidance-for-usb-video-class-devices Function Set-EnableDshowRedirection { Param ([String]$DeviceParamsPath) Set-ItemProperty -Path $DeviceParamsPath -Name $EnableDshowRedirectionPropName -Value $EnableDshowRedirectionValue | Out-Null } # Creates an 'EnableDshowRedirection' property under the given path and initializes its value to 0x3 # See Dshow Bridge documentation: https://docs.microsoft.com/en-us/windows-hardware/drivers/stream/dshow-bridge-implementation-guidance-for-usb-video-class-devices Function Create-EnableDshowRedirection { Param ([String]$DeviceParamsPath) New-ItemProperty -Path $DeviceParamsPath -Name $EnableDshowRedirectionPropName -Value $EnableDshowRedirectionValue | Out-Null } ### # Main section ### . (Join-Path $PSScriptRoot Elevate.ps1) Elevate $MyInvocation # Find PnpEntity for ingest camera $IngestCameraDeviceEntity = Get-IngestCameraDeviceEntity # If we cannot find an ingest camera, we exit If ($IngestCameraDeviceEntity -eq $Null) { Write-EventLog @EVLCameraNotFound Exit } # Build the path to the 'Device Parameters' key under the ingest camera device $IngestCameraDeviceParametersPath = Create-DeviceParametersRegistryPath($IngestCameraDeviceEntity.DeviceID) If (-not $IngestCameraDeviceParametersPath) { Write-EventLog @EVLDeviceParamsKeyNotCreated Exit } # Get the current value of the 'EnableDshowRedirection' property (will return -1 if property does not exist) $DshowRedirectionLookupResult = [int](Get-EnableDshowRedirection($IngestCameraDeviceParametersPath)) echo $DshowRedirectionLookupResult If ($DshowRedirectionLookupResult -eq $EnableDshowRedirectionValue) { Write-EventLog @EVLDshowCurrentlyEnabled Exit } Elseif ($DshowRedirectionLookupResult -eq $EnableDshowBridgeBitMask) { Write-EventLog @EVLNeedToAutoDecodeMJPEG Set-EnableDshowRedirection($IngestCameraDeviceParametersPath) } Elseif ($DshowRedirectionLookupResult -eq 0) { Write-EventLog @EVLDshowCurrentlyDisabled Set-EnableDshowRedirection($IngestCameraDeviceParametersPath) } Else { Write-EventLog @EVLDshowKeyNotFound Create-EnableDshowRedirection($IngestCameraDeviceParametersPath) } # After modifying/creating EnableDshowRedirection property, check again to ensure it has been enabled $SecondaryDshowRedirectionLookupResult = Get-EnableDshowRedirection($IngestCameraDeviceParametersPath) If ($SecondaryDshowRedirectionLookupResult -le 0) { Write-EventLog @EVLEnableDshowUnsuccessful } Else { Write-EventLog @EVLEnableDshowSuccessful }
combined_dataset/train/non-malicious/sample_40_91.ps1
sample_40_91.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Get-AMTHardwareAsset { <# .Synopsis Shows hardware information about the system .Description This Cmdlet returns the hardware information from clients that have Intel Active Management Technology (AMT) firmware version 3.2 or higher. .Notes Supported AMT Firmware Versions: This Cmdlet supports AMT firmware version 3.2 or higher. AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example get-AMTHardwareAsset vProClient.vprodemo.com -Credential $AMTCredential ComputerName PSParentPath Name Value ------------ ------------ ---- ----- vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version 1.16 vProClient.vprodemo.com AmtSystem::\HardwareAssets... ReleaseDate 2010/10/21 12:00:00 AM vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer American Megatrends Inc. vProClient.vprodemo.com AmtSystem::\HardwareAssets... CPUStatus CPU Enabled vProClient.vprodemo.com AmtSystem::\HardwareAssets... CurrentClockSpeed 2700 vProClient.vprodemo.com AmtSystem::\HardwareAssets... ExternalBusClockSpeed 100 vProClient.vprodemo.com AmtSystem::\HardwareAssets... Family Intel(R) Core(TM) i7 proce... vProClient.vprodemo.com AmtSystem::\HardwareAssets... MaxClockSpeed 2700 vProClient.vprodemo.com AmtSystem::\HardwareAssets... UpgradeMethod ZIF Socket vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer Intel(R) Corporation vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version Intel(R) Core(TM) i7-2620M... .example Get-AMTHardwareAsset -ComputerName vProClient.vProDemo.com -Credential $AMTCredential | Where-Object -FilterSc#ript {$_.PSPath -like "*BIOS*"} ComputerName PSParentPath Name Value ------------ ------------ ---- ----- vProClient.vprodemo.com AmtSystem::\HardwareAssets... Version 1.16 vProClient.vprodemo.com AmtSystem::\HardwareAssets... ReleaseDate 2010/10/21 12:00:00 AM vProClient.vprodemo.com AmtSystem::\HardwareAssets... Manufacturer American Megatrends Inc. Displays only the results that contain "BIOS" in their path .example Get-AMTHardwareAsset -ComputerName vProClient.vProDemo.com -Credential $AMTCredential | Where-Object -FilterSc#ript {$_.PSPath -like "*BIOS*"} | format-list ComputerName : vProClient.vprodemo.com PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS Name : Version Value : 1.16 ComputerName : vProClient.vprodemo.com PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS Name : ReleaseDate Value : 2010/10/21 12:00:00 AM ComputerName : vProClient.vprodemo.com PSParentPath : AmtSystem::\HardwareAssets\BIOS\Primary BIOS Name : Manufacturer Value : American Megatrends Inc. Displays only the results that contain "BIOS" in their path and formatted into a list. .example Get-AMTHardwareAsset -ComputerName vProClient -Credential $AMTCredential -TextOutput vProClient BIOS vProClient BIOS:Primary BIOS Version............. 1.16 ReleaseDate......... 2010/10/21 12:00:00 AM Manufacturer........ American Megatrends Inc. vProClient Cpu vProClient Cpu:CPU 0 CPUStatus........... CPU Enabled CurrentClockSpeed... 2700 ExternalBusClockSpeed 100 Family.............. Intel(R) Core(TM) i7 processor MaxClockSpeed....... 2700 UpgradeMethod....... ZIF Socket Manufacturer........ Intel(R) Corporation Version............. Intel(R) Core(TM) i7-2620M CPU @ 2.70GHz Displays results formatted as text. #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=1, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Format output to text")] [switch] $TextOutput, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) PROCESS { function Traverse([string]$path, [int]$indentdepth, [string] $header) { Get-ChildItem $path | ForEach-Object { if ($_.Type -eq "Container") { $test = $path + "\" + $_.Name if($header) { $ContainerName = $header + ":"+ $_.Name } else { $ContainerName = $_.Name } if ($TextOutput.IsPresent){ Write-Output ($Comp + " ".PadRight($indentdepth, " ") + $ContainerName) } traverse $test ($indentdepth+2) $ContainerName } else { #write-host $tempAMTPSDrive":\HardwareAssets\"$_.Name if ($TextOutput.IsPresent){ Write-output ("".PadRight($indentdepth, " ") + " " + $_.Name.PadRight(20, ".") + " " + $_.Value) } $obj = New-Object PSObject $fullName = $header + ":"+ $_.Name $obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $obj | Add-Member -MemberType NoteProperty -Name PSParentPath -Value $_.PSParentPath $obj | Add-Member -MemberType noteproperty -Name Name -value $_.Name $obj | Add-Member -MemberType noteproperty -Name Value -value $_.Value $global:Results += $obj } } } if ($Credential.username.Length -gt 0) { } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $passwd = ConvertTo-SecureString $Password -AsPlainText –Force $Credential = new-object -typename System.Management.Automation.PSCredential -argumentlist $Username,$passwd } else { $Credential = Get-Credential $Username } } $tlsstring = "" if ($TLS.IsPresent) { $tlsstring = "-TLS" } if ($Port -eq "16993") { $tlsstring = "-TLS" } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } $global:Results = @() $rand = New-Object System.Random ForEach ($Comp in $ComputerName) { $tempAMTPSDrive = "AMTDrive"+$rand.next() $CannotConnect = $False if ($Credential.username.Length -gt 0){ $expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp -Credential `$Credential $tlsstring -ea Stop" } else { $expression = "New-PSDrive -Name $tempAMTPSDrive -PSProvider AmtSystem -Root `"\`" -ComputerName `$Comp $tlsstring -ea Stop" } try{ $null = invoke-expression $expression } catch{ if($_.FullyQualifiedErrorId -eq "WsmanUnauthorizedException,Microsoft.PowerShell.Commands.NewPSDriveCommand") { Write-Output "Unauthorized to connect to $Comp : Incorrect username or password" } if($_.FullyQualifiedErrorId -eq "NewDriveProviderException,Microsoft.PowerShell.Commands.NewPSDriveCommand") { Write-Output "Could not connect to host $Comp : Check Name or IP address" } $CannotConnect = $True } if($CannotConnect -ne $true) { $temp = $tempAMTPSDrive+":\HardwareAssets" traverse $temp 0 if (!$TextOutput.IsPresent){ Write-Output $Results } Remove-PSDrive $tempAMTPSDrive } } } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAopOM5VZAj0GjQ # mX4p/EyuuqJzCznlls1BI9t6SdlHvaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgDDFuUvUNyu612Ftr # 2ttoh0OZ/FeW60Mou60GMo96INwwDQYJKoZIhvcNAQEBBQAEggGAtOm5hTj2cSiH # jhhekbb6EBHqMtjyMpqnZM1yhGt2OXoSXwrK//wZUSocYZlTWdHS3aAS9X8Fv4qN # gXhbppST5wI/4XLl9ohJt8lRUH4WH3HdGQrXeVigJIxl1zayd1sms5yWSLrfYWbM # B9JxGOA45PCr8vWfM4nio2SnQwUk2TPxtV2JC3EeVjsh++2QjjyveweVJ+u6NJmh # K+J0WP6iRLrNwOXHmlk9vZIYP0XNv+V3xF7eqvM3uQnJbu4hWtTIJcXsK/tsef2x # Vzu2vX3PBAAns3jJgjlNzW3ck2OCj4EjBBaQ1rpa9rQ3zJAgXQ41jhK7J3fqLQW2 # uLbPnrwo9lK3FNFDKEPLj+0+lhvr5PLWysl8EpeLjEGxVSRBY11iBJu4AWKw5Jfq # fWVHStFqnmHP++YtWGmqNqGnj1r4dwqYH3/5u27zQ3jiBaN6QEe/oVItyFtLmhK7 # FUaABA+YP+b+t+77fKaA2v5ESl3E0nvevrsprqrJLtXTJgaTRgM6oYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIGwwxp4cx1JNqUvI0uYckkDgsNsxRQNiIadd # iszF2x+dAhUApfHlUFYtiXTPp+oxpw/QUk634WEYDzIwMjEwNzE5MTYyOTM0WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMDcxOTE2MjkzNFowPwYJKoZIhvcNAQkEMTIEMCnREMqEhTdq # nfhy/rhEVL3HTMc5YvO1WQpzE8tmY8ysYGvLhyMqEZbHGG1caM9XOjCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgAfO2mZxyl6VkOQv3qMacolwmuZyLEiYEGCnjlOdA3PS5S5wPfI # XvxtxjLmYCQzdn4kNcVC1mi0CKWKkWnhrtaBMw/awcJNtnRyh5haafI3YzF7wLgP # Vev0c+lsyWexGt6YfQYSWMVRVOMmy05jT39u/hr0iqdVF4GiKjwI3YckShFt/VuT # O+Dhx4OLzdu4N0WeiD9+aH4d2m1PJPBaZWam9+8+JEFU0LLnQDTDTucE6hrgCH68 # sTm/F0KFIVO4Hcxxd52wKultsRqtjMi9iPWk18/LABFCojoSymFxLDKWdzVi6LIP # EbIBR4QIcw3BSPXAX7ojdfBTRjLC7RCA50RruCAPp7IXnbCFDtnpVM84dUSTbASS # e4rtzcUIsvzWgpbwWo4ZPdOR0VCtR4R9q6XD0cLHu271fzDN1KkD04WAHHSFY0lP # wZc8SCT0aOat+raWp+sdT37CUPWEdohNj+mfjRfhdUSZ0DvgaQTsJolwPPL3B7Qb # +y+dZH+G7QmcvTVn1Ah749A2wXNG4MlZIEgI8Ad+6OR7Xj/QfkkgfQaHHqw+y6qB # la7mBUBJBLWzMKmLgWySFUeIC53ekR8Ho4SPSoRTjfb5OV2S4b0NOrjp3kyQXZoL # 3DvyWwrjfdwlEKUofmAtrUxS6oOUdhEEhyWu+6gC4cY0Mq1dDZRXMW50XA== # SIG # End signature block
combined_dataset/train/non-malicious/sample_22_21.ps1
sample_22_21.ps1
# # Module manifest for module 'OCI.PSModules.Accessgovernancecp' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Accessgovernancecp.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c71dab6b-b390-499f-9d71-506da8082df7' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Accessgovernancecp Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Accessgovernancecp.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAccessgovernancecpGovernanceInstance', 'Get-OCIAccessgovernancecpGovernanceInstanceConfiguration', 'Get-OCIAccessgovernancecpGovernanceInstancesList', 'Move-OCIAccessgovernancecpGovernanceInstanceCompartment', 'New-OCIAccessgovernancecpGovernanceInstance', 'Remove-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstance', 'Update-OCIAccessgovernancecpGovernanceInstanceConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Accessgovernancecp' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2914.ps1
2914.ps1
Framework "1.1.0" task default -depends MsBuild task MsBuild { if ( $IsMacOS -OR $IsLinux ) { $output = &dotnet build -version -nologo 2>&1 Assert ($output -NotLike "15.1") '$output should contain 15.1' } }
combined_dataset/train/non-malicious/3872.ps1
3872.ps1
function Test-GetWebApp { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $wname2 = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "Shared" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier $actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -Name $wname Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname2 -Location $location -AppServicePlan $whpName Assert-AreEqual $wname2 $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp Assert-True { $result.Count -ge 2 } $result = Get-AzWebApp -Location $location Assert-True { $result.Count -ge 2 } $result = Get-AzWebApp -ResourceGroupName $rgname Assert-AreEqual 2 $result.Count $result = Get-AzWebApp -AppServicePlan $serverFarm Assert-True { $result.Count -ge 2 } } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzWebApp -ResourceGroupName $rgname -Name $wname2 -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-StartStopRestartWebApp { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "Shared" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier $webApp = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName Assert-AreEqual $wname $webApp.Name Assert-AreEqual $serverFarm.Id $webApp.ServerFarmId $webApp = $webApp | Stop-AzWebApp Assert-AreEqual "Stopped" $webApp.State $ping = PingWebApp $webApp $webApp = $webApp | Start-AzWebApp Assert-AreEqual "Running" $webApp.State $ping = PingWebApp $webApp $webApp = Stop-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual "Stopped" $webApp.State $ping = PingWebApp $webApp $webApp = Start-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual "Running" $webApp.State $ping = PingWebApp $webApp $webApp = Restart-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual "Running" $webApp.State $ping = PingWebApp $webApp $webApp = $webApp | Restart-AzWebApp Assert-AreEqual "Running" $webApp.State $ping = PingWebApp $webApp } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CloneNewWebApp { $rgname = Get-ResourceGroupName $appname = Get-WebsiteName $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Premium" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $destPlanName = Get-WebHostPlanName $destLocation = Get-SecondaryLocation $destAppName = Get-WebsiteName try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appname -Location $location -AppServicePlan $planName Assert-AreEqual $appname $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId $webapp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname Assert-AreEqual $appname $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId $serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Location $destLocation -Tier $tier $webapp2 = New-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Location $destLocation -AppServicePlan $destPlanName -SourceWebApp $webapp Assert-AreEqual $destAppName $webapp2.Name $webapp2 = Get-AzWebApp -ResourceGroupName $rgname -Name $destAppName Assert-AreEqual $destAppName $webapp2.Name } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $appname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force Remove-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CloneNewWebAppAndDeploymentSlots { $rgname = Get-ResourceGroupName $appname = Get-WebsiteName $slot1name = "staging" $slot2name = "testing" $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Premium" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $destPlanName = Get-WebHostPlanName $destLocation = Get-SecondaryLocation $destAppName = Get-WebsiteName try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appname -Location $location -AppServicePlan $planName Assert-AreEqual $appname $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId $webapp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname Assert-AreEqual $appname $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId $slot1 = New-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot1name -AppServicePlan $planName $appWithSlotName = "$appname/$slot1name" Assert-AreEqual $appWithSlotName $slot1.Name Assert-AreEqual $serverFarm.Id $slot1.ServerFarmId $slot2 = New-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot2name -AppServicePlan $planName $appWithSlotName = "$appname/$slot2name" Assert-AreEqual $appWithSlotName $slot2.Name Assert-AreEqual $serverFarm.Id $slot2.ServerFarmId $serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Location $destLocation -Tier $tier $webapp2 = New-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Location $destLocation -AppServicePlan $destPlanName -SourceWebApp $webapp -IncludeSourceWebAppSlots Assert-AreEqual $destAppName $webapp2.Name $webapp2 = Get-AzWebApp -ResourceGroupName $rgname -Name $destAppName Assert-AreEqual $destAppName $webapp2.Name $slot1 = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot1name $appWithSlotName = "$destAppName/$slot1name" Assert-AreEqual $appWithSlotName $slot1.Name Assert-AreEqual $serverFarm2.Id $slot1.ServerFarmId $slot2 = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot2name $appWithSlotName = "$destAppName/$slot2name" Assert-AreEqual $appWithSlotName $slot2.Name Assert-AreEqual $serverFarm2.Id $slot2.ServerFarmId } finally { Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot1name -Force Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot2name -Force Remove-AzWebApp -ResourceGroupName $rgname -Name $appname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot1name -Force Remove-AzWebAppSlot -ResourceGroupName $rgname -Name $destAppName -Slot $slot2name -Force Remove-AzWebApp -ResourceGroupName $rgname -Name $destAppName -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destPlanName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CloneNewWebAppWithTrafficManager { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "Premium" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $destAppServicePlanName = Get-WebHostPlanName $destLocation = Get-SecondaryLocation $destWebAppName = Get-WebsiteName $profileName = Get-TrafficManagerProfileName try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier $actual = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $destAppServicePlanName -Location $destLocation -Tier $tier $actual = New-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName -Location $destLocation -AppServicePlan $destAppServicePlanName -SourceWebApp $result -TrafficManagerProfileName $profileName Assert-AreEqual $destWebAppName $actual.Name $result = Get-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName Assert-AreEqual $destWebAppName $result.Name } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzWebApp -ResourceGroupName $rgname -Name $destWebAppName -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $destAppServicePlanName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CreateNewWebApp { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "Shared" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -AsJob $job | Wait-Job $actual = $job | Receive-Job Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CreateNewWebAppHyperV { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "PremiumContainer" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $containerImageName = "pstestacr.azurecr.io/tests/iis:latest" $containerRegistryUrl = "https://pstestacr.azurecr.io" $containerRegistryUser = "pstestacr" $pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv" $containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force $dockerPrefix = "DOCKER|" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob $job | Wait-Job $actual = $job | Receive-Job Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId Assert-AreEqual $true $result.IsXenon Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion $appSettings = @{ "DOCKER_REGISTRY_SERVER_URL" = $containerRegistryUrl; "DOCKER_REGISTRY_SERVER_USERNAME" = $containerRegistryUser; "DOCKER_REGISTRY_SERVER_PASSWORD" = $pass;} foreach($nvp in $webApp.SiteConfig.AppSettings) { Assert-True { $appSettings.Keys -contains $nvp.Name } Assert-True { $appSettings[$nvp.Name] -match $nvp.Value } } } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-EnableContainerContinuousDeploymentAndGetUrl { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "PremiumContainer" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $containerImageName = "pstestacr.azurecr.io/tests/iis:latest" $containerRegistryUrl = "https://pstestacr.azurecr.io" $containerRegistryUser = "pstestacr" $pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv" $containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force $dockerPrefix = "DOCKER|" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -EnableContainerContinuousDeployment -AsJob $job | Wait-Job $actual = $job | Receive-Job Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId Assert-AreEqual $true $result.IsXenon Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion $appSettings = @{ "DOCKER_REGISTRY_SERVER_URL" = $containerRegistryUrl; "DOCKER_REGISTRY_SERVER_USERNAME" = $containerRegistryUser; "DOCKER_REGISTRY_SERVER_PASSWORD" = $pass; "DOCKER_ENABLE_CI" = "true"} foreach($nvp in $webApp.SiteConfig.AppSettings) { Assert-True { $appSettings.Keys -contains $nvp.Name } Assert-True { $appSettings[$nvp.Name] -match $nvp.Value } } $ci_url = Get-AzWebAppContainerContinuousDeploymentUrl -ResourceGroupName $rgname -Name $wname $expression = "https://" + $wname + ":(.*)@" + $wname + ".scm.azurewebsites.net/docker/hook" $sanitizedCiUrl = { $ci_url -replace '$','' } $matchResult = { $sanitizedCiUrl -match $expression } Assert-AreEqual $true $matchResult } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-WindowsContainerCanIssueWebAppPSSession { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "PremiumContainer" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $containerImageName = "mcr.microsoft.com/azure-app-service/samples/aspnethelloworld:latest" $containerRegistryUrl = "https://mcr.microsoft.com" $containerRegistryUser = "testregistry" $pass = "7Dxo9p79Ins2K3ZU" $containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force $dockerPrefix = "DOCKER|" try { Write-Debug "Creating app service plan..." New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Large -HyperV Write-Debug "App service plan created" Write-Debug "Creating web app plan..." $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob $job | Wait-Job $actual = $job | Receive-Job Write-Debug "Webapp created" Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Write-Debug "Webapp retrieved" Write-Debug "Validating web app properties..." Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId Assert-AreEqual $true $result.IsXenon Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion $actualAppSettings = @{} foreach ($kvp in $result.SiteConfig.AppSettings) { $actualAppSettings[$kvp.Name] = $kvp.Value } $expectedAppSettings = @{} $expectedAppSettings["DOCKER_REGISTRY_SERVER_URL"] = $containerRegistryUrl; $expectedAppSettings["DOCKER_REGISTRY_SERVER_USERNAME"] = $containerRegistryUser; $expectedAppSettings["DOCKER_REGISTRY_SERVER_PASSWORD"] = $pass; foreach ($key in $expectedAppSettings.Keys) { Assert-True {$actualAppSettings.Keys -contains $key} Assert-AreEqual $actualAppSettings[$key] $expectedAppSettings[$key] } Write-Debug "Enabling Win-RM..." $actualAppSettings["CONTAINER_WINRM_ENABLED"] = "1" $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wName -AppSettings $actualAppSettings New-AzWebAppContainerPSSession -ResourceGroupName $rgname -Name $wname -WarningVariable wv -WarningAction SilentlyContinue -ErrorAction SilentlyContinue -Force if ((Get-WebsitesTestMode) -ne 'Playback') { $message = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The connection to the specified remote host was refused." $resultError = $Error[0] -like "*$($message)*" Write-Debug "Expected Message: $message" } else { $messageDNS = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The WinRM client cannot process the request because the server name cannot be resolved" $messageUnavailable = "Connecting to remote server $wname.azurewebsites.net failed with the following error message : The WinRM client sent a request to an HTTP server and got a response saying the requested HTTP URL was not available." $messagePsVersionNotSupported = "Remote Powershell sessions into Windows Containers on App Service from this version of PowerShell is not supported."; $messageWSMANNotConfigured = "Your current WSMAN Trusted Hosts settings will prevent you from connecting to your Container Web App"; $resultError = ($Error[0] -like "*$($messageDNS)*") -or ($Error[0] -like "*$($messageUnavailable)*") -or ($Error[0] -like "*$($messageWSMANNotConfigured)*") -or ($Error[0] -like "*$($messagePsVersionNotSupported)*") $resultWarning = ($wv[0] -like "*$($messageWSMANNotConfigured)*") Write-Debug "Expected error message 1: $messageDNS" Write-Debug "Expected error message 2: $messageUnavailable" Write-Debug "Expected error message 3: $messagePsVersionNotSupported" Write-Debug "Expected Warning message 1: $messageWSMANNotConfigured" } Write-Debug "Error: $Error[0]" Write-Debug "Warnings: $wv" Write-Debug "Printing PsVersion" foreach ($key in $PsVersionTable.Keys) { Write-Debug "$key" foreach($v in $PsVersionTable[$key]) { Write-Debug " $v" } } If(!$resultError -or !$resultWarning) { Write-Output "expected error $($message), actual error $($Error[0])" Write-Output "Warnings: $wv" } Assert-True {$resultError -or $resultWarning} } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-WindowsContainerWebAppPSSessionOpened { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "PremiumContainer" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $containerImageName = "mcr.microsoft.com/azure-app-service/samples/aspnethelloworld:latest" $containerRegistryUrl = "https://mcr.microsoft.com" $containerRegistryUser = "testregistry" $pass = "7Dxo9p79Ins2K3ZU" $containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force $dockerPrefix = "DOCKER|" try { Write-Debug "Creating app service plan..." New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Large -HyperV Write-Debug "App service plan created" Write-Debug "Creating web app plan..." $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob $job | Wait-Job $actual = $job | Receive-Job Write-Debug "Webapp created" Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Write-Debug "Webapp retrieved" Write-Debug "Validating web app properties..." Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId Assert-AreEqual $true $result.IsXenon Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion $actualAppSettings = @{} foreach ($kvp in $result.SiteConfig.AppSettings) { $actualAppSettings[$kvp.Name] = $kvp.Value } $expectedAppSettings = @{} $expectedAppSettings["DOCKER_REGISTRY_SERVER_URL"] = $containerRegistryUrl; $expectedAppSettings["DOCKER_REGISTRY_SERVER_USERNAME"] = $containerRegistryUser; $expectedAppSettings["DOCKER_REGISTRY_SERVER_PASSWORD"] = $pass; foreach ($key in $expectedAppSettings.Keys) { Assert-True {$actualAppSettings.Keys -contains $key} Assert-AreEqual $actualAppSettings[$key] $expectedAppSettings[$key] } Write-Debug "Enabling Win-RM..." $actualAppSettings["CONTAINER_WINRM_ENABLED"] = "1" $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wName -AppSettings $actualAppSettings $status = PingWebApp($webApp) Write-Debug "Just pinged the web app" Write-Debug "Status: $status" $count=0 while (($status -like "ServiceUnavailable") -and $count -le 15) { Wait-Seconds 60 $status = PingWebApp($webApp) Write-Debug $count $count++ } Assert-AreEqual $status "200" $ps_session = New-AzWebAppContainerPSSession -ResourceGroupName $rgname -Name $wname -Force Write-Debug "After PSSession" Assert-AreEqual $ps_session.ComputerName $wname".azurewebsites.net" Assert-AreEqual $ps_session.State "Opened" } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-SetAzureStorageWebAppHyperV { $rgname = Get-ResourceGroupName $wname = Get-WebsiteName $location = Get-WebLocation $whpName = Get-WebHostPlanName $tier = "PremiumContainer" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $containerImageName = "pstestacr.azurecr.io/tests/iis:latest" $containerRegistryUrl = "https://pstestacr.azurecr.io" $containerRegistryUser = "pstestacr" $pass = "cYK4qnENExflnnOkBN7P+gkmBG0sqgIv" $containerRegistryPassword = ConvertTo-SecureString -String $pass -AsPlainText -Force $dockerPrefix = "DOCKER|" $azureStorageAccountCustomId1 = "mystorageaccount" $azureStorageAccountType1 = "AzureFiles" $azureStorageAccountName1 = "myaccountname.file.core.windows.net" $azureStorageAccountShareName1 = "myremoteshare" $azureStorageAccountAccessKey1 = "AnAccessKey" $azureStorageAccountMountPath1 = "C:\mymountpath" $azureStorageAccountCustomId2 = "mystorageaccount2" $azureStorageAccountType2 = "AzureFiles" $azureStorageAccountName2 = "myaccountname2.file.core.windows.net" $azureStorageAccountShareName2 = "myremoteshare2" $azureStorageAccountAccessKey2 = "AnAccessKey2" $azureStorageAccountMountPath2 = "C:\mymountpath2" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Location $location -Tier $tier -WorkerSize Small -HyperV $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -ContainerImageName $containerImageName -ContainerRegistryUrl $containerRegistryUrl -ContainerRegistryUser $containerRegistryUser -ContainerRegistryPassword $containerRegistryPassword -AsJob $job | Wait-Job $actual = $job | Receive-Job Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId Assert-AreEqual $true $result.IsXenon Assert-AreEqual ($dockerPrefix + $containerImageName) $result.SiteConfig.WindowsFxVersion $testStorageAccount1 = New-AzWebAppAzureStoragePath -Name $azureStorageAccountCustomId1 -Type $azureStorageAccountType1 -AccountName $azureStorageAccountName1 -ShareName $azureStorageAccountShareName1 -AccessKey $azureStorageAccountAccessKey1 -MountPath $azureStorageAccountMountPath1 $testStorageAccount2 = New-AzWebAppAzureStoragePath -Name $azureStorageAccountCustomId2 -Type $azureStorageAccountType2 -AccountName $azureStorageAccountName2 -ShareName $azureStorageAccountShareName2 -AccessKey $azureStorageAccountAccessKey2 -MountPath $azureStorageAccountMountPath2 Write-Debug "Created the new storage account paths" Write-Debug $testStorageAccount1.Name Write-Debug $testStorageAccount2.Name $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $wname -AzureStoragePath $testStorageAccount1, $testStorageAccount2 Write-Debug "Set the new storage account paths" $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname $azureStorageAccounts = $result.AzureStoragePath Write-Debug $azureStorageAccounts[0].Name Assert-AreEqual $azureStorageAccounts[0].Name $azureStorageAccountCustomId1 Write-Debug $azureStorageAccounts[0].Type Assert-AreEqual $azureStorageAccounts[0].Type $azureStorageAccountType1 Write-Debug $azureStorageAccounts[0].AccountName Assert-AreEqual $azureStorageAccounts[0].AccountName $azureStorageAccountName1 Write-Debug $azureStorageAccounts[0].ShareName Assert-AreEqual $azureStorageAccounts[0].ShareName $azureStorageAccountShareName1 Write-Debug $azureStorageAccounts[0].AccessKey Assert-AreEqual $azureStorageAccounts[0].AccessKey $azureStorageAccountAccessKey1 Write-Debug $azureStorageAccounts[0].MountPath Assert-AreEqual $azureStorageAccounts[0].MountPath $azureStorageAccountMountPath1 Write-Debug $azureStorageAccounts[1].Name Assert-AreEqual $azureStorageAccounts[1].Name $azureStorageAccountCustomId2 Write-Debug $azureStorageAccounts[1].Type Assert-AreEqual $azureStorageAccounts[1].Type $azureStorageAccountType2 Write-Debug $azureStorageAccounts[1].AccountName Assert-AreEqual $azureStorageAccounts[1].AccountName $azureStorageAccountName2 Write-Debug $azureStorageAccounts[1].ShareName Assert-AreEqual $azureStorageAccounts[1].ShareName $azureStorageAccountShareName2 Write-Debug $azureStorageAccounts[1].AccessKey Assert-AreEqual $azureStorageAccounts[1].AccessKey $azureStorageAccountAccessKey2 Write-Debug $azureStorageAccounts[1].MountPath Assert-AreEqual $azureStorageAccounts[1].MountPath $azureStorageAccountMountPath2 } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-CreateNewWebAppOnAse { $rgname = "mnresourcegroup" $wname = Get-WebsiteName $location = "South Central US" $whpName = "powershellasp" $aseName = "mnASE" $resourceType = "Microsoft.Web/sites" try { $serverFarm = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $whpName $job = New-AzWebApp -ResourceGroupName $rgname -Name $wname -Location $location -AppServicePlan $whpName -AseName $aseName -AsJob $job | Wait-Job $actual = $job | Receive-Job Assert-AreEqual $wname $actual.Name Assert-AreEqual $serverFarm.Id $actual.ServerFarmId $result = Get-AzWebApp -ResourceGroupName $rgname -Name $wname Assert-AreEqual $wname $result.Name Assert-AreEqual $serverFarm.Id $result.ServerFarmId } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $wname -Force } } function Test-SetWebApp { $rgname = Get-ResourceGroupName $webAppName = Get-WebsiteName $location = Get-WebLocation $appServicePlanName1 = Get-WebHostPlanName $appServicePlanName2 = Get-WebHostPlanName $tier1 = "Shared" $tier2 = "Standard" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $capacity = 2 try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm1 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName1 -Location $location -Tier $tier1 $serverFarm2 = New-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName2 -Location $location -Tier $tier2 $webApp = New-AzWebApp -ResourceGroupName $rgname -Name $webAppName -Location $location -AppServicePlan $appServicePlanName1 Write-Debug "DEBUG: Created the Web App" Assert-AreEqual $webAppName $webApp.Name Assert-AreEqual $serverFarm1.Id $webApp.ServerFarmId Assert-Null $webApp.Identity Assert-NotNull $webApp.SiteConfig.phpVersion $job = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppServicePlan $appServicePlanName2 -HttpsOnly $true -AsJob $job | Wait-Job $webApp = $job | Receive-Job Write-Debug "DEBUG: Changed service plan" Assert-AreEqual $webAppName $webApp.Name Assert-AreEqual $serverFarm2.Id $webApp.ServerFarmId Assert-AreEqual $true $webApp.HttpsOnly $webapp.SiteConfig.HttpLoggingEnabled = $true $webapp.SiteConfig.RequestTracingEnabled = $true $webApp = $webApp | Set-AzWebApp Write-Debug "DEBUG: Changed site properties" Assert-AreEqual $webAppName $webApp.Name Assert-AreEqual $serverFarm2.Id $webApp.ServerFarmId Assert-AreEqual $true $webApp.SiteConfig.HttpLoggingEnabled Assert-AreEqual $true $webApp.SiteConfig.RequestTracingEnabled $appSettings = @{ "setting1" = "valueA"; "setting2" = "valueB"} $connectionStrings = @{ connstring1 = @{ Type="MySql"; Value="string value 1"}; connstring2 = @{ Type = "SQLAzure"; Value="string value 2"}} $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppSettings $appSettings -AssignIdentity $true Assert-NotNull $webApp.Identity Assert-AreEqual ($appSettings.Keys.Count) $webApp.SiteConfig.AppSettings.Count Assert-NotNull $webApp.Identity $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $webAppName -AppSettings $appSettings -ConnectionStrings $connectionStrings -NumberofWorkers $capacity -PhpVersion "off" Assert-AreEqual $webAppName $webApp.Name foreach($nvp in $webApp.SiteConfig.AppSettings) { Assert-True { $appSettings.Keys -contains $nvp.Name } Assert-True { $appSettings[$nvp.Name] -match $nvp.Value } } Assert-AreEqual $connectionStrings.Keys.Count $webApp.SiteConfig.ConnectionStrings.Count foreach($connStringInfo in $webApp.SiteConfig.ConnectionStrings) { Assert-True { $connectionStrings.Keys -contains $connStringInfo.Name } } Assert-AreEqual $capacity $webApp.SiteConfig.NumberOfWorkers Assert-AreEqual "" $webApp.SiteConfig.PhpVersion } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $webAppName -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName1 -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $appServicePlanName2 -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-RemoveWebApp { $rgname = Get-ResourceGroupName $appName = Get-WebsiteName $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Shared" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName Assert-AreEqual $appName $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId $webapp | Remove-AzWebApp -Force -AsJob | Wait-Job $webappNames = (Get-AzWebApp -ResourceGroupName $rgname) | Select -Property Name Assert-False { $webappNames -contains $appName } } finally { Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-WebAppPublishingProfile { $rgname = Get-ResourceGroupName $appName = Get-WebsiteName $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Shared" $apiversion = "2015-08-01" $resourceType = "Microsoft.Web/sites" $profileFileName = "profile.xml" try { New-AzResourceGroup -Name $rgname -Location $location $serverFarm = New-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName Assert-AreEqual $appName $webapp.Name Assert-AreEqual $serverFarm.Id $webapp.ServerFarmId [xml]$profile = Get-AzWebAppPublishingProfile -ResourceGroupName $rgname -Name $appName -OutputFile $profileFileName $msDeployProfile = $profile.publishData.publishProfile | ? { $_.publishMethod -eq 'MSDeploy' } | Select -First 1 $pass = $msDeployProfile.userPWD Assert-True { $msDeployProfile.msdeploySite -eq $appName } $newPass = $webapp | Reset-AzWebAppPublishingProfile Assert-False { $pass -eq $newPass } [xml]$profile = $webapp | Get-AzWebAppPublishingProfile -OutputFile $profileFileName -Format FileZilla3 $fileZillaProfile = $profile.FileZilla3.Servers.Server Assert-True { $fileZillaProfile.Name -eq $appName } [xml]$profile = Get-AzWebAppPublishingProfile -ResourceGroupName $rgname -Name $appName Assert-NotNull $profile } finally { Remove-AzWebApp -ResourceGroupName $rgname -Name $appName -Force Remove-AzAppServicePlan -ResourceGroupName $rgname -Name $planName -Force Remove-AzResourceGroup -Name $rgname -Force } } function Test-PublishAzureWebAppFromZip { $rgname = Get-ResourceGroupName $appName = Get-WebsiteName $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Shared" try { New-AzureRmResourceGroup -Name $rgname -Location $location $serverFarm = New-AzureRmAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzureRmWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName $zipPath = Join-Path $ResourcesPath "nodejs-sample.zip" $publishedApp = Publish-AzWebApp -ResourceGroupName $rgname -Name $appName -ArchivePath $zipPath -Force Assert-NotNull $publishedApp } finally { Remove-AzureRmResourceGroup -Name $rgname -Force } } function Test-PublishAzureWebAppFromWar { $rgname = Get-ResourceGroupName $appName = Get-WebsiteName $location = Get-WebLocation $planName = Get-WebHostPlanName $tier = "Shared" try { New-AzureRmResourceGroup -Name $rgname -Location $location $serverFarm = New-AzureRmAppServicePlan -ResourceGroupName $rgname -Name $planName -Location $location -Tier $tier $webapp = New-AzureRmWebApp -ResourceGroupName $rgname -Name $appName -Location $location -AppServicePlan $planName $warPath = Join-Path $ResourcesPath "HelloJava.war" $publishedApp = Publish-AzWebApp -ResourceGroupName $rgname -Name $appName -ArchivePath $warPath -Force Assert-NotNull $publishedApp } finally { Remove-AzureRmResourceGroup -Name $rgname -Force } } function Test-CreateNewWebAppSimple { $appName = Get-WebsiteName try { $webapp = New-AzWebApp -Name $appName Assert-AreEqual $appName $webapp.Name } finally { Remove-AzResourceGroup $appName } } function Test-TagsNotRemovedBySetWebApp { $rgname = "lketmtestantps10" $appname = "tagstestantps10" $slot = "testslot" $aspName = "tagstestAspantps10" $aspToMove = "tagstestAsp2antps10" $getApp = Get-AzWebApp -ResourceGroupName $rgname -Name $appname $getSlot = Get-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot Assert-notNull $getApp.Tags Assert-notNull $getSlot.Tags $webApp = Set-AzWebApp -ResourceGroupName $rgname -Name $appname -HttpsOnly $true $slot = Set-AzWebAppSlot -ResourceGroupName $rgname -Name $appname -Slot $slot -HttpsOnly $true Assert-AreEqual $true $webApp.HttpsOnly Assert-AreEqual $true $slot.HttpsOnly Assert-notNull $webApp.Tags Assert-notNull $slot.Tags $webapp = Set-AzWebApp -WebApp $getApp Assert-notNull $webApp.Tags $webapp = Set-AzWebApp -Name $appname -ResourceGroupName $rgname -AppServicePlan $aspToMove $asp = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $aspToMove Assert-AreEqual $webApp.ServerFarmId $asp.id Assert-notNull $webApp.Tags $webApp = Set-AzWebApp -Name $appname -ResourceGroupName $rgname -AppServicePlan $aspName $asp = Get-AzAppServicePlan -ResourceGroupName $rgname -Name $aspName Assert-AreEqual $webApp.ServerFarmId $asp.id Assert-notNull $webApp.Tags }
combined_dataset/train/non-malicious/TabExpansion for V2CTP_4.ps1
TabExpansion for V2CTP_4.ps1
## Tab-Completion ################# ## For V2CTP3. ## This won't work on V1 and V2CTP and V2CTP2. ## Please dot souce this script file. ## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list. ## ## What this can do is: ## ## [datetime]::n<tab> ## [datetime]::now.d<tab> ## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell" ## $c = [ref]$a; $d = [ref]$b,$c ## $d[0].V<tab>[0][0].Get<tab> ## $d[1].V<tab>[0,0].tos<tab> ## $function:a<tab> ## $env:a<tab> ## [System.Type].a<tab> ## [datetime].Assembly.a<tab> ## ).a<tab> # shows System.Type properties and methods... ## #native command name expansion ## fsu<tab> ## #command option name expansion (for fsutil ipconfig net powershell only) ## fsutil <tab> ## ipconfig <tab> ## net <tab> ## powershell <tab> ## #TypeNames and Type accelerators expansion ## [Dec<tab> ## [system.Man<tab>.auto<tab>.p<tab> ## New-Object -TypeName IO.Dir<tab> ## New-Object System.win<tab>.for<tab>.bu<tab> ## #ProgIDs expansion ## New-Object -Com shel<tab> ## #Enum option expansion ## Set-ExecutionPolicy <tab> ## Set-ExecutionPolicy All<tab> ## Set-ExcusionPolisy -ex <tab> ## Get-TraceSource Inte<tab> ## iex -Errora <tab> -wa Sil<tab> ## #WmiClasses expansion ## Get-WmiObject -class Win32_<tab> ## gwmi __Instance<tab> ## #Encoding expansion ## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab> ## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab> ## #PSProvider name expansion ## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab> ## Get-PSProvider <tab> ## pwd -psp al<tab> ## #PSDrive name expansion ## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab> ## Get-PSDrive <tab> ## pwd -psd <tab> ## #PSSnapin name expansion ## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab> ## Get-Command -PSSnapin <tab> ## Remove-PSSnapin <tab> ## Get-PSSnapin M<tab> ## #Eventlog name and expansion ## Get-Eventlog -Log <tab> ## Get-Eventlog w<tab> ## #Eventlog's entrytype expansion ## Get-EventLog -EntryType <tab> ## Get-EventLog -EntryType Er<tab> ## Get-EventLog -Ent <tab> ## #Service name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab> ## New-Service -DependsOn <tab> ## New-Service -Dep e<tab> ## Get-Service -n <tab> ## Get-Service <tab>,a<tab>,p<tab> ## gsv <tab> ## #Service display name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab> ## Get-Service -Dis <tab> ## gsv -Dis <tab>,w<tab>,b<tab> ## #Cmdlet and Topic name expansion (this also support default help function and man alias) ## Get-Help [-Name] about_<tab> ## Get-Help <tab> ## #Category name expansion (this also support default help function and man alias) ## Get-Help -Category c<tab>,<tab> ## #Command name expansion ## Get-Command [-Name] <tab> ## Get-Command -Name <tab> ## gcm a<tab>,<tab> ## #Scope expansion ## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias ## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab> ## Clear-Variable -Scope G<tab> ## Set-Alias -s <tab> ## #Process name expansion ## [Get-Process | Stop-Process] [-Name] <tab> ## Stop-Process -Name <tab> ## Stop-Process -N pow<tab> ## Get-Process <tab> ## ps power<tab> ## #Trace sources expansion ## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab> ## #Trace -ListenerOption expansion ## [Set-TraceSource | Trace-Command] -ListenerOption <tab> ## Set-TraceSource -Lis <tab>,n<tab> ## #Trace -Option expansion ## [Set-TraceSource | Trace-Command] -Option <tab> ## Set-TraceSource -op <tab>,con<tab> ## #ItemType expansion ## New-Item -Item <tab> ## ni -ItemType d<tab> ## #ErrorAction and WarningAction option expansion ## CMDLET [-ErrorAction | -WarningAction] <tab> ## CMDLET -Errora s<tab> ## CMDLET -ea con<tab> ## CMDLET -wa <tab> ## #Continuous expansion with comma when parameter can treat multiple option ## # if there are spaces, occur display bug in the line ## # if strings contains '$' or '-', not work ## Get-Command -CommandType <tab>,<tab><tab>,cm<tab> ## pwd -psp <tab>,f<tab>,va<tab> ## Get-EventLog -EntryType <tab>,i<tab>,s<tab> ## #Enum expansion in method call expression ## # this needs one or more spaces after left parenthesis or comma ## $str = "day night" ## $str.Split( " ",<space>rem<tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR ## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success ## $type = [System.Type] ## $type.GetMembers(<space>Def<tab> ## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab> ## # this can do continuous enum expansion with comma and no spaces ## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>" ## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab> ## #Better '$_.' expansion when cmdlet output objects or method return objects ## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> } ## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB } ## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> } ## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" } ## $data = Get-Process ## $data[2,4,5] | % { $_.<tab> ## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type ## #Property name expansion by -Property parameter ## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object | ## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab> ## Select-Object -ExcludeProperty <tab> ## Select-Object -ExpandProperty <tab> ## gcm Get-Acl|select -exp Par<tab> ## ps |group na<tab> ## ls | ft A<tab>,M<tab>,L<tab> ## #Hashtable key expansion in the variable name and '.<tab>' ## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} } ## $hash.pow<tab>.pro<tab> ## #Parameter expansion for function, filter and script ## man -f<tab> ## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1 ## .\\foobar.ps1 -<tab> -b<tab> ## #Enum expansion for function, filter and scripts ## # this can do continuous enum expansion with comma and no spaces ## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab> ## #Enum expansion for assignment expression ## #needs space(s) after '=' and comma ## #strongly-typed with -as operator and space(s) ## $ErrorActionPreference =<space><tab> ## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3 ## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab> ## #Path expansion with variable and '\\' or '/' ## $PWD\\../../<tab>\\<tab> ## "$env:SystemDrive/pro<tab>/<tab> ## #Operator expansion which starts with '-' ## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2' ## 1..9 -co<tab> 5 ## #Keyword expansion ## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } } ## #Variable name expansion (only global scope) ## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab> ## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab> ## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab> ## Tee-Object -Variable <tab> ## gv pro<tab>,<tab> ## Remove-Variable -Name out<tab>,<tab>,ps<tab> ## ... | ... | tee -v <tab> ## #Alias name expansion ## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab> ## Export-Alias -Name <tab> ## Get-Alias i<tab>,e<tab>,a<tab> ## epal -n for<tab> ## #Property name expansion with -groupBy parameter ## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab> ## ps | ft -g <tab> ## gcm | Format-Wide -GroupBy Par<tab> ## #Type accelerators expansion with no charactors ## [<tab> ## New-Object -typename <tab> ## New-Object <tab> ## # File glob expansion with '@' ## ls *.txt@<tab> ## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma ## ls * -Filter *.txt # 2 <tab> refactoring ## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern ## This can also use '^'(hat) or '~'(tilde) for Excluding ## ls <hat>*.txt@<tab> ## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma ## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring ## *.txt<tilde>foo*<tilde>bar*@<tab> ## ls file.txt # 1 <tab> expanding with comma ## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring ## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> ) ## ls * -Filter * -Excluding foo*, bar*<Enter> ## #ls<tab> ## #1<tab> ## # Command buffer stack with ';'(semicolon) ## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1 ## echo "PowerShell"<semicolon><tab> # push command2 ## get-process<semicolon><tab> # push command3 ## {COMMAND}<Enter> # execute another command ## get-process # Auto pop command3 from stack by LIFO ## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon) ## get-process; <semicolon><comma><tab> ## get-process; echo "PowerShell" # pop command2 from stack by LIFO ## # Function name expansion after 'function' or 'filter' keywords ## function cl<tab> ## #Switch syntax option expansion ## switch -w<tab> -f<tab> ## #Better powershell.exe option expansion with '-' ## powershell -no<tab> -<tab> -en<tab> ## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* ) ## [par<tab> ## [cmd<tab> ## #Member expansion for CmdletBinding and Parameter attributes ## [Parameter(man<tab>,<tab>1,val<tab>$true)] ## [CmdletBinding( <tab>"foo", su<tab>$true)] ## #Several current date/time formats with Ctrl+D ## <Ctrl+D><tab><tab><tab><tab><tab>... ## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,') ## <command>;<tab> # push command ## <Ctrl+D><tab> # pop ## #Paste clipboard with Ctrl+V ## <Ctrl+V><tab> ### Generate ProgIDs list... if ( Test-Path $PSHOME\\ProgIDs.txt ) { $_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0 } else { $_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\") $_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_subkey in $_HKCR.GetSubKeyNames() ) { foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") ) { if ($_i -ne $null) { $_ProgID.Add($_i.GetValue("")) } } } '$_ProgID was updated...' | Out-Host $_ProgID = $_ProgID|sort -Unique Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose } ### Generate TypeNames list... if ( Test-Path $PSHOME\\TypeNames.txt ) { $_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0 } else { $_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() ) { foreach ( $_type in $_asm.GetTypes() ) { $_TypeNames.Add($_type.FullName) } } '$_TypeNames was updated...' | Out-Host $_TypeNames = $_TypeNames | sort -Unique Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose } if ( Test-Path $PSHOME\\TypeNames_System.txt ) { $_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0 } else { $_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.' '$_TypeNames_System was updated...' | Out-Host Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose } ### Generate WMIClasses list... if ( Test-Path $PSHOME\\WMIClasses.txt ) { $_WMIClasses = type $PSHOME\\WMIClasses.txt -ReadCount 0 } else { $_WMIClasses = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_class in gwmi -List ) { $_WMIClasses.Add($_class.Name) } $_WMIClasses = $_WMIClasses | sort -Unique '$_WMIClasses was updated...' | Out-Host Set-Content -Value $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose } [Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null $global:_cmdstack = New-Object Collections.Stack $global:_snapin = $null $global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort iex (@' function prompt { if ($_cmdstack.Count -gt 0) { $line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) } '@ + @" ${function:prompt} } "@) function Write-ClassNames ( $data, $i, $prefix='', $sep='.' ) { $preItem = "" foreach ( $class in $data -like $_opt ) { $Item = $class.Split($sep) if ( $preItem -ne $Item[$i] ) { if ( $i+1 -eq $Item.Count ) { if ( $prefix -eq "[" ) { $suffix = "]" } elseif ( $sep -eq "_" ) { $suffix = "" } else { $suffix = " " } } else { $suffix = "" } $prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix $preItem = $Item[$i] } } } function Get-PipeLineObject { $i = -2 $property = $null do { $str = $line.Split("|") # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1] # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] if ( $_cmdlet -eq "?" ) { $_cmdlet = "Where-Object" } $global:_exp = $_cmdlet # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Select-Object" -eq $_cmdlet ) { if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' ) { $property = $Matches[1] + ";" + $property } } $i-- } while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet ) if ( $global:_forgci -eq $null ) { $a = @(ls "Alias:\\")[0] $e = @(ls "Env:\\")[0] $f = @(ls "Function:\\")[0] $h = @(ls "HKCU:\\")[0] $v = @(ls "Variable:\\")[0] $c = @(ls "cert:\\")[0] $global:_forgci = gi $PSHOME\\powershell.exe | Add-Member 'NoteProperty' CommandType $f.CommandType -P | Add-Member 'NoteProperty' Definition $a.Definition -P | Add-Member 'NoteProperty' Description $a.Description -P | Add-Member 'NoteProperty' Key $e.Key -P | Add-Member 'NoteProperty' Location $c.Location -P | Add-Member 'NoteProperty' LocationName $c.LocationName -P | Add-Member 'NoteProperty' Options $a.Options -P | Add-Member 'NoteProperty' ReferencedCommand $a.ReferencedCommand -P | Add-Member 'NoteProperty' ResolvedCommand $a.ResolvedCommand -P | Add-Member 'NoteProperty' ScriptBlock $f.ScriptBlock -P | Add-Member 'NoteProperty' StoreNames $c.StoreNames -P | Add-Member 'NoteProperty' SubKeyCount $h.SubKeyCount -P | Add-Member 'NoteProperty' Value $e.Value -P | Add-Member 'NoteProperty' ValueCount $h.ValueCount -P | Add-Member 'NoteProperty' Visibility $a.Visibility -P | Add-Member 'NoteProperty' Property $h.Property -P | Add-Member 'NoteProperty' ResolvedCommandName $a.ResolvedCommandName -P | Add-Member 'ScriptMethod' Close {} -P | Add-Member 'ScriptMethod' CreateSubKey {} -P | Add-Member 'ScriptMethod' DeleteSubKey {} -P | Add-Member 'ScriptMethod' DeleteSubKeyTree {} -P | Add-Member 'ScriptMethod' DeleteValue {} -P | Add-Member 'ScriptMethod' Flush {} -P | Add-Member 'ScriptMethod' GetSubKeyNames {} -P | Add-Member 'ScriptMethod' GetValue {} -P | Add-Member 'ScriptMethod' GetValueKind {} -P | Add-Member 'ScriptMethod' GetValueNames {} -P | Add-Member 'ScriptMethod' IsValidValue {} -P | Add-Member 'ScriptMethod' OpenSubKey {} -P | Add-Member 'ScriptMethod' SetValue {} -P } if ( $global:_mix -eq $null ) { $f = gi $PSHOME\\powershell.exe $t = [type] $s = "" $global:_mix = ` Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Mode $f.Mode -P | Add-Member 'NoteProperty' Assembly $t.Assembly -P | Add-Member 'NoteProperty' AssemblyQualifiedName $t.AssemblyQualifiedName -P | Add-Member 'NoteProperty' Attributes $f.Attributes -P | Add-Member 'NoteProperty' BaseType $t.BaseType -P | Add-Member 'NoteProperty' ContainsGenericParameters $t.ContainsGenericParameters -P | Add-Member 'NoteProperty' CreationTime $f.CreationTime -P | Add-Member 'NoteProperty' CreationTimeUtc $f.CreationTimeUtc -P | Add-Member 'NoteProperty' DeclaringMethod $t.DeclaringMethod -P | Add-Member 'NoteProperty' DeclaringType $t.DeclaringType -P | Add-Member 'NoteProperty' Exists $f.Exists -P | Add-Member 'NoteProperty' Extension $f.Extension -P | Add-Member 'NoteProperty' FullName $f.FullName -P | Add-Member 'NoteProperty' GenericParameterAttributes $t.GenericParameterAttributes -P | Add-Member 'NoteProperty' GenericParameterPosition $t.GenericParameterPosition -P | Add-Member 'NoteProperty' GUID $t.GUID -P | Add-Member 'NoteProperty' HasElementType $t.HasElementType -P | Add-Member 'NoteProperty' IsAbstract $t.IsAbstract -P | Add-Member 'NoteProperty' IsAnsiClass $t.IsAnsiClass -P | Add-Member 'NoteProperty' IsArray $t.IsArray -P | Add-Member 'NoteProperty' IsAutoClass $t.IsAutoClass -P | Add-Member 'NoteProperty' IsAutoLayout $t.IsAutoLayout -P | Add-Member 'NoteProperty' IsByRef $t.IsByRef -P | Add-Member 'NoteProperty' IsClass $t.IsClass -P | Add-Member 'NoteProperty' IsCOMObject $t.IsCOMObject -P | Add-Member 'NoteProperty' IsContextful $t.IsContextful -P | Add-Member 'NoteProperty' IsEnum $t.IsEnum -P | Add-Member 'NoteProperty' IsExplicitLayout $t.IsExplicitLayout -P | Add-Member 'NoteProperty' IsGenericParameter $t.IsGenericParameter -P | Add-Member 'NoteProperty' IsGenericType $t.IsGenericType -P | Add-Member 'NoteProperty' IsGenericTypeDefinition $t.IsGenericTypeDefinition -P | Add-Member 'NoteProperty' IsImport $t.IsImport -P | Add-Member 'NoteProperty' IsInterface $t.IsInterface -P | Add-Member 'NoteProperty' IsLayoutSequential $t.IsLayoutSequential -P | Add-Member 'NoteProperty' IsMarshalByRef $t.IsMarshalByRef -P | Add-Member 'NoteProperty' IsNested $t.IsNested -P | Add-Member 'NoteProperty' IsNestedAssembly $t.IsNestedAssembly -P | Add-Member 'NoteProperty' IsNestedFamANDAssem $t.IsNestedFamANDAssem -P | Add-Member 'NoteProperty' IsNestedFamily $t.IsNestedFamily -P | Add-Member 'NoteProperty' IsNestedFamORAssem $t.IsNestedFamORAssem -P | Add-Member 'NoteProperty' IsNestedPrivate $t.IsNestedPrivate -P | Add-Member 'NoteProperty' IsNestedPublic $t.IsNestedPublic -P | Add-Member 'NoteProperty' IsNotPublic $t.IsNotPublic -P | Add-Member 'NoteProperty' IsPointer $t.IsPointer -P | Add-Member 'NoteProperty' IsPrimitive $t.IsPrimitive -P | Add-Member 'NoteProperty' IsPublic $t.IsPublic -P | Add-Member 'NoteProperty' IsSealed $t.IsSealed -P | Add-Member 'NoteProperty' IsSerializable $t.IsSerializable -P | Add-Member 'NoteProperty' IsSpecialName $t.IsSpecialName -P | Add-Member 'NoteProperty' IsUnicodeClass $t.IsUnicodeClass -P | Add-Member 'NoteProperty' IsValueType $t.IsValueType -P | Add-Member 'NoteProperty' IsVisible $t.IsVisible -P | Add-Member 'NoteProperty' LastAccessTime $f.LastAccessTime -P | Add-Member 'NoteProperty' LastAccessTimeUtc $f.LastAccessTimeUtc -P | Add-Member 'NoteProperty' LastWriteTime $f.LastWriteTime -P | Add-Member 'NoteProperty' LastWriteTimeUtc $f.LastWriteTimeUtc -P | Add-Member 'NoteProperty' MemberType $t.MemberType -P | Add-Member 'NoteProperty' MetadataToken $t.MetadataToken -P | Add-Member 'NoteProperty' Module $t.Module -P | Add-Member 'NoteProperty' Name $t.Name -P | Add-Member 'NoteProperty' Namespace $t.Namespace -P | Add-Member 'NoteProperty' Parent $f.Parent -P | Add-Member 'NoteProperty' ReflectedType $t.ReflectedType -P | Add-Member 'NoteProperty' Root $f.Root -P | Add-Member 'NoteProperty' StructLayoutAttribute $t.StructLayoutAttribute -P | Add-Member 'NoteProperty' TypeHandle $t.TypeHandle -P | Add-Member 'NoteProperty' TypeInitializer $t.TypeInitializer -P | Add-Member 'NoteProperty' UnderlyingSystemType $t.UnderlyingSystemType -P | Add-Member 'NoteProperty' PSChildName $f.PSChildName -P | Add-Member 'NoteProperty' PSDrive $f.PSDrive -P | Add-Member 'NoteProperty' PSIsContainer $f.PSIsContainer -P | Add-Member 'NoteProperty' PSParentPath $f.PSParentPath -P | Add-Member 'NoteProperty' PSPath $f.PSPath -P | Add-Member 'NoteProperty' PSProvider $f.PSProvider -P | Add-Member 'NoteProperty' BaseName $f.BaseName -P | Add-Member 'ScriptMethod' Clone {} -P | Add-Member 'ScriptMethod' CompareTo {} -P | Add-Member 'ScriptMethod' Contains {} -P | Add-Member 'ScriptMethod' CopyTo {} -P | Add-Member 'ScriptMethod' Create {} -P | Add-Member 'ScriptMethod' CreateObjRef {} -P | Add-Member 'ScriptMethod' CreateSubdirectory {} -P | Add-Member 'ScriptMethod' Delete {} -P | Add-Member 'ScriptMethod' EndsWith {} -P | Add-Member 'ScriptMethod' FindInterfaces {} -P | Add-Member 'ScriptMethod' FindMembers {} -P | Add-Member 'ScriptMethod' GetAccessControl {} -P | Add-Member 'ScriptMethod' GetArrayRank {} -P | Add-Member 'ScriptMethod' GetConstructor {} -P | Add-Member 'ScriptMethod' GetConstructors {} -P | Add-Member 'ScriptMethod' GetCustomAttributes {} -P | Add-Member 'ScriptMethod' GetDefaultMembers {} -P | Add-Member 'ScriptMethod' GetDirectories {} -P | Add-Member 'ScriptMethod' GetElementType {} -P | Add-Member 'ScriptMethod' GetEnumerator {} -P | Add-Member 'ScriptMethod' GetEvent {} -P | Add-Member 'ScriptMethod' GetEvents {} -P | Add-Member 'ScriptMethod' GetField {} -P | Add-Member 'ScriptMethod' GetFields {} -P | Add-Member 'ScriptMethod' GetFiles {} -P | Add-Member 'ScriptMethod' GetFileSystemInfos {} -P | Add-Member 'ScriptMethod' GetGenericArguments {} -P | Add-Member 'ScriptMethod' GetGenericParameterConstraints {} -P | Add-Member 'ScriptMethod' GetGenericTypeDefinition {} -P | Add-Member 'ScriptMethod' GetInterface {} -P | Add-Member 'ScriptMethod' GetInterfaceMap {} -P | Add-Member 'ScriptMethod' GetInterfaces {} -P | Add-Member 'ScriptMethod' GetLifetimeService {} -P | Add-Member 'ScriptMethod' GetMember {} -P | Add-Member 'ScriptMethod' GetMembers {} -P | Add-Member 'ScriptMethod' GetMethod {} -P | Add-Member 'ScriptMethod' GetMethods {} -P | Add-Member 'ScriptMethod' GetNestedType {} -P | Add-Member 'ScriptMethod' GetNestedTypes {} -P | Add-Member 'ScriptMethod' GetObjectData {} -P | Add-Member 'ScriptMethod' GetProperties {} -P | Add-Member 'ScriptMethod' GetProperty {} -P | Add-Member 'ScriptMethod' GetTypeCode {} -P | Add-Member 'ScriptMethod' IndexOf {} -P | Add-Member 'ScriptMethod' IndexOfAny {} -P | Add-Member 'ScriptMethod' InitializeLifetimeService {} -P | Add-Member 'ScriptMethod' Insert {} -P | Add-Member 'ScriptMethod' InvokeMember {} -P | Add-Member 'ScriptMethod' IsAssignableFrom {} -P | Add-Member 'ScriptMethod' IsDefined {} -P | Add-Member 'ScriptMethod' IsInstanceOfType {} -P | Add-Member 'ScriptMethod' IsNormalized {} -P | Add-Member 'ScriptMethod' IsSubclassOf {} -P | Add-Member 'ScriptMethod' LastIndexOf {} -P | Add-Member 'ScriptMethod' LastIndexOfAny {} -P | Add-Member 'ScriptMethod' MakeArrayType {} -P | Add-Member 'ScriptMethod' MakeByRefType {} -P | Add-Member 'ScriptMethod' MakeGenericType {} -P | Add-Member 'ScriptMethod' MakePointerType {} -P | Add-Member 'ScriptMethod' MoveTo {} -P | Add-Member 'ScriptMethod' Normalize {} -P | Add-Member 'ScriptMethod' PadLeft {} -P | Add-Member 'ScriptMethod' PadRight {} -P | Add-Member 'ScriptMethod' Refresh {} -P | Add-Member 'ScriptMethod' Remove {} -P | Add-Member 'ScriptMethod' Replace {} -P | Add-Member 'ScriptMethod' SetAccessControl {} -P | Add-Member 'ScriptMethod' Split {} -P | Add-Member 'ScriptMethod' StartsWith {} -P | Add-Member 'ScriptMethod' Substring {} -P | Add-Member 'ScriptMethod' ToCharArray {} -P | Add-Member 'ScriptMethod' ToLower {} -P | Add-Member 'ScriptMethod' ToLowerInvariant {} -P | Add-Member 'ScriptMethod' ToUpper {} -P | Add-Member 'ScriptMethod' ToUpperInvariant {} -P | Add-Member 'ScriptMethod' Trim {} -P | Add-Member 'ScriptMethod' TrimEnd {} -P | Add-Member 'ScriptMethod' TrimStart {} -P | Add-Member 'NoteProperty' Chars $s.Chars -P } if ( "Add-Member" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Compare-Object" -eq $_cmdlet ) { $global:_dummy = (Compare-Object 1 2)[0] } if ( "ConvertFrom-SecureString" -eq $_cmdlet ) { $global:_dummy = $null } if ( "ConvertTo-SecureString" -eq $_cmdlet ) { $global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force } if ( "ForEach-Object" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Acl" -eq $_cmdlet ) { $global:_dummy = Get-Acl } if ( "Get-Alias" -eq $_cmdlet ) { $global:_dummy = (Get-Alias)[0] } if ( "Get-AuthenticodeSignature" -eq $_cmdlet ) { $global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe } if ( "Get-ChildItem" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-Command" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-Content" -eq $_cmdlet ) { $global:_dummy = (type $PSHOME\\profile.ps1)[0] } if ( "Get-Credential" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Culture" -eq $_cmdlet ) { $global:_dummy = Get-Culture } if ( "Get-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( "Get-Event" -eq $_cmdlet ) { $global:_dummy = (Get-Event)[0] } if ( "Get-EventLog" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-ExecutionPolicy" -eq $_cmdlet ) { $global:_dummy = Get-ExecutionPolicy } if ( "Get-Help" -eq $_cmdlet ) { $global:_dummy = Get-Help Add-Content } if ( "Get-History" -eq $_cmdlet ) { $global:_dummy = Get-History -Count 1 } if ( "Get-Host" -eq $_cmdlet ) { $global:_dummy = Get-Host } if ( "Get-Item" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-ItemProperty" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Location" -eq $_cmdlet ) { $global:_dummy = Get-Location } if ( "Get-Member" -eq $_cmdlet ) { $global:_dummy = (1|Get-Member)[0] } if ( "Get-Module" -eq $_cmdlet ) { $global:_dummy = (Get-Module)[0] } if ( "Get-PfxCertificate" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Process" -eq $_cmdlet ) { $global:_dummy = ps powershell } if ( "Get-PSBreakpoint" -eq $_cmdlet ) { $global:_dummy = Add-Member -InputObject (New-Object PSObject) 'NoteProperty' Action '' -P | Add-Member 'NoteProperty' Command '' -P | Add-Member 'NoteProperty' Enabled '' -P | Add-Member 'NoteProperty' HitCount '' -P | Add-Member 'NoteProperty' Id '' -P | Add-Member 'NoteProperty' Script '' -P } if ( "Get-PSCallStack" -eq $_cmdlet ) { $global:_dummy = Get-PSCallStack } if ( "Get-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Function } if ( "Get-PSProvider" -eq $_cmdlet ) { $global:_dummy = Get-PSProvider FileSystem } if ( "Get-PSSnapin" -eq $_cmdlet ) { $global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core } if ( "Get-Service" -eq $_cmdlet ) { $global:_dummy = (Get-Service)[0] } if ( "Get-TraceSource" -eq $_cmdlet ) { $global:_dummy = Get-TraceSource AddMember } if ( "Get-UICulture" -eq $_cmdlet ) { $global:_dummy = Get-UICulture } if ( "Get-Variable" -eq $_cmdlet ) { $global:_dummy = Get-Variable _ } if ( "Get-WmiObject" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Group-Object" -eq $_cmdlet ) { $global:_dummy = 1 | group } if ( "Measure-Command" -eq $_cmdlet ) { $global:_dummy = Measure-Command {} } if ( "Measure-Object" -eq $_cmdlet ) { $global:_dummy = Measure-Object } if ( "New-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Alias } if ( "New-TimeSpan" -eq $_cmdlet ) { $global:_dummy = New-TimeSpan } if ( "Resolve-Path" -eq $_cmdlet ) { $global:_dummy = $PWD } if ( "Select-String" -eq $_cmdlet ) { $global:_dummy = " " | Select-String " " } if ( "Set-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( $property -ne $null) { foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) ) { $global:_dummy = @($global:_dummy.$name)[0] } } } function TabExpansion { # This is the default function to use for tab expansion. It handles simple # member expansion on variables, variable name expansion and parameter completion # on commands. It doesn't understand strings so strings containing ; | ( or { may # cause expansion to fail. param($line, $lastWord) & { # Helper function to write out the matching set of members. It depends # on dynamic scoping to get $_base, _$expression and $_pat function Write-Members ($sep='.') { # evaluate the expression to get the object to examine... Invoke-Expression ('$_val=' + $_expression) if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } $_method = [Management.Automation.PSMemberTypes] ` 'Method,CodeMethod,ScriptMethod,ParameterizedProperty' if ($sep -eq '.') { $params = @{view = 'extended','adapted','base'} } else { $params = @{static=$true} } if ( $_val -is [Hashtable] ) { [Object[]]$_keys = $null foreach ( $_name in $_val.Keys ) { $_keys += ` New-Object Microsoft.PowerShell.Commands.MemberDefinition ` [int],$_name,"Property",0 } } if ( $_keys -ne $null ) { $_members = [Object[]](Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat}) } else { $_members = (Get-Member @params -InputObject $_val $_pat) } foreach ($_m in $_members | Sort-Object membertype,name) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } $host.UI.RawUI.WindowTitle = "Windows PowerShell V2 (CTP2)" + $lastword switch ([int]$line[-1]) { # Ctrl+D several date/time formats 4 { "[DateTime]::Now" [DateTime]::Now [DateTime]::Now.ToString("yyyyMMdd") [DateTime]::Now.ToString("MMddyyyy") [DateTime]::Now.ToString("yyyyMMddHHmmss") [DateTime]::Now.ToString("MMddyyyyHHmmss") 'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) } break; } # Ctrl+P hand-operated pop from command buffer stack 16 { $_base = $lastword.SubString(0, $lastword.Length-1) $_base + $global:_cmdstack.Pop() break; } # Ctrl+R $Host.UI.RawUI. 18 { '$Host.UI.RawUI.' '$Host.UI.RawUI' break; } # Ctrl+V paste clipboard 22 { $_base = $lastword.SubString(0, $lastword.Length-1) $global:_clip = New-Object System.Windows.Forms.TextBox $global:_clip.Multiline = $true $global:_clip.Paste() $_base + $global:_clip.Text break; } } switch -regex ($lastWord) { # Handle property and method expansion at '$_' '(^.*)(\\$_\\.)(\\w*)$' { $_base = $matches[1] $_expression = '$global:_dummy' $_pat = $matches[3] + '*' $global:_dummy = $null Get-PipeLineObject if ( $global:_dummy -eq $null ) { if ( $global:_exp -match '^\\$.*\\(.*$' ) { $type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' ) { $tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1] $type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' ) { $global:_dummy = @(iex $Matches[1])[0] } else { $global:_dummy = $global:_mix } } Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. $a.b.<tab> '(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle simple property and method expansion on static members... # e.g. [datetime]::n<tab> '(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' Write-Members '::' break; } # Handle complex property and method expansion on static members # where there are intermediate properties... # e.g. [datetime]::now.d<tab> '(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' { $_base = $matches[1] # everything before the expression $_expression = $matches[2].TrimEnd('.') # expression less trailing '.' $_pat = $matches[5] + '*' # the member to look for... Write-Members break; } # Handle variable name expansion... '(^.*\\$)(\\w+)$' { $_prefix = $matches[1] $_varName = $matches[2] foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*')) { $_prefix + $_v.name } break; } # Handle env&function drives variable name expansion... '(^.*\\$)(.*\\:)(\\w+)$' { $_prefix = $matches[1] $_drive = $matches[2] $_varName = $matches[3] if ($_drive -eq "env:" -or $_drive -eq "function:") { foreach ($_v in Get-ChildItem ($_drive + $_varName + '*')) { $_prefix + $_drive + $_v.name } } break; } # Handle array's element property and method expansion # where there are intermediate properties... # e.g. foo[0].n.b<tab> '(^.*)(\\$((\\w+\\.)|(\\w+(\\[(\\w|,)+\\])+\\.))+)(\\w*)$' { $_base = $matches[1] $_expression = $matches[2].TrimEnd('.') $_pat = $Matches[8] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle property and method expansion rooted at type object... # e.g. [System.Type].a<tab> '(^\\[(\\w|\\.)+\\])\\.(\\w*)$' { if ( $(iex $Matches[1]) -isnot [System.Type] ) { break; } $_expression = $Matches[1] $_pat = $Matches[$matches.Count-1] + '*' Write-Members break; } # Handle complex property and method expansion on type object members # where there are intermediate properties... # e.g. [datetime].Assembly.a<tab> '^(\\[(\\w|\\.)+\\]\\.(\\w+\\.)+)(\\w*)$' { $_expression = $matches[1].TrimEnd('.') # expression less trailing '.' $_pat = $matches[4] + '*' # the member to look for... if ( $(iex $_expression) -eq $null ) { break; } Write-Members break; } # Handle property and method expansion rooted at close parenthes... # e.g. (123).a<tab> '^(.*)\\)((\\w|\\.)*)\\.(\\w*)$' { $_base = $Matches[1] + ")" if ( $matches[3] -eq $null) { $_expression = '[System.Type]' } else { $_expression = '[System.Type]' + $Matches[2] } $_pat = $matches[4] + '*' iex "$_expression | Get-Member $_pat | sort MemberType,Name" | % { if ( $_.MemberType -like "*Method*" -or $_.MemberType -like "*Parameterized*" ) { $parenthes = "(" } if ( $Matches[2] -eq "" ) { $_base + "." + $_.Name + $parenthes } else { $_base + $Matches[2] + "." + $_.Name + $parenthes } } break; } # Handle .NET type name expansion ... # e.g. [Microsoft.PowerShell.Com<tab> '^\\[(\\w+(\\.\\w*)*)$' { $_opt = $matches[1] + '*' if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' } else { $_TypeAccelerators -like $_opt -replace '^(.*)$', '[$1]' "CmdletBinding", "Parameter", "Alias", "ValidateArguments", "ValidateCount", "ValidateEnumeratedArguments", "ValidateLength", "ValidateNotNull", "ValidateNotNullOrEmpty", "ValidatePattern", "ValidateRange", "ValidateScript", "ValidateSet", "AllowEmptyCollection", "AllowEmptyString", "AllowNull" ` -like $_opt -replace '^(.*)$', '[$1(' Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) '[' Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) '[' } break; } # Handle file/directory name which contains $env: variable # e.g. $env:windir\\<tab> '^\\$(env:)?\\w+([\\\\/][^\\\\/]*)*$' { $path = iex ('"' + $Matches[0] + '"') if ( $Matches[2].Length -gt 1 ) { $parent = Split-Path $path -Parent $leaf = (Split-Path $path -Leaf) + '*' } else { $parent = $path $leaf = '*' } if ( Test-Path $parent ) { $i = $Matches[0].LastIndexOfAny("/\\") $_base = $Matches[0].Substring(0,$i+1) [IO.Directory]::GetFileSystemEntries( $parent, $leaf ) | % { $_base + ($_.Split("\\/")[-1] -replace '([\\$\\s&])','`$1' -replace '([[\\]])', '````$1') } } } # Handle file glob expansion ... # e.g. *.txt~about*@<tab> '^(\\^?([^~]+))(~(.*))*@$' { if ( $Matches[1] -notlike "^*" ) { $include = $Matches[2] -replace '``','`' if ( $Matches[3] ) { $exclude = $Matches[3].Split("~", "RemoveEmptyEntries" -as [System.StringSplitOptions]) -replace '``','`' } } else { $include = "*" $exclude = $Matches[2] -replace '``','`' } $fse = [IO.Directory]::GetFileSystemEntries($PWD) $fse = $fse -replace '.*[\\\\/]([^/\\\\]*)$','$1' % -in ($fse -like $include) { $fse = $_; $exclude | % { $fse = $fse -notlike $_ } } $fse = $fse -replace '^.*\\s.*$', ("'`$0'") $fse = $fse -replace '([\\[\\]])', '``$1' -replace '^.*([\\[\\]]).*$', ("'`$0'") $fse = $fse -replace "''", "'" $OFS = ", "; "$fse" $OFS = ", "; "* -Filter $include " + $(if($exclude){"-Exclude $exclude"}) $Matches[0].Substring(0, $Matches[0].Length-1) break; } # Handle command buffer stack... '(.*);(.?)$' { $_base = $Matches[1] if ( $Matches[2] -eq ":" -or $Matches[2] -eq "," ) { if ( $_cmdstack.Count -gt 0 ) { $_base + $global:_cmdstack.Pop() } else { ""; break; } } elseif ( $Matches[2] -eq "" ) { $global:_cmdstack.Push($line.SubString(0,$line.Length-1)) [System.Windows.Forms.SendKeys]::SendWait("{ESC}") ""; break; } } # Do completion on parameters... '^-([\\w0-9]*)' { $_pat = $matches[1] + '*' # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_command = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_command -match '\\{([^\\{\\}]*)$') { $_command = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_command -match '\\(([^()]*)$') { $_command = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_command = $_command.Trim().Split()[0] # now get the info object for it... $_command = @(Get-Command -type 'All' $_command)[0] # loop resolving aliases... while ($_command.CommandType -eq 'alias') { $_command = @(Get-Command -type 'All' $_command.Definition)[0] } if ( $_command.name -eq "powershell.exe" ) { if ( $global:_PSexeOption ) { $global:_PSexeOption -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort } else { ($global:_PSexeOption = powershell.exe -?) -like "-$_pat" -replace '^(-[^,]+).*$', '$1' | sort } break; } if ( $_command -ne $null ) { # expand the parameter sets and emit the matching elements foreach ($_n in $_command.Parameters.Keys | sort) { if ($_n -like $_pat) { '-' + $_n } } } elseif ( $line -match 'switch\\s+(-\\w+\\s+)*-(\\w*)$') { $_pat = $Matches[2] + '*' "regex", "wildcard", "exact", "casesensitive", "file" -like $_pat -replace '^(.*)$', '-$1' break; } else { "-and", "-as", "-band", "-bnot", "-bor", "-bxor", "-ccontains", "-ceq", "-cge", "-cgt", "-cle", "-clike", "-clt", "-cmatch", "-cne", "-cnotcontains", "-cnotlike", "-cnotmatch", "-contains", "-creplace", "-csplit", "-eq", "-f", "-ge", "-gt", "-icontains", "-ieq", "-ige", "-igt", "-ile", "-ilike", "-ilt", "-imatch", "-ine", "-inotcontains", "-inotlike", "-inotmatch", "-ireplace", "-is", "-isnot", "-isplit", "-join", "-le", "-like", "-lt", "-match", "-ne", "-not", "-notcontains", "-notlike", "-notmatch", "-or", "-replace", "-split", "-xor" -like "-$_pat" } break; } # Tab complete against history either #<pattern> or #<id> '^#(\\w*)' { $_pattern = $matches[1] if ($_pattern -match '^[0-9]+$') { Get-History -ea SilentlyContinue -Id $_pattern | Foreach { $_.CommandLine } } else { $_pattern = '*' + $_pattern + '*' Get-History | Sort-Object -Descending Id| Foreach { $_.CommandLine } | where { $_ -like $_pattern } } break; } # try to find a matching command... default { # parse the script... $_tokens = [System.Management.Automation.PSParser]::Tokenize($line, [ref] $null) if ( $_tokens ) { $_lastToken = $_tokens[$_tokens.count - 1] if ($_lastToken.Type -eq 'Member') { $_pat = $_lastToken.Content + '*' $i=$_tokens.count; do { $i-- } until ( $_tokens[$i].Type -eq "Attribute") if ( $lastWord -match "^(.*)([\\(,])\\w*$" ) { $_base = $matches[1] + $matches[2] } switch ( $_tokens[$i].Content ) { 'Parameter' { [System.Management.Automation.ParameterAttribute].GetProperties() | ? { $_.Name -like $_pat -and $_.Name -ne "TypeId" } | % { $_base + $_.Name + "=" } } 'CmdletBinding' { [System.Management.Automation.CmdletBindingAttribute].GetProperties() | ? { $_.Name -like $_pat -and $_.Name -ne "TypeId" } | % { $_base + $_.Name + "=" } } } break; } if ( $_tokens[1].Type -eq "Attribute") { if ( $line.Split("(").Count -gt $line.Split(")").Count ) { if ( $lastWord -match "^(.*)([\\(,])\\w*$" ) { $_base = $matches[1] + $matches[2] } switch ( $_tokens[1].Content ) { 'Parameter' { [System.Management.Automation.ParameterAttribute].GetProperties() | % { $_base + $_.Name + "=" } } 'CmdletBinding' { [System.Management.Automation.CmdletBindingAttribute].GetProperties() | % { $_base + $_.Name + "=" } } } } break; } } $lastex = [regex]::Split($line, '[|;]')[-1] if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)"\\w+"\\s*-as\\s+$' ) { if ( $Matches[6] -ne $nul ) { $brackets = "[]" } '['+ $global:_enum + $brackets + ']' break; } if ( $lastex -match '^\\s*(\\$\\w+(\\[[0-9,]+\\])*(\\.\\w+(\\[[0-9,]+\\])*)*)\\s*=\\s+(("\\w+"\\s*,\\s+)*)\\s*(\\w*)$' ) { $_pat = $Matches[7] + '*' $_type = @(iex $Matches[1])[0].GetType() if ( $_type.IsEnum ) { $global:_enum = $_type.FullName [Enum]::GetValues($_type) -like $_pat -replace '^(.*)$','"$1"' break; } } $lastex = [regex]::Split($line, '[|;=]')[-1] if ($lastex -match '[[$].*\\w+\\(.*-as\\s*$') { '['+ $global:_enum + ']' } elseif ( $lastex -match '([[$].*(\\w+))\\((.*)$' ) { $_method = $Matches[1] if ( $Matches[3] -match "(.*)((`"|')(\\w+,)+(\\w*))$" ) { $continuous = $true $_opt = $Matches[5] + '*' $_base = $Matches[2].TrimStart('"') -replace '(.*,)\\w+$','$1' $position = $Matches[1].Split(",").Length } else { $continuous = $false $_opt = ($Matches[3].Split(',')[-1] -replace '^\\s*','') + "*" $position = $Matches[3].Split(",").Length } if ( ($_mdefs = iex ($_method + ".OverloadDefinitions")) -eq $null ) { $tname, $mname = $_method.Split(":", "RemoveEmptyEntries" -as [System.StringSplitOptions]) $_mdefs = iex ($tname + '.GetMember("' + $mname + '") | % { $_.ToString() }') } foreach ( $def in $_mdefs ) { [void] ($def -match '\\((.*)\\)') foreach ( $param in [regex]::Split($Matches[1], ', ')[$position-1] ) { if ($param -eq $null -or $param -eq "") { continue; } $type = $param.split()[0] if ( $type -like '*`[*' -or $type -eq "Params" -or $type -eq "" ) { continue; } $fullname = @($_typenames -like "*$type*") foreach ( $name in $fullname ) { if ( $continuous -eq $true -and ( $name -as [System.Type] ).IsEnum ) { $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$',($_base + '$1') $output | sort } elseif ( ( $name -as [System.Type] ).IsEnum ) { $global:_enum = $name $output = [Enum]::GetValues($name) -like $_opt -replace '^(.*)$','"$1"' $output | sort } } } } if ( $output -ne $null ) { break; } } if ( $line -match '(function|filter)\\s+(\\w*)$') { $_pat = 'function:\\' + $Matches[2] + '*' Get-ChildItem $_pat| % { $_.Name } break; } if ( $line[-1] -eq " " ) { $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-1] # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource | % { $_.Name } | sort -Unique break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators break; } if ( $_cmdlet.Noun -like "*WMI*" ) { $_WMIClasses break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process | % { $_.Name } | sort break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive | sort break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name ) { Get-Help -Category all | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | gm -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line[-1] -eq " " ) { # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] # now get the info object for it... $_cmdlet = @(Get-Command -type 'Application' $_cmdlet)[0] if ( $_cmdlet.Name -eq "powershell.exe" ) { "-PSConsoleFile", "-Version", "-NoLogo", "-NoExit", "-Sta", "-NoProfile", "-NonInteractive", "-InputFormat", "-OutputFormat", "-EncodedCommand", "-File", "-Command" | sort break; } if ( $_cmdlet.Name -eq "fsutil.exe" ) { "behavior query", "behavior set", "dirty query", "dirty set", "file findbysid", "file queryallocranges", "file setshortname", "file setvaliddata", "file setzerodata", "file createnew", "fsinfo drives", "fsinfo drivetype", "fsinfo volumeinfo", "fsinfo ntfsinfo", "fsinfo statistics", "hardlink create", "objectid query", "objectid set", "objectid delete", "objectid create", "quota disable", "quota track", "quota enforce", "quota violations", "quota modify", "quota query", "reparsepoint query", "reparsepoint delete", "sparse setflag", "sparse queryflag", "sparse queryrange", "sparse setrange", "usn createjournal", "usn deletejournal", "usn enumdata", "usn queryjournal", "usn readdata", "volume dismount", "volume diskfree" | sort break; } if ( $_cmdlet.Name -eq "net.exe" ) { "ACCOUNTS ", " COMPUTER ", " CONFIG ", " CONTINUE ", " FILE ", " GROUP ", " HELP ", "HELPMSG ", " LOCALGROUP ", " NAME ", " PAUSE ", " PRINT ", " SEND ", " SESSION ", "SHARE ", " START ", " STATISTICS ", " STOP ", " TIME ", " USE ", " USER ", " VIEW" | sort break; } if ( $_cmdlet.Name -eq "ipconfig.exe" ) { "/?", "/all", "/renew", "/release", "/flushdns", "/displaydns", "/registerdns", "/showclassid", "/setclassid" break; } } if ( $line -match '\\w+\\s+(\\w+(\\.|[^\\s\\.])*)$' ) { #$_opt = $Matches[1] + '*' $_cmdlet = $line.TrimEnd(" ").Split(" |(;={")[-2] $_opt = $Matches[1].Split(" ,")[-1] + '*' $_base = $Matches[1].Substring(0,$Matches[1].Length-$Matches[1].Split(" ,")[-1].length) # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias,function' $_cmdlet.Definition)[0] } if ( "Set-ExecutionPolicy" -eq $_cmdlet.Name ) { "Unrestricted", "RemoteSigned", "AllSigned", "Restricted", "Default" -like $_opt | sort break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -eq $_cmdlet.Name ) { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) break; } if ( $_cmdlet.Name -like "*WMI*" ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } if ( "Get-Process" -eq $_cmdlet.Name ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" -contains $_cmdlet.Name ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSProvider" -eq $_cmdlet.Name ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( $line -match '(-(\\w+))\\s+([^-]*$)' ) { $_param = $matches[2] + '*' $_opt = $Matches[3].Split(" ,")[-1] + '*' $_base = $Matches[3].Substring(0,$Matches[3].Length-$Matches[3].Split(" ,")[-1].length) #$_opt = ($Matches[3] -replace '(^.*\\s*,?\\s*)\\w*$','$1') + '*' # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($line, '[|;=]')[-1] # Extract the trailing unclosed block e.g. ls | foreach { cp if ($_cmdlet -match '\\{([^\\{\\}]*)$') { $_cmdlet = $matches[1] } # Extract the longest unclosed parenthetical expression... if ($_cmdlet -match '\\(([^()]*)$') { $_cmdlet = $matches[1] } # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] # now get the info object for it... $_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'Cmdlet,Alias,Function,Filter,ExternalScript' $_cmdlet.Definition)[0] } if ( $_param.TrimEnd("*") -eq "ea" -or $_param.TrimEnd("*") -eq "wa" ) { "SilentlyContinue", "Stop", "Continue", "Inquire" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide" -contains $_cmdlet.Name ` -and "groupBy" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } if ( $_param.TrimEnd("*") -eq "ev" -or $_param.TrimEnd("*") -eq "ov" -or "ErrorVariable" -like $_param -or "OutVariable" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Tee-Object" -eq $_cmdlet.Name -and "Variable" -like $_param ) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort break; } if ( "Clear-Variable", "Get-Variable", "New-Variable", "Remove-Variable", "Set-Variable" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Variable -Scope Global -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Export-Alias", "Get-Alias", "New-Alias", "Set-Alias" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-Alias -Name $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Out-File","Export-CSV","Select-String","Export-Clixml" -contains $_cmdlet.Name ` -and "Encoding" -like $_param) { "Unicode", "UTF7", "UTF8", "ASCII", "UTF32", "BigEndianUnicode", "Default", "OEM" | ? { $_ -like $_opt } | sort -Unique break; } if ( "Trace-Command","Get-TraceSource","Set-TraceSource" -contains $_cmdlet.Name ` -and "Name" -like $_param) { Get-TraceSource -Name $_opt | % { $_.Name } | sort -Unique | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "New-Object" -like $_cmdlet.Name ) { if ( "ComObject" -like $_param ) { $_ProgID -like $_opt | % { $_ -replace '\\s','` ' } break; } if ( "TypeName" -like $_param ) { if ( $_opt -eq "*" ) { $_TypeAccelerators -like $_opt } else { $_TypeAccelerators -like $_opt Write-ClassNames $_TypeNames_System ($_opt.Split(".").Count-1) Write-ClassNames $_TypeNames ($_opt.Split(".").Count-1) } break; } } if ( "New-Item" -eq $_cmdlet.Name ) { if ( "ItemType" -like $_param ) { "directory", "file" -like $_opt break; } } if ( "Get-Location", "Get-PSDrive", "Get-PSProvider", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name ` -and "PSProvider" -like $_param ) { Get-PSProvider -PSProvider $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Location" -eq $_cmdlet.Name -and "PSDrive" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-PSDrive", "New-PSDrive", "Remove-PSDrive" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-PSDrive -Name $_opt | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "PSSnapin" -like $_param) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + $_ } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } } if ( "Add-PSSnapin", "Get-PSSnapin", "Remove-PSSnapin" ` -contains $_cmdlet.Name -and "Name" -like $_param ) { if ( $global:_snapin -ne $null ) { $global:_snapin -like $_opt | % { $_base + ($_ -replace '\\s','` ') } break; } else { $global:_snapin = $(Get-PSSnapIn -Registered;Get-PSSnapIn)| sort Name -Unique; $global:_snapin -like $_opt | % { $_base + $_ } break; } } if ( "Clear-Variable", "Export-Alias", "Get-Alias", "Get-PSDrive", "Get-Variable", "Import-Alias", "New-Alias", "New-PSDrive", "New-Variable", "Remove-Variable", "Set-Alias", "Set-Variable" ` -contains $_cmdlet.Name -and "Scope" -like $_param ) { "Global", "Local", "Script" -like $_opt break; } if ( "Get-Process", "Stop-Process", "Wait-Process" -contains $_cmdlet.Name -and "Name" -like $_param ) { Get-Process $_opt | % { $_.Name } | sort | % { $_base + ($_ -replace '\\s','` ') } break; } if ( "Get-Eventlog" -eq $_cmdlet.Name -and "LogName" -like $_param ) { Get-EventLog -List | ? { $_.Log -like $_opt } | % { $_base + ($_.Log -replace '\\s','` ') } break; } if ( "Get-Help" -eq $_cmdlet.Name -or "help" -eq $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Help -Category all -Name $_opt | % { $_.Name } | sort -Unique break; } if ( "Category" -like $_param ) { "Alias", "Cmdlet", "Provider", "General", "FAQ", "Glossary", "HelpFile", "All" -like $_opt | sort | % { $_base + $_ } break; } } if ( "Get-Service", "Restart-Service", "Resume-Service", "Start-Service", "Stop-Service", "Suspend-Service" ` -contains $_cmdlet.Name ) { if ( "Name" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "DisplayName" -like $_param ) { Get-Service -Name $_opt | sort DisplayName | % { $_base + ($_.DisplayName -replace '\\s','` ') } break; } } if ( "New-Service" -eq $_cmdlet.Name -and "dependsOn" -like $_param ) { Get-Service -Name $_opt | sort Name | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Get-EventLog" -eq $_cmdlet.Name -and "EntryType" -like $_param ) { "Error", "Information", "FailureAudit", "SuccessAudit", "Warning" -like $_opt | sort | % { $_base + $_ } break; } if ( "Get-Command" -eq $_cmdlet.Name -and "Name" -like $_param ) { Get-Command -CommandType All -Name $_opt | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( $_cmdlet.Noun -like "*WMI*" ) { if ( "Class" -like $_param ) { Write-ClassNames $_WMIClasses ($_opt.Split("_").Count-1) -sep '_' break; } } if ( "Format-List", "Format-Custom", "Format-Table", "Format-Wide", "Compare-Object", "ConvertTo-Html", "Measure-Object", "Select-Object", "Group-Object", "Sort-Object" ` -contains $_cmdlet.Name -and "Property" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "Select-Object" -eq $_cmdlet.Name ) { if ( "ExcludeProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_base + ($_.Name -replace '\\s','` ') } break; } if ( "ExpandProperty" -like $_param ) { Get-PipeLineObject $_dummy | Get-Member -Name $_opt -MemberType Properties,ParameterizedProperty | sort membertype | % { $_.Name } break; } } select -InputObject $_cmdlet -ExpandProperty ParameterSets | select -ExpandProperty Parameters | ? { $_.Name -like $_param } | ? { $_.ParameterType.IsEnum } | % { [Enum]::GetNames($_.ParameterType) } | ? { $_ -like $_opt } | sort -Unique | % { $_base + $_ } } if ($_tokens) { $_lastToken = $_tokens[$_tokens.count - 1] if ($_lastToken.Type -eq 'Command') { $_cmd = $_lastToken.Content # don't look for paths... if ($_cmd.IndexOfAny('/\\') -eq -1) { # handle parsing errors - the last token string should be the last # string in the line... if ($lastword.substring($lastword.length-$_cmd.length) -eq $_cmd) { $_pat = $_cmd + '*' $_base = $lastword.substring(0, $lastword.length-$_cmd.length) "begin {", "break", "catch {", "continue", "data {", "do {", "dynamicparam (", "else {", "elseif (", "end {", "exit", "filter ", "finally {", "for (", "foreach ", "from", "function ", "if (", "in ", "param (", "process {", "return", "switch ", "throw ", "trap ", "try {", "until (", "while (" ` -like $_pat | % {'{0}{1}' -f $_base,$_ } $ExecutionContext.InvokeCommand.GetCommandName($_pat,$true, $false) | Sort-Object -Unique | ForEach-Object {'{0}{1}' -f $_base,$_ } } } } } } } } }
combined_dataset/train/non-malicious/2783.ps1
2783.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(Protocol, substr(ForeignAddress, 0, last_index_of(substr(ForeignAddress, 0, last_index_of(ForeignAddress, '.')), '.')), State, Component, Process) as Cnt, Protocol, substr(ForeignAddress, 0, last_index_of(substr(ForeignAddress, 0, last_index_of(ForeignAddress, '.')), '.')) as IP/16, State, Component, Process FROM *netstat.csv WHERE ConPid not in ('0'; '4') and ForeignAddress not like '10.%' and ForeignAddress not like '169.254%' and ForeignAddress not in ('*'; '0.0.0.0'; '127.0.0.1'; '[::]'; '[::1]') GROUP BY Protocol, IP/16, State, Component, Process ORDER BY Cnt, Process desc "@ & logparser -stats:off -i:csv -dtlines:0 -rtp:-1 $lpquery } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/sample_25_69.ps1
sample_25_69.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ [CmdletBinding(DefaultParametersetName="Unsecure")] param ( [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeName, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeType, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeIpAddressOrFQDN, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $UpgradeDomain, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $FaultDomain, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $AcceptEULA, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $Force, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $NoCleanupOnFailure, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $BypassUpgradeStateValidation, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $FabricIsPreInstalled, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [string] $FabricRuntimePackagePath, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [int] $TimeoutInSeconds, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [switch] $X509Credential, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ServerCertThumbprint, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreLocation, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreName, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $FindValueThumbprint, [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [switch] $WindowsCredential ) $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $MicrosoftServiceFabricCabFileAbsolutePath = $null if ((Test-Path variable:FabricRuntimePackagePath) ` -and ![string]::IsNullOrEmpty($FabricRuntimePackagePath)) { $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath)) { Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath" exit 1 } Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath" } else { $RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages" if(!(Test-Path $RuntimeBinPath)) { Write-Host "No directory exists for Runtime packages. Creating a new directory." md $RuntimeBinPath | Out-Null Write-Host "Done creating $RuntimeBinPath" } Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath" } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" if (!(Test-Path variable:TimeoutInSeconds) ` -or ($TimeoutInSeconds -le 0)) { $TimeoutInSeconds = 300 Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds." } $parentVerbosePreference = $VerbosePreference # Invoke in separate AppDomain if($X509Credential) { Write-Verbose "X509Credential: $X509Credential" $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; "WindowsCredential" = $false; "X509Credential" = $true; "ServerCertThumbprint" = $ServerCertThumbprint; "StoreLocation" = $StoreLocation; "StoreName" = $StoreName; "FindValueThumbprint" = $FindValueThumbprint; } } else { if($WindowsCredential) { Write-Verbose "WindowsCredential: $WindowsCredential" $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; "WindowsCredential" = $true; } } else { Write-Verbose "Not X509Credential nor WindowsCredential." $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; } } } if ($parentVerbosePreference -ne "SilentlyContinue") { $argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" } } $standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt" if (Test-Path $standaloneArgsFilepath) { Remove-Item $standaloneArgsFilepath -Force 2> $null } $argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" } $standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath $shelloutArgs = @( $standaloneArgsFilepath ) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $ParamFilepath ) Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object { $var = $_.Split('=') if ($var.Length -eq 2) { New-Variable -Name $var[0] -Value $var[1] -Force } } Remove-Item $ParamFilepath -Force 2> $null if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false} if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false} if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false} if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false} if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false} if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false} if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); } #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath Try { # Connect to the existing cluster Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint" if($X509Credential) { Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint } else { if($WindowsCredential) { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential } else { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint } } } Catch { Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } if ($ClusterConnection -eq $null) { Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red exit 1 } if ($FabricIsPreInstalled) { Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine." } elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) ` -or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath)) { Try { # Get runtime package details $UpgradeStatus = Get-ServiceFabricClusterUpgrade } Catch { Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red exit 1 } if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted") { if ($BypassUpgradeStateValidation) { Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red } Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red exit 1 } Try { $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab" $DeploymentPackageRoot = Split-Path -parent $DeployerBinPath $RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages" $MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename if (!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion $RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion } if ($RequiredPackage -eq $null) { Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red exit 1 } $Version = $UpgradeStatus.TargetCodeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath } Catch { Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } #Add Node to an existing cluster Try { $AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds) $AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration Get-ServiceFabricNode | ft $VerbosePreference = $parentVerbosePreference $params = @{ 'NodeName' = $NodeName; 'NodeType' = $NodeType; 'IpAddressOrFQDN' = $NodeIpAddressOrFQDN; 'UpgradeDomain' = $UpgradeDomain; 'FaultDomain' = $FaultDomain; 'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath; 'NoCleanupOnFailure' = $NoCleanupOnFailure; 'Force' = $Force; 'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation; 'FabricIsPreInstalled' = $FabricIsPreInstalled; } if ((Test-Path variable:TimeoutInSeconds) ` -and ($TimeoutInSeconds -gt 0)) { $params += @{'TimeoutSec' = $TimeoutInSeconds;} } Write-Host "Adding Node $NodeName" Add-ServiceFabricNode @params Write-Host "Waiting for node to join cluster." -NoNewline $nodeJoined=$false $firstRun=$true do { if (!$nodeJoined -and !$firstRun) { Write-Host "." -NoNewline Start-Sleep -s 10 } $result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 } $nodeJoined=$result.Count -gt 0 $firstRun=$false } while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout)) Write-Host "" # Newline if(-not $nodeJoined) { Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red exit 1 } Get-ServiceFabricNode | ft Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green } Catch { if($VerbosePreference -eq "SilentlyContinue") { Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red } Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $shelloutArgs -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIIoKQYJKoZIhvcNAQcCoIIoGjCCKBYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr # XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgkwghoFAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF # cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAd907ALwOFz+0066D2KBDUMbSKEoiRB+FPi9NTiYmG0UF2TEruWymfGb2 # LvNdYA3CyRrokT6Ob7RyJcxExpdSjC7NGHtrrnM12f3k0mDVKXYC38xRoXxBZmV8 # f8cNjg0CFFCqVv5hWq5XoGDgJY1GR6hwq2WCU8yWyQ3dooH6kvlgwkgC7scTjAFh # 8RXE7Mty1KDDfW0ab34oPrYDZ4O9wa4U8zcjHxnkXFscmvlNGudcr787FNzGIIrk # G0UYXbh1eA1aASAXMcbIiPL6/uJwFr2NOPrazyWeeX7/ID578XgJI82KQGd8hwxk # XF3kMnMFTx81GneYWWhWviue7iCnF6GCF5MwghePBgorBgEEAYI3AwMBMYIXfzCC # F3sGCSqGSIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCknY32Zz9RgMMmrp2e08tIikHcxjgKrRHYDwgfXUfzbwIGZc31LGZQ # GBMyMDI0MDIxNTIxNDg0Ni4yODJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHpMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNM # MIICNAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XhzqjAiGA8yMDI0MDIxNTExMjcz # OFoYDzIwMjQwMjE2MTEyNzM4WjBzMDkGCisGAQQBhFkKBAExKzApMAoCBQDpeHOq # AgEAMAYCAQACAQgwBwIBAAICEqwwCgIFAOl5xSoCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQsFAAOCAQEApMLbViYv2jdbOvOHgDGzHJHhT3R9Z6poCpm1/YGd93AfQK0I # ZAgVCGf/Gedb1FilWG49hKpxfS4O9Wn9Q8TotFpIejY91Tz9M6D1H5T/zBQ1huNo # eCQrgkwwZ9ysO+DOQ3U3M3yzJoSjx1KwhD9eZtDEibRtZ9Mnj+1xNHZDPvEAmbvC # mjpYhJSwTkjYcIip7SqMwEsYnBxSXzI+mMashrmBPWDkm94Gt0gtHdJl+MzkxLRy # DskP9rjCzXWhxhddYJXSh3J3MpITjwFMdPL3dL33W0/lCPiVK/IERNLv5qybzL0Z # DZH/Dk1Tl3gHKzEkyKaI7ffLUDlQQtA75tSHozGCBA0wggQJAgEBMIGTMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHsMA0G # CWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJ # KoZIhvcNAQkEMSIEIJPqaljP1LO/KMtiJjxSHN2W4Wo2z2bE8a/FrJVicMKqMIH6 # BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgJwnm9Wp9N8iHHbVAEFsrKj/FyJAh # dqgxZQt6MATVCoMwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAezgK6SC0JFSgAABAAAB7DAiBCBjKxcCuQDR64mXkyxZr022uyJUZzw7 # zxEL8Rn/VworzTANBgkqhkiG9w0BAQsFAASCAgCuiIN6vXrYjRtAlsIHOWjr6wa2 # 13YcGw+QW0ogvFwC5l5l8PRGr8h8niVXsx2SRQSG9xqVjhO0cZ5ZnSnPv/dXjVwq # HewCouEYYEG0T9jY2QNiiFWL4cE0oaC88G4tS4XldvbbdRa8TjDEKWrinITeO2qT # wjlD6rptPcpaV41riku2IpZZWaThVKKzcz3UmTIQTRKHU+WnJ3xg38FgGhDlNRxl # AsDUYPY6GpEMaVCphmcSTK+LFR0OhqJoXymxY/Qp7T2BDzLuO/gy/h5rmepyVZPz # EBmE79K7TnWiu1lcfciq3I2YcW3Vy9sfqIXrhkbUBm5ACxeuX2cloRJAntvbwPPw # xNR3UvOBSfs1F8ci1RAjQ/jGe8ijBarHkFC6EY08MLjOLvVlhA3NmVRu+GfjNSBD # YDvGXTdlJZUl9o7K0h+kyNByIbRG6vtGeJRVP20zHVOv7wKx0Ns6s55PuaBnXRn0 # NUkvvYPxy+G+DCQYm0eNr7w56p/YFWsshunuP7UjJcKZYqJtoLeoaQ/WM8cnTtMD # 8DTQKjkd/da6Ng/kzrKCHcBcmU+KhvbS7Fs6EdtvxhYDpWTuPNhS6p9IMgFZAkPh # SIlKwRZo+tK8T1oABZa8meLAmxRPVoC+jxqbTjLrme7PEhkBdkjjEOQsBrN4fEwl # w2qMh2SFr0RnHAwjWg== # SIG # End signature block
combined_dataset/train/non-malicious/sample_21_63.ps1
sample_21_63.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Set-AMTSystemDefense { <# .Synopsis Enables Intel Active Management Technology System Defense .Description This CmdLet disables network access using Intel Active Management Technology (AMT) System Defense from clients that have Intel AMT Firmware version 3.0 and Higher. .Notes Supported AMT Firmware Versions: 3.0 and higher AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This Cmdlet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Set-AMTSystemDefense vproclient.vprodemo.com -TLS ComputerName Port Status EnabledOnInterfaces ------------ ---- ------ ------------------- vproclient.vprodemo.com 16993 Successful Wireless1, Wired .Example Set-AMTSystemDefense vproclient 16992 -username:amtuser Will prompt for digest username password. ComputerName Port Status EnabledOnInterfaces ------------ ---- ------ ------------------- vproclient 16992 Successful Wireless1, Wired0 .Example Get-Content computers.txt | Set-AMTSystemDefense -TLS Will pull the list of amt clients from a text file and pipe them into Set-AMTSystemDefense ComputerName Port Status EnabledOnInterfaces ------------ ---- ------ ------------------- Computer1.vprodemo.com 16993 Successful Wireless1, Wired0 Computer2.vprodemo.com 16993 Successful Wired0 .Example Set-AMTSystemDefense vproclient.vprodemo.com -TLS -XMLConfig xmlfile.xml Here is the outline of the xml format, see 'System Defense' in the AMT SDK for more details. http://software.intel.com/sites/manageability/AMT_Implementation_and_Reference_Guide/default.htm <?xml version="1.0"?> <SystemDefensePolicySet> <ArrayOfFilter xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Filter xsi:type="AMT_Hdr8021Filter"> <Name/> <PolicyName/> <CreationClassName/> <SystemName/> <SystemCreationClassName/> <FilterProfile/> <FilterDirection/> <ActionEventOnMatch/> <HdrProtocolID8021/> </Filter> <Filter xsi:type="AMT_IPHeadersFilter"> <Name/> <PolicyName/> <CreationClassName/> <SystemName/> <SystemCreationClassName/> <HdrIPVersion/> <HdrProtocolID/> <FilterProfile/> <FilterDirection/> <ActionEventOnMatch/> <HdrDestAddress/> <HdrDestMask/> <HdrDestPortStart/> <HdrDestPortEnd/> </Filter> </ArrayOfFilter> <ArrayOfPolicies xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Policy xsi:type="AMT_systemDefensePolicy"> <PolicyName/> <PolicyPrecedence/> <AntiSpoofingSupport/> <TxDefaultDrop/> <TxDefaultMatchEvent/> <TxDefaultCount/> <RxDefaultDrop/> <RxDefaultMatchEvent/> <RxDefaultCount/> <Active/> </Policy> </ArrayOfPolicies> </SystemDefensePolicySet> #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Path to XMl configuration file")] [string] $XMLConfig ) PROCESS { $defaultXML = @' <?xml version="1.0"?> <SystemDefensePolicySet> <ArrayOfFilter xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Filter xsi:type="AMT_Hdr8021Filter"> <Name>defaultBlock</Name> <PolicyName>defaultPolicy</PolicyName> <CreationClassName>n/a</CreationClassName> <SystemName>n/a</SystemName> <SystemCreationClassName>n/a</SystemCreationClassName> <FilterProfile>1</FilterProfile> <FilterDirection>0</FilterDirection> <ActionEventOnMatch>false</ActionEventOnMatch> <HdrProtocolID8021>2048</HdrProtocolID8021> </Filter> </ArrayOfFilter> <ArrayOfPolicies xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Policy xsi:type="AMT_systemDefensePolicy"> <PolicyName>defaultPolicy</PolicyName> <PolicyPrecedence>0</PolicyPrecedence> <AntiSpoofingSupport>3</AntiSpoofingSupport> <TxDefaultDrop>false</TxDefaultDrop> <TxDefaultMatchEvent>false</TxDefaultMatchEvent> <TxDefaultCount>true</TxDefaultCount> <RxDefaultDrop>false</RxDefaultDrop> <RxDefaultMatchEvent>true</RxDefaultMatchEvent> <RxDefaultCount>false</RxDefaultCount> <Active>true</Active> </Policy> </ArrayOfPolicies> </SystemDefensePolicySet> '@ if($XMLConfig) { [xml]$data = get-content $XMLConfig } else { [xml]$data = $defaultXML } $filterList = $data.selectnodes("/SystemDefensePolicySet/ArrayOfFilter/Filter") $Results = @() try { $Obj = new-object psobject $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($credential.username.Length -gt 0) { $Connection.SetCredentials($credential.Username, $credential.Password) } elseif ($username.length -gt 0) { if ($password.length -gt 0) { $Connection.SetCredentials($username, $password) } else { $cred = Get-Credential $username $Connection.SetCredentials($cred.Username, $cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } Foreach ($comp in $ComputerName) { $Connection.SetHost($comp, $port) # Enable $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $port $EnabledInterfaces = "" $cport = $Connection.NewReference("http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_EthernetPort") try { $cportEnumeration = $cport.Enumerate($null, $null) } catch { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed" $Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value "" $Results += $Obj continue } Write-Output $Results $filterTable = @{} foreach($filter in $filterList) { if($filter.type -eq "AMT_Hdr8021Filter") { $AMT_Hdr8021Filter = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_Hdr8021Filter") $AMT_Hdr8021Filter.AddProperty("InstanceID","0") if($filter.Name) { $AMT_Hdr8021Filter.AddProperty("Name",$filter.Name) } if($filter.CreationClassName) { $AMT_Hdr8021Filter.AddProperty("CreationClassName",$filter.CreationClassName) } if($filter.SystemName) { $AMT_Hdr8021Filter.AddProperty("SystemName", $filter.SystemName) } if($filter.SystemCreationClassName) { $AMT_Hdr8021Filter.AddProperty("SystemCreationClassName", $filter.SystemCreationClassName) } if($filter.HdrProtocolID8021) { $AMT_Hdr8021Filter.AddProperty("HdrProtocolID8021", $filter.HdrProtocolID8021) } if($filter.FilterProfile) { $AMT_Hdr8021Filter.AddProperty("FilterProfile", $filter.FilterProfile) } if($filter.FilterDirection) { $AMT_Hdr8021Filter.AddProperty("FilterDirection", $filter.FilterDirection) } if($filter.ActionEventOnMatch) { $AMT_Hdr8021Filter.AddProperty("ActionEventOnMatch", $filter.ActionEventOnMatch) } if($filter.FilterProfileData) { $AMT_Hdr8021Filter.AddProperty("FilterProfileData", $filter.FilterProfileData) } $ID = $AMT_Hdr8021Filter.Create().Get().GetProperty("InstanceID").ToString() $filterTable[$ID] = $filter.PolicyName } if($filter.type -eq "AMT_IPHeadersFilter") { $AMT_IPHeadersFilter = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_IPHeadersFilter") $AMT_IPHeadersFilter.AddProperty("InstanceID","0") if($filter.Name) { $AMT_IPHeadersFilter.AddProperty("Name",$filter.Name) } if($filter.CreationClassName) { $AMT_IPHeadersFilter.AddProperty("CreationClassName",$filter.CreationClassName) } if($filter.SystemName) { $AMT_IPHeadersFilter.AddProperty("SystemName", $filter.SystemName) } if($filter.SystemCreationClassName) { $AMT_IPHeadersFilter.AddProperty("SystemCreationClassName", $filter.SystemCreationClassName) } if($filter.FilterProfile) { $AMT_IPHeadersFilter.AddProperty("FilterProfile", $filter.FilterProfile) } if($filter.FilterDirection) { $AMT_IPHeadersFilter.AddProperty("FilterDirection", $filter.FilterDirection) } if($filter.ActionEventOnMatch) { $AMT_IPHeadersFilter.AddProperty("ActionEventOnMatch", $filter.ActionEventOnMatch) } if($filter.HdrIPVersion) { $AMT_IPHeadersFilter.AddProperty("HdrIPVersion", $filter.HdrIPVersion) } if($filter.HdrSrcAddress) { $AMT_IPHeadersFilter.AddProperty("HdrDestAddress", $filter.HdrDestAddress) } if($filter.HdrSrcMask) { $AMT_IPHeadersFilter.AddProperty("HdrDestMask", $filter.HdrDestMask) } if($filter.HdrDestAddress) { $AMT_IPHeadersFilter.AddProperty("HdrDestAddress", $filter.HdrDestAddress) } if($filter.HdrDestMask) { $AMT_IPHeadersFilter.AddProperty("HdrDestMask", $filter.HdrDestMask) } if($filter.HdrProtocolID) { $AMT_IPHeadersFilter.AddProperty("HdrProtocolID", $filter.HdrProtocolID) } if($filter.HdrSrcPortStart) { $AMT_IPHeadersFilter.AddProperty("HdrSrcPortStart", $filter.HdrSrcPortStart) } if($filter.HdrSrcPortEnd) { $AMT_IPHeadersFilter.AddProperty("HdrSrcPortEnd", $filter.HdrSrcPortEnd) } if($filter.HdrDestPortStart) { $AMT_IPHeadersFilter.AddProperty("HdrDestPortStart", $filter.HdrDestPortStart) } if($filter.HdrDestPortEnd) { $AMT_IPHeadersFilter.AddProperty("HdrDestPortEnd", $filter.HdrDestPortEnd) } if($filter.TCPFlagsOn) { $AMT_IPHeadersFilter.AddProperty("TCPFlagsOn ", $filter.TCPFlagsOn) } if($filter.TCPFlagsOff) { $AMT_IPHeadersFilter.AddProperty("TCPFlagsOff ", $filter.TCPFlagsOff) } if($filter.FilterProfileData) { $AMT_IPHeadersFilter.AddProperty("FilterProfileData ", $filter.FilterProfileData) } $ID = $AMT_IPHeadersFilter.Create().Get().GetProperty("InstanceID").ToString() $filterTable[$ID] = $filter.PolicyName } } $policyList= $data.selectnodes("/SystemDefensePolicySet/ArrayOfPolicies/Policy") foreach($policy in $policyList) { $AMT_SystemDefensePolicy = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_SystemDefensePolicy") $AMT_SystemDefensePolicy.AddProperty("InstanceID","n/a") if($policy.PolicyName) { $AMT_SystemDefensePolicy.AddProperty("PolicyName", $policy.PolicyName) } if($policy.PolicyPrecedence) { $AMT_SystemDefensePolicy.AddProperty("PolicyPrecedence", $policy.PolicyPrecedence) } if($policy.AntiSpoofingSupport) { $AMT_SystemDefensePolicy.AddProperty("AntiSpoofingSupport", $policy.AntiSpoofingSupport) } if($policy.TxDefaultDrop) { $AMT_SystemDefensePolicy.AddProperty("TxDefaultDrop", $policy.TxDefaultDrop) } if($policy.TxDefaultMatchEvent) { $AMT_SystemDefensePolicy.AddProperty("TxDefaultMatchEvent", $policy.TxDefaultMatchEvent) } if($policy.TxDefaultCount) { $AMT_SystemDefensePolicy.AddProperty("TxDefaultCount", $policy.TxDefaultCount) } if($policy.RxDefaultDrop) { $AMT_SystemDefensePolicy.AddProperty("RxDefaultDrop", $policy.RxDefaultDrop) } if($policy.RxDefaultMatchEvent) { $AMT_SystemDefensePolicy.AddProperty("RxDefaultMatchEvent", $policy.RxDefaultMatchEvent) } if($policy.RxDefaultCount) { $AMT_SystemDefensePolicy.AddProperty("RxDefaultCount", $policy.RxDefaultCount) } foreach($filterID in $filterTable.GetEnumerator()) { if($filterID.Value -eq $policy.policyName) { $AMT_SystemDefensePolicy.AddProperty("FilterCreationHandles", $FilterID.Name) } } $Policy_EPR = $AMT_SystemDefensePolicy.Create() if($policy.Active) { $ActivePolicy_EPR = $Policy_EPR } } if($ActivePolicy_EPR) { while($cportEnumeration.HasNext) { $portReference = $cportEnumeration.Next().Object [System.String[]] $EthernetPort_KeyNames = "CreationClassName", "DeviceID", "SystemCreationClassName", "SystemName" $EthernetPort_EPR = $portReference.ToReference($EthernetPort_KeyNames) $NetworkPolicy = $Connection.NewInstance("http://intel.com/wbem/wscim/1/amt-schema/1/AMT_NetworkPortSystemDefensePolicy") $NetworkPolicy.AddProperty("Antecedent",$EthernetPort_EPR) $NetworkPolicy.AddProperty("Dependent",$ActivePolicy_EPR) $NetworkPolicy.AddProperty("Enabled","true") $NetworkPolicy.AddProperty("Active","true") $NetoworkPolicyObject = $NetworkPolicy.Create() $EthernetPortName = $portReference.GetProperty("Description").ToString() if($EnabledInterfaces -eq "") { $EnabledInterfaces = $EthernetPortName } else { $EnabledInterfaces = $EnabledInterfaces +", " + $EthernetPortName } } $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful" $Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value $EnabledInterfaces $Results += $Obj } } } catch { $Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Failed" $Obj | Add-Member -MemberType noteproperty -Name "EnabledOnInterfaces" -value $EnabledInterfaces $Obj | Add-Member -MemberType noteproperty -Name "Reason" -value $_.Exception.Message $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCACUNhrCKc7XPr8 # i909xe/EcFLpM5ZkevbwXYuwkm/ddKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgk4meK33fYzeHVKaX # SqOGxb7ce3AMqN8PLyI9vyBGCU0wDQYJKoZIhvcNAQEBBQAEggGAxv0bn5ogoz4+ # VVEln+wb2HbAulpb9uEuwxidPco0ndgK8bnzzWoInmwNAyTsij8PVitthcYykZOc # ot6viV2TAjP0vjTg1T5GntEp8WrPvUs4TwFSvYIy0EH++ScGICVSuIQ6ROiykcQx # aDUU2w8pYA5cbo6qP6y6coMoqNc5kf40UOFjBKgyQ9fCGlsNBYe2SqC0EtPzlkCs # HESqM34dhxk1szh8edNspPC7nZIk/oeViM2oa1ue+cAxYPmFVvePTegAfQF/HmVM # Cw+TSp6+lCbJ6QVOZKDtJPsbYk282TYay2Rt8mZw8Vq63t2XXJFN31pJuyEsaUHd # q776VPtJUBz9XoOSDApElJCx0V2SqjPY0+HH7m2WwSGcy5PO0qilAEJTX9U9ralz # NnWZ3Y3bbmEJLbq4znxve1JMqtvMbBiiNzJekcZKPLjYkZUfKKcXbpDrdwgpnYxJ # I9SqK9sMaVD8CSSpRWQRW6XgX19/1UtxOS0g3YAkK4Fj2M5Bs8TgoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIEffwjL4YXT30mMAC4YBOGPJ21rmJ/ubkL1/ # ADg8/78SAhUA6NxX+vb7Hc/mDRYpooR+Jam0B0QYDzIwMjEwNzE5MTYzMTI5WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMDcxOTE2MzEyOVowPwYJKoZIhvcNAQkEMTIEMJSLohN22yTd # ilzyab3FpJKt2IS30elZ+vUfApqZHFB31Eli4c7vW+S33I7MWBlT7zCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgAs7ESry0rR0oGZ9494mnnnfxXIfZqEyiOO0hOwc8ePSNXHZvBw # SPDfB67Vv921UaHPlyH+BgE+nNLDxRcNBLUPLs6VXFSUjw5PU653/PtwCOvGiT+a # dcKrVIE3tVUA0TndBcWvsRdgFXb4NIU2f7+B3E7aJeqBDhb9LgzjDgSoNlX0CdsD # PORTfg0e62Dfulua3oBJ6C5nLvwiH4Ve8sYF8tmn5zfh/AQqH5D6xGjYoJVTYj9a # D+hzUKtfB+4ANeB8rd8kV6x+kextpOFMewRcObeOjdcpRXsKwd+UJ/PSWJ1OuCud # ySawmeysWiaZhFdrnk+yiLEF/4ddwWRMmTqZD/Eo4mIVXyeByKvMVNN5Hvtn0mju # PjviynJruume3jLKsy4qx+nAOkTHrrbMR/rXqXWG6k49D17cQZtxV1EqU7pV2JNL # TRMiorZB2+ejttqduup3a05y12rTBbnwZhBuCcjBge5LaWh4E3RWJUIEhwQh7I1D # 1sTh4xqir+4uZdcnkiFhsUTEttrfvcJzANr6wATxH68S6565onHGM5ly2SHs4Fit # zkhBfoCTdTAB3qSusU+6aXU3Y7QOr0SfbkKWZwCbAylNTiQxMqr7JGXl7dDfCNRp # UmMxtEnmFmwa7JvL3ZtZaPT2+k5J71s0FKN1KrMOzp/kMEe28hKcZLy9rg== # SIG # End signature block
combined_dataset/train/non-malicious/sample_33_81.ps1
sample_33_81.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq # aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy # QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs # 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6 # 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf # L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4 # XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V # pyexP/sw9u51ejlEtaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3 # DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB # BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8 # TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZbqiZwUPGBMyMDI0MDIx # NzIxMDgzMi44MjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJC # MC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # eDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5 # WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgd # LaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrA # Brfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879 # lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahN # kFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoF # Y1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCS # baFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA # 0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLq # GwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvH # Vp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2 # xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T # 1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDS # mdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B # Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yV # A1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1 # iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr # /kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCe # RBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZ # tbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukH # o16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KO # uKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kau # x9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7 # Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y # 0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R # 3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN # BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y # aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi # vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G # awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm # ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks # UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr # g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B # mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR # c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR # RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR # lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS # xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd # MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa # voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD # VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud # JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G # CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix # BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY # Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5 # 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU # hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM # vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A # PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN # n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs # c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1 # 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g # MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm # 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0 # aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAt # ODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB # MAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOl7iP0wIhgP # MjAyNDAyMTgwMzM1MjVaGA8yMDI0MDIxOTAzMzUyNVowdDA6BgorBgEEAYRZCgQB # MSwwKjAKAgUA6XuI/QIBADAHAgEAAgIa5TAHAgEAAgIS4zAKAgUA6XzafQIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFtYlpEGtEyeVRC9n4FJXnGlonWiBlIU # gK5OMO1jPhddE2nOVMkta740zRACOGDBhSUxfsK1AZTfffdGxNjkNEDXGkHPVjsU # JtTJOe+wrEDXpEytL2m8l+YqTLtYuY/VHNG6lNe8pQuFBdGARzLHoRRUk96UY1uD # HvUqebJaSTLvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg4crXMZf5 # gXJ8mACDpj77PtaJMhA/vdTGmXR0UDGo99IwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEA # AAHgMCIEIK+uByFerfFXIOYHXUGMvWUxa2sANq0pAaxyz0zcIn7UMA0GCSqGSIb3 # DQEBCwUABIICAEQQEZu9z1nrZxuBTTn/uFosxi3/+XjK3ZncBmJ6/5SoyabdV+Hf # OKwJ7Th5riDFJToBXkTo5Xpb/cbpvv6WEAl496MTUCEuh9paxQHJf31jh8ISSr92 # kf7gMlGqlNIRtQHX/UooczrX1hbpLUg8TAr+FOBmZ+uS2HUu62dKKMksrDzQLiXZ # A8M+V/RPMHqV3d3JrpZudhMIdhcI4Kk6x12YVU2c3SKk6ns1B6x8pLQua+0SN/VV # Oxlmm6RLfUYzOpc7k3ZJQTBHePux7aNEyGnrfTm/ehlqdGXjTee8LluzgCSKJLIt # 54YglQHv1ivWJDGEiJplV2G5kwL5xNBfGCUAmjjHRKvoowRYTtoAxr9WI6qHBIPc # eKUaS3cPMNLO+fFuvJ5Y12+MYmU58/WIAAG9OQdq/OmjCGr7+AEDiHshDnwPGJ9s # 4vuG0pnmFcYigRPwuTgfnRascUxzPiE6i5mZfKei9/u+LEKrO7+71nk46qv+IT3h # Hzlioh9uehW8Qank711Bfpi8gI6e2GYApCrUSBjfRV35ztVK//FHXOHQalTzUS73 # JsnDJEAotNaCAofeUkPNlM6hMCXXG2EqkZlljuvdj34ZjxzjKVLdpEzBIhysOZF+ # twAQYCLmlehgafOfKXwuHhlDuk1PMKCa8UiOzKSIC2QkSeTQDphEwgvc # SIG # End signature block
combined_dataset/train/non-malicious/sample_19_80.ps1
sample_19_80.ps1
--- title: Powershell description: Powershell snippets on the rocks. --- ## [cotrWhileLoop](/snippets/cotrwhileloop) PowerShell While Loop ```powershell while (${1:condition}) { # Your code here } ``` ## [cotrEqual](/snippets/cotrequal) PowerShell Equal To ```powershell -eq ``` ## [cotrNotEqual](/snippets/cotrnotequal) PowerShell Not Equal To ```powershell -ne ``` ## [cotrTypesBoolTrue](/snippets/cotrtypesbooltrue) PowerShell Boolean True ```powershell $true ``` ## [cotrVarStringMulti](/snippets/cotrvarstringmulti) PowerShell Create Multi-Line String Variable ```powershell $${1:myString} = @" ${2:Line 1} ${3:Line 2} ${4:Line 3} "@; ``` ## [cotrTypeCompare](/snippets/cotrtypecompare) PowerShell Type Comparison ```powershell # Check if two variables have the same type: if (${1:variable1}.GetType() -eq ${2:variable2}.GetType()) { # Your code here } ``` ## [cotrTypes](/snippets/cotrtypes) PowerShell Types ```powershell $BLOCK_COMMENT_START PowerShell is a dynamically typed language. Some common types in PowerShell include: - [int]: Integer - [double]: Double-precision floating-point number - [string]: String - [bool]: Boolean - [array]: Array - [hashtable]: Hash table (associative array) - [datetime]: Date and time - [PSCustomObject]: Custom object - [System.Collections.Hashtable]: .NET Hashtable - [System.Collections.Generic.List[T]]: .NET Generic List - [System.Management.Automation.PSObject]: PowerShell object $BLOCK_COMMENT_END ``` ## [cotrTypesNum](/snippets/cotrtypesnum) PowerShell Double Type ```powershell [double] ``` ## [cotrPrintMulti](/snippets/cotrprintmulti) PowerShell Print Multi ```powershell Write-Host @" ${1:Line 1} ${2:Line 2} ${3:Line 3} "@; ``` ## [cotrOperators](/snippets/cotroperators) PowerShell Mathematical Operators ```powershell # PowerShell Mathematical Operators # Addition: + # Subtraction: - # Multiplication: * # Division: / # Modulus (Remainder): % # Exponentiation: Not directly supported, use [Math]::Pow(base, exponent) # Increment: Use += 1 # Decrement: Use -= 1 # Assignment: = # Addition assignment: += # Subtraction assignment: -= # Multiplication assignment: *= # Division assignment: /= # Modulus assignment: %= ``` ## [cotrVar](/snippets/cotrvar) PowerShell Create Variable ```powershell $${1:myVar} = $2 ``` ## [cotrConst](/snippets/cotrconst) PowerShell Create Constant ```powershell $${1:myConst} = $2 ``` ## [cotrInfo](/snippets/cotrinfo) PowerShell Info ```powershell # Typing: Dynamically typed # Paradigm: Object-oriented, imperative, scripting # Compilation: Interpreted # Concurrency: Supports multi-threading with the System.Threading namespace ``` ## [cotrConcat](/snippets/cotrconcat) PowerShell Concatenate Strings ```powershell "${1:string1}" + "${2:string2}" ``` ## [cotrFuncLambda](/snippets/cotrfunclambda) PowerShell Lambda Function (Script Block) ```powershell # PowerShell does not have a 'lambda' keyword. # Instead, script blocks are used as anonymous functions. $lambda = { param(${1:parameters}) ${2:# Your code here} } # Usage $result = $lambda.Invoke(${3:arguments}) Write-Host "Result: $result" ``` ## [cotrFuncArrow](/snippets/cotrfuncarrow) PowerShell Arrow Function ```powershell {${1:parameters} -> ${2:# Your code here} } ``` ## [cotrVarBool](/snippets/cotrvarbool) PowerShell Create Boolean Variable ```powershell $${1:myBool} = ${2:$true} ``` ## [cotrVarList](/snippets/cotrvarlist) PowerShell Create Array Variable ```powershell $${1:myArray} = @(${2:items}) ``` ## [cotrForLoop](/snippets/cotrforloop) PowerShell For Loop ```powershell for ($${1:i} = 0; $1 -lt ${2:10}; $1++) { # Your code here } ``` ## [cotrOperatorsBool](/snippets/cotroperatorsbool) PowerShell Boolean Operators ```powershell # PowerShell Boolean Operators # Logical AND: -and # Logical OR: -or # Logical NOT: -not # Equality: -eq # Inequality: -ne # Greater than: -gt # Less than: -lt # Greater than or equal to: -ge # Less than or equal to: -le ``` ## [cotrNow](/snippets/cotrnow) PowerShell Date Now ```powershell Get-Date ``` ## [cotrIf](/snippets/cotrif) PowerShell If Statement ```powershell if (${1:condition}) { # Your code here } ``` ## [cotrFuncArgs](/snippets/cotrfuncargs) PowerShell Function Args ```powershell # In PowerShell, functions can have arguments with default values. function ${2:myFunction} { param ( [${3:Type}] $${4:arg1}, [${5:Type}] $${6:arg2} = ${7:defaultValue} ) ${8:# Your code here} } ``` ## [cotrThrow](/snippets/cotrthrow) PowerShell Throw Exception ```powershell throw '${1:Your message here}' ``` ## [cotrTernary](/snippets/cotrternary) PowerShell Ternary Operator ```powershell ${1:condition} ? ${2:trueValue} : ${3:falseValue} ``` ## [cotrFuncSyntax](/snippets/cotrfuncsyntax) PowerShell Function Syntax ```powershell # PowerShell Function Syntax # Basic function: # function functionName { # param ( # parameters # ) # # Your code here # } # Function with arguments: # function functionName { # param ( # [Type] $arg1, # [Type] $arg2, # ... # ) # # Your code here # } ``` ## [cotrStructure](/snippets/cotrstructure) PowerShell Project Structure (High-Level) ```powershell # Recommended High-Level PowerShell Project Structure: # - / # - README.md: Documentation about the project. # - .ps1 files: Individual PowerShell script files. # - /src # - Contains PowerShell modules or scripts organized by functionality. # - /tests # - Contains Pester tests for testing your PowerShell scripts and modules. # - /lib # - Optional: Contains third-party libraries or scripts used in the project. # - /docs # - Optional: Additional documentation, help files, or related documents. # - /tools # - Optional: Utility and helper scripts that assist with project tasks. # - /output # - Optional: A location to store output files generated by scripts. # Note: # - Organize .ps1 script files and modules in the src folder for clarity. # - Use descriptive names for script files to indicate their purpose or function. ``` ## [cotrTypesDate](/snippets/cotrtypesdate) PowerShell Date Type ```powershell [datetime] ``` ## [cotrVarNullable](/snippets/cotrvarnullable) PowerShell Create Nullable Variable ```powershell $${1:myVar} = $null ``` ## [cotrVarDate](/snippets/cotrvardate) PowerShell Create Date Variable ```powershell $${1:myDate} = Get-Date -Year ${2:year} -Month ${3:month} -Day ${4:day} ``` ## [cotrVarSyntax](/snippets/cotrvarsyntax) PowerShell Variable Declaration Syntax ```powershell # PowerShell Variable Declaration Syntax: # - $: (Scope: Global or Function) # - Variables start with a dollar sign. # - Can be reassigned and redeclared within their scope. # - Use with caution due to potential scoping issues. # - const: (Scope: Global) # - Cannot be reassigned or redeclared. # - Use for values that should remain constant. # Note: # - PHP does not have a direct equivalent to 'let'. # - Use '$' for most variable declarations. # - Use 'const' for values that are known at compile time. ``` ## [cotrFuncArgsNamed](/snippets/cotrfuncargsnamed) PowerShell Named Arguments Function ```powershell function ${2:MyFunction} { param( [Parameter(Mandatory)] [${3:type}] ${4:$arg1}, [Parameter(Mandatory)] [${5:type}] ${6:$arg2} ) ${7:# Your code here} } ``` ## [cotrClass](/snippets/cotrclass) PowerShell Class ```powershell class ${1:MyClass} { # Your code here } ``` ## [cotrTypesString](/snippets/cotrtypesstring) PowerShell String Type ```powershell [string] ``` ## [cotrForEachLoop](/snippets/cotrforeachloop) PowerShell For Each Loop ```powershell foreach ($${1:item} in ${2:iterable}) { # Your code here } ``` ## [cotrFunc](/snippets/cotrfunc) PowerShell Function ```powershell function ${2:myFunction} { param ( ${3:parameters} ) ${4:# Your code here} } ``` ## [cotrInterpolate](/snippets/cotrinterpolate) PowerShell Interpolate String ```powershell "Your string here $${1:variable}" ``` ## [cotrVarMap](/snippets/cotrvarmap) PowerShell Create Hash Table Variable ```powershell $${1:myHashTable} = @{ ${2:key1} = ${3:value1} ${4:key2} = ${5:value2} # Add more key-value pairs here } ``` ## [cotrFuncAnon](/snippets/cotrfuncanon) PowerShell Anonymous Function ```powershell { param(${1:parameters}) ${2:# Your code here} } ``` ## [cotrTypesBool](/snippets/cotrtypesbool) PowerShell Boolean Type ```powershell [bool] ``` ## [cotrTypesBoolFalse](/snippets/cotrtypesboolfalse) PowerShell Boolean False ```powershell $false ``` ## [cotrTypesDynamic](/snippets/cotrtypesdynamic) PowerShell Dynamic Type ```powershell # PowerShell is a dynamically typed language. ``` ## [cotrTypesInt](/snippets/cotrtypesint) PowerShell Integer Type ```powershell [int] ``` ## [cotrVarNum](/snippets/cotrvarnum) PowerShell Create Double Variable ```powershell $${1:myDouble} = ${2:0.0} ``` ## [cotrIfElse](/snippets/cotrifelse) PowerShell If Else Statement ```powershell if (${1:condition}) { # Your code here } else { # Your code here } ``` ## [cotrVarStatic](/snippets/cotrvarstatic) PowerShell Static Variable ```powershell # PowerShell does not have static variables in the same way as some other languages. # You can use class variables or module variables to achieve similar functionality. ``` ## [cotrTypesList](/snippets/cotrtypeslist) PowerShell List Type ```powershell [array] ``` ## [cotrTypesNull](/snippets/cotrtypesnull) PowerShell Null Type ```powershell $null ``` ## [cotrVarTyped](/snippets/cotrvartyped) PowerShell Create Typed Variable ```powershell [${1:Type}] $${2:myVar} = $3 ``` ## [cotrFuncArgs](/snippets/cotrfuncargs) PowerShell Function Arguments ```powershell # In PowerShell, functions can have arguments with default values. function ${2:myFunction} { param ( [${3:Type}] $${4:arg1}, [${5:Type}] $${6:arg2} = ${7:defaultValue} ) ${8:# Your code here} } ``` ## [cotrTypeCheck](/snippets/cotrtypecheck) PowerShell Type Check ```powershell ${1:variable}.GetType() ``` ## [cotrVarString](/snippets/cotrvarstring) PowerShell Create String Variable ```powershell $${1:myString} = "${2:Your string here}" ``` ## [cotrVarInt](/snippets/cotrvarint) PowerShell Create Integer Variable ```powershell $${1:myInt} = ${2:0} ``` ## [cotrSwitch](/snippets/cotrswitch) PowerShell Switch Statement ```powershell switch (${1:variable}) { ${2:value1} { # Your code here break } ${3:value2} { # Your code here break } default { # Your code here } } ``` ## [cotrGenMap](/snippets/cotrgenmap) PowerShell Generate Map ```powershell # PowerShell does not have a built-in way to generate a map with a specific number of key-value pairs. # You can use a loop or a custom function to achieve this. ``` ## [cotrTypeConvert](/snippets/cotrtypeconvert) PowerShell Type Conversion ```powershell # PowerShell Type Conversion: # Explicit conversions: # - [Type]variable // Type casting (can throw an error if conversion fails) # - variable.ToString() // Converts to string # - [int]variable // Converts to integer # - [double]variable // Converts to double # - ... (Various conversion methods and type accelerators) # Note: # - Be cautious with type casting, as it can lead to errors if the conversion is not valid. ``` ## [cotrTypesMap](/snippets/cotrtypesmap) PowerShell Map Type ```powershell [hashtable] ``` ## [cotrEntry](/snippets/cotrentry) PowerShell Entry Point ```powershell # PowerShell Entry Point # To run this script, use: `powershell filename.ps1` Write-Host 'Hello, World!' ``` ## [cotrComment](/snippets/cotrcomment) PowerShell Comment ```powershell # ${1:Your comment here} ``` ## [cotrGenList](/snippets/cotrgenlist) PowerShell Generate List ```powershell 1..${1:length} | ForEach-Object { ${2:'item'} + $_ } ``` ## [cotrPrint](/snippets/cotrprint) PowerShell Print ```powershell Write-Host ${1:'Your message here'} ``` ## [cotrCommentMulti](/snippets/cotrcommentmulti) PowerShell Multi-Line Comment ```powershell <# ${1:Your comment here} #> ``` ## [cotrTryCatch](/snippets/cotrtrycatch) PowerShell Try Catch ```powershell try { # Your code here } catch { # Your code here } ```
combined_dataset/train/non-malicious/Add-ObjectCollector.ps1
Add-ObjectCollector.ps1
##############################################################################\n##\n## Add-ObjectCollector\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nAdds a new Out-Default command wrapper to store up to 500 elements from\nthe previous command. This wrapper stores output in the $ll variable.\n\n.EXAMPLE\n\nPS >Get-Command $pshome\\powershell.exe\n\nCommandType Name Definition\n----------- ---- ----------\nApplication powershell.exe C:\\Windows\\System32\\Windo...\n\nPS >$ll.Definition\nC:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\n\n.NOTES\n\nThis command builds on New-CommandWrapper, also included in the Windows\nPowerShell Cookbook.\n\n#>\n\nSet-StrictMode -Version Latest\n\nNew-CommandWrapper Out-Default `\n -Begin {\n $cachedOutput = New-Object System.Collections.ArrayList\n } `\n -Process {\n ## If we get an input object, add it to our list of objects\n if($_ -ne $null) { $null = $cachedOutput.Add($_) }\n while($cachedOutput.Count -gt 500) { $cachedOutput.RemoveAt(0) }\n } `\n -End {\n ## Be sure we got objects that were not just errors (\n ## so that we don't wipe out the saved output when we get errors\n ## trying to work with it.)\n ## Also don't caputre formatting information, as those objects\n ## can't be worked with.\n $uniqueOutput = $cachedOutput | Foreach-Object {\n $_.GetType().FullName } | Select -Unique\n $containsInterestingTypes = ($uniqueOutput -notcontains `\n "System.Management.Automation.ErrorRecord") -and\n ($uniqueOutput -notlike `\n "Microsoft.PowerShell.Commands.Internal.Format.*")\n\n ## If we actually had output, and it was interesting information,\n ## save the output into the $ll variable\n if(($cachedOutput.Count -gt 0) -and $containsInterestingTypes)\n {\n $GLOBAL:ll = $cachedOutput | % { $_ }\n }\n }
combined_dataset/train/non-malicious/sample_43_77.ps1
sample_43_77.ps1
# # Module manifest for module 'OCI.PSModules.Vault' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vault.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ba73e404-e836-4026-8200-8a6ebc3e6927' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vault Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vault.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVaultSecret', 'Get-OCIVaultSecretsList', 'Get-OCIVaultSecretVersion', 'Get-OCIVaultSecretVersionsList', 'Invoke-OCIVaultRotateSecret', 'Invoke-OCIVaultScheduleSecretDeletion', 'Invoke-OCIVaultScheduleSecretVersionDeletion', 'Move-OCIVaultSecretCompartment', 'New-OCIVaultSecret', 'Stop-OCIVaultSecretDeletion', 'Stop-OCIVaultSecretRotation', 'Stop-OCIVaultSecretVersionDeletion', 'Update-OCIVaultSecret' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vault' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_35_31.ps1
sample_35_31.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2022 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "", Scope="function")] Param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Set-IntelEthernetSetting { [CmdletBinding()] Param( [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null, [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $DisplayName = '', [parameter(Mandatory = $false)] [ValidateNotNullOrEmpty()] [object] $DisplayValue = $null, [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $RegistryKeyword = '', [parameter(Mandatory = $false)] [ValidateNotNullOrEmpty()] [object] $RegistryValue = $null, [parameter(Mandatory = $false)] [ValidateNotNullOrEmpty()] [object[]] $Setting = $null, [parameter(Mandatory = $false)] [switch] $Reset ) Begin { $AdapterName = $Name $script:ErrorMessagesSet = @() $script:WarningMessagesSet = @() $FinalObject = @() GetIntelEthernetDevices @('icei*', 'i40ei*') if ($script:SupportedAdapters) { $script:MSNetAdapters = Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue } $script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue) } Process { $Adapters = $Adapter if (IsSettingObject $Adapters) { $Setting = $Adapters $Adapters = $null } do { if (!(ValidateParams $DisplayName $DisplayValue $RegistryKeyword $RegistryValue $Setting $AdapterName $Adapters)) { break } if ($null -ne $Setting) { $PreProcessedAdapterNames = ValidateSetAdapterNameParams $Setting.Name $null ([ref]$script:ErrorMessagesSet) $AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesSet) | Get-Unique) } else { $PreProcessedAdapterNames = ValidateSetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesSet) $AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesSet)) } try { $PreErrorActionPreference = $global:ErrorActionPreference $global:ErrorActionPreference = 'SilentlyContinue' foreach ($a in $AdapterNamesArray) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:ErrorMessagesSet += $TmpStatusMsg } $script:isProfileSetting = $false $AdapterSettings = @() if ($null -ne $Setting) { $AdapterSettings = GetSetSettings $null $Setting.RegistryKeyword $a } else { $AdapterSettings = GetSetSettings $DisplayName $RegistryKeyword $a } if ($AdapterSettings.RegistryKeyword -Contains 'NetworkAddress' -and -not $Reset) { if ($false -eq (ValidateLAASetting $DisplayValue $RegistryValue)) { break } } if ($script:isProfileSetting) { $FinalObject += SetProfileSettings $a $DisplayValue $RegistryValue } foreach ($adapterSetting in $AdapterSettings) { if ($null -ne $DisplayValue) { Set-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName -DisplayValue $DisplayValue $FinalObject += ValidateSetting $adapterSetting $DisplayValue $null $a } elseif ($null -ne $RegistryValue) { Set-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName -RegistryValue $RegistryValue $FinalObject += ValidateSetting $adapterSetting $null $RegistryValue $a } elseif ($Reset) { Reset-NetAdapterAdvancedProperty -InterfaceDescription $a -DisplayName $adapterSetting.DisplayName $FinalObject += ValidateSetting $adapterSetting $adapterSetting.DefaultDisplayValue $null $a } } } } finally { $global:ErrorActionPreference = $PreErrorActionPreference } } while ($false) } End { $FinalObject foreach ($WarningMessage in $script:WarningMessagesSet) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesSet) { Write-Error $ErrorMessage } } } function ValidateParams($DisplayName, $DisplayValue, $RegistryKeyword, $RegistryValue, $Setting, $AdapterName, $Adapters) { $bContinue = $true do { # if DisplayName, RegistryKeyword, & Setting are not used, or both DisplayName & RegistryKeyword are used - stop execution if (([string]::IsNullOrEmpty($DisplayName) -and [string]::IsNullOrEmpty($RegistryKeyword) -and $null -eq $Setting) -or (-not [string]::IsNullOrEmpty($DisplayName) -and -not [string]::IsNullOrEmpty($RegistryKeyword))) { $bContinue = $false break } # if both DisplayValue & RegistryValue are not used & Reset isn't used, or both DisplayValue & RegistryValue are used - stop exection if (([string]::IsNullOrEmpty($DisplayValue) -and [string]::IsNullOrEmpty($RegistryValue) -and -not $Reset) -or (-not [string]::IsNullOrEmpty($DisplayValue) -and -not [string]::IsNullOrEmpty($RegistryValue))) { $bContinue = $false break } # if either DisplayValue & RegistryValue are used and $Reset is used - stop execution if (-not [string]::IsNullOrEmpty($DisplayValue) -or -not [string]::IsNullOrEmpty($RegistryValue) -and $Reset) { $bContinue = $false break } # if Setting is used and either DisplayName, RegistryKeyword are used - stop execution if ($null -ne $Setting -and (-not [string]::IsNullOrEmpty($DisplayName) -or -not [string]::IsNullOrEmpty($RegistryKeyword))) { $bContinue = $false break } # if Setting is used and either $AdapterName or $Adapters is used - stop execution if ($null -ne $Setting -and (-not [string]::IsNullOrEmpty($AdapterName) -or $Adapters)) { $bContinue = $false break } } while ($false) if ($false -eq $bContinue) { $script:ErrorMessagesSet += $Messages.InvalidParams } return $bContinue } function GetSetSettings($DisplayName, $RegistryKeyword, $AdapterName) { $SettingArray = @() if (-not [string]::IsNullOrEmpty($DisplayName)) { foreach ($TmpDisplayName in $DisplayName) { if ($TmpDisplayName -eq 'Profile') { $script:isProfileSetting = $true } else { $TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.DisplayName -like $TmpDisplayName}) if (-not $TmpSetting) { $script:ErrorMessagesSet += $Messages.InvalidSetting -f $AdapterName, $TmpDisplayName } else { $SettingArray += $TmpSetting } } } } if (-not [string]::IsNullOrEmpty($RegistryKeyword)) { foreach ($TmpRegistryKeyword in $RegistryKeyword) { if ($TmpRegistryKeyword -eq 'PerformanceProfile') { $script:isProfileSetting = $true } else { $TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -like $TmpRegistryKeyword}) if (-not $TmpSetting) { $script:ErrorMessagesSet += $Messages.InvalidSetting -f $AdapterName, $TmpRegistryKeyword } else { $SettingArray += $TmpSetting } } } } return $SettingArray } function ValidateSetting($Setting, $DisplayValue = $null, $RegistryValue = $null, $AdapterName) { $IntelEthernetSetting = Get-IntelEthernetSetting -Name $a -DisplayName $Setting.DisplayName -WarningAction:SilentlyContinue # setting type 'int' if ($null -ne $IntelEthernetSetting.PSTypeNames -and $IntelEthernetSetting.PSTypeNames[0] -eq "IntelEthernetSettingInt") { if ($null -ne $DisplayValue) { $SettingIntValue = $DisplayValue } else { $SettingIntValue = $RegistryValue } $bValidIntValue = $false # check if numeric value if ($SettingIntValue -match "^[\d]+$") { if ([int]$SettingIntValue -ge $IntelEthernetSetting.Min -and [int]$SettingIntValue -le $IntelEthernetSetting.Max) { if (($SettingIntValue % $IntelEthernetSetting.Step) -eq 0) { $bValidIntValue = $true } } } if (-not $bValidIntValue) { $script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $SettingIntValue, $Setting.RegistryKeyword } elseif ($SettingIntValue -ne $IntelEthernetSetting.DisplayValue) { $script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.RegistryKeyword } else { return $IntelEthernetSetting } } else { $bValidEnumValue = $false if ($null -ne $DisplayValue) { if ($IntelEthernetSetting.DescriptionMap -notcontains $DisplayValue -and $IntelEthernetSetting.RegistryKeyword -ne "NetworkAddress") { $script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $DisplayValue, $Setting.RegistryKeyword } elseif ($DisplayValue.ToString() -ne $IntelEthernetSetting.DisplayValue) { $script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.DisplayName } else { $bValidEnumValue = $true } } elseif ($null -ne $RegistryValue) { if ($IntelEthernetSetting.PossibleValues -notcontains $RegistryValue -and $IntelEthernetSetting.RegistryKeyword -ne "NetworkAddress") { $script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $RegistryValue, $Setting.RegistryKeyword } elseif (($RegistryValue.ToString() -ne $IntelEthernetSetting.RegistryValue)) { $script:ErrorMessagesSet += $Messages.GenericFailure -f $AdapterName, "Set", $Setting.DisplayName } else { $bValidEnumValue = $true } } if ($bValidEnumValue) { return $IntelEthernetSetting } } } function ValidateLAASetting($DisplayValue, $RegistryValue) { $Valid = $False do { if (-not [string]::IsNullOrEmpty($DisplayValue)) { $Value = $DisplayValue } else { $Value = $RegistryValue } # first check if the string has correct length if ($Value.Length -eq $NETWORK_ADDRESS_LEN) { # filter out all non-hexadecimal numbers try { $ValueInt = [Convert]::ToUInt64($Value, 16) } catch { break } # check for reserved and multicast addresses if ($ValueInt -band 0x010000000000 -or $ValueInt -eq 0 -or $ValueInt -eq 0xFFFFFFFFFFFF) { break } $Valid = $True } } while($false) if ($false -eq $Valid) { $script:ErrorMessagesSet += $Messages.InvalidSettingValueGeneric } return $Valid } function IsSettingObject($PipedObject) { $bSettingObject = $false if ($null -ne $PipedObject -and $null -ne $PipedObject[0].PSTypeNames -and ($PipedObject[0].PSTypeNames[0]).Contains("IntelEthernetSetting")) { $bSettingObject = $true } return $bSettingObject } function SetProfileSettings($AdapterName, $DisplayValue, $RegistryValue) { $ProfileSetting = InitializeProfileSetting $AdapterName if ($null -ne $DisplayValue) { if ($ProfileSetting.DescriptionMap -notcontains $DisplayValue) { $script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $DisplayValue, $ProfileSetting.RegistryKeyword } else { $ProfileRegValue = $PROFILE_VALUE_TO_NAME.GetEnumerator().Where({ $_.Value -eq $DisplayValue}).Name } } elseif ($null -ne $RegistryValue) { if ($ProfileSetting.PossibleValues -notcontains $RegistryValue) { $script:ErrorMessagesSet += $Messages.InvalidSettingValue -f $AdapterName, $RegistryValue, $ProfileSetting.RegistryKeyword } else { $ProfileRegValue = $RegistryValue } } elseif ($Reset) { $ProfileRegValue = $ProfileSetting.DefaultValue } if ($null -ne $ProfileRegValue) { SetAdapterPropertyInRegistry $AdapterName 'PerformanceProfile' $ProfileRegValue $DriverFamily = $script:SupportedAdapters.Where({ $_.Name -eq $AdapterName }).Service $ProfileCmdletValName = $PROFILE_VALUE_TO_NAME[$ProfileRegValue.ToString()] $tmp = GetProfileSettingsFromXml $ProfileCmdletValName $DriverFamily $tmp.GetEnumerator().ForEach( { Set-NetAdapterAdvancedProperty -InterfaceDescription $AdapterName -RegistryKeyword $_.Key -RegistryValue $_.Value }) $script:MSNetAdvProperty = Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue return InitializeProfileSetting $AdapterName } } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCLN5FwYb/sNfWG # 5Obua/HWn5GcYyrg0JLLeysq+NyofKCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEINiKB+8wp2n1Rs0gY2wRzNPt # tiMQzH/P+J7mPNFw/vOhMA0GCSqGSIb3DQEBAQUABIIBgD1qErMehAXGSBBhXHmB # YIz2PrMmt9rAsvAXLR3/5q2jDyqBMolpI1YyOCH0wki3Y7WliPHz/GzlsRo4vOmS # K+zv3yff2GAmNaUZwNZSOtG0p22ac4L+yreh3874AIpTupfDLr3pzD6gh+3ECx7Y # iW5ZO4+wjgXDPUf5bW90FJg4i60VU/Z1qCJlGN/g3NTRKcGfuUYbZi923v8zq9iS # UXNO9KAnICjPlpqWsbyTLyvbrsO6vm6PG0Co58c3D7S0W+I4v0H2zgKzKDJ/OvMK # szvkkvFC6CctnlO0ftATZG6gSQfOtOh9HheFNtWG53N9T9lP+ijNcmBsoFIOLqk9 # rqaMdhruPP1yTJwhxTUEv6qJX2DCTJxzwBud8p2MQCxk1oYzVFMN00wCVZbZRnyR # uZWDb33UGaFSAPZVV3QyxOx6DWuk9U7jIbWQ0gjVveeTTC1nmCSIVggV8jYGd2+I # bkEJ3OYklkfv4/v5nB9xQVrM04NF+35It+9fMz3DB32XoaGCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIJ11Mo1LX5NzhCshrkMchH/J5X9lkObcPmQ8GK4Gv3+O # AhUAgT+x5PqWp+vSV3Ri5wT2AaynSrMYDzIwMjQwMzE4MTgyNDA1WqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDMxODE4MjQwNVowPwYJKoZIhvcNAQkEMTIEMPp728MiFIMIov1uREdq # Vr7lCLZEmPxjsnPMaJyqTpwJTAnXXK66NfLNag6o9h+kNTCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgCKoZmAI/TyR5Z54SeozGxPczqwiJ4SSN01Y/cgjaxeUrC22iHgv2Tk2vGU # 7FeeXrJupqrnErRiQfA43J3rS24xSIgLsSw8JctyiRFkKUDuC0E1N3+SUOA8eu0J # IiFaz1BniqaTLZTigNZbb5suJ/GnviWIMLt45M7xbeqeKkjI7bBGO1NHcUcM69g1 # cNyMl9w+2+SjbAtLUm7WFArjwsItXkZTSkoCfM5iWxi3u2ZOF/g2lkDV5gkwfn6d # SBVKHhMcEx/hbU+ahk4x39VmatfxxTYGrtwL0UPzW0sr6JuidJSGyIkPNWlr7BWO # oNLgJr6XT6lgTBSnETJBPXzBuIR4SRiPpuKWqupFFQ9xvVZgnJ0hlqgkudzZzTx0 # MscdIXAQugggOXR6mMKv1fQEFD36Jv1pWt6Xxea4xIsTUwTIjvkctluXyTCtKa21 # fQWsj/vK6md+rExpGL2Pj3xlMDx9tyO92I+851ncDgAKdj91C9sCf7zi7G1Xm/Ad # erthSv2CszcI6HQBJkiwLJXVFe2pATABykQVoif4R8eoIr0RaIieJQKVQ3KKqXs2 # BxNHeOFWbV/C+fvZ4T2UGPdzXCmP7RMXe2XOHAtZ/KNL65jWruZFWeQE6o8vHL5g # zonGZNG+UeXeL1kh4B8LJU13i31Ga02VCacH481ZsPGOUvvyow== # SIG # End signature block
combined_dataset/train/non-malicious/New-Choice.ps1
New-Choice.ps1
function New-Choice { <# .SYNOPSIS The New-Choice function is used to provide extended control to a script author who writing code that will prompt a user for information. .PARAMETER Choices An Array of Choices, ie Yes, No and Maybe .PARAMETER Caption Caption to present to end user .EXAMPLE PS C:\\> New-Choice -Choices 'Yes','No' -Caption "PowerShell makes choices easy" .NOTES Author: Andy Schneider Date: 5/6/2011 #> [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$True, ValueFromPipeline=$True)] $Choices, [Parameter(Position=1)] $Caption, [Parameter(Position=2)] $Message ) process { $resulthash += @{} for ($i = 0; $i -lt $choices.count; $i++) { $ChoiceDescriptions += @(New-Object System.Management.Automation.Host.ChoiceDescription $choices[$i]) $resulthash.$i = $choices[$i] } $AllChoices = [System.Management.Automation.Host.ChoiceDescription[]]($ChoiceDescriptions) $result = $Host.UI.PromptForChoice($Caption,$Message, $AllChoices, 1) $resulthash.$result } }
combined_dataset/train/non-malicious/2923.ps1
2923.ps1
task default -depends Test task Test -depends Compile, Clean { Assert $false "This fails." } task Compile -depends Clean { "Compile" } task Clean { "Clean" } taskTearDown { param($task) Assert ($task.Name -eq $psake.context.Peek().currentTaskName) 'TaskName should match' if ($task.Success) { "'$($task.Name)' Tear Down: task passed!" } else { "'$($task.Name)' Tear Down: task failed with '$($task.ErrorMessage)'" "-------------------" "- ErrorMessage: '$($task.ErrorMessage)'" "- ErrorDetail: $($task.ErrorDetail)" "- ErrorFormatted: $($task.ErrorFormatted)" "-------------------" } }
combined_dataset/train/non-malicious/2984.ps1
2984.ps1
Set-StrictMode -Version Latest $os = InModuleScope -ModuleName Pester { GetPesterOs } if ("Windows" -ne $os) { return } Describe "General" { It "creates a drive location called TestRegistry:" { "TestRegistry:\" | Should -Exist } It "is located in Pester key in HKCU" { $testRegistryPath = (Get-PSDrive TestRegistry).Root $testRegistryPath | Should -BeLike "HKEY_CURRENT_USER\Software\Pester*" } } $script:drivePath = $null Describe "TestRegistry scoping" { $script:drivePath = (Get-PSDrive "TestRegistry").Root -replace "HKEY_CURRENT_USER", "HKCU:" $describeKey = New-Item -Path "TestRegistry:\" -Name "DescribeKey" $describeValue = New-ItemProperty -Path "TestRegistry:\DescribeKey" -Name "DescribeValue" -Value 1 $script:contextKey = $null $script:contextValue = $null Context "Describe file is available in context" { $script:contextKey = New-Item -Path "TestRegistry:\" -Name "ContextKey" $script:contextValue = New-ItemProperty -Path "TestRegistry:\ContextKey" -Name "ContextValue" -Value 2 It "Finds the everything that was setup so far" { $itKey = New-Item -Path "TestRegistry:\ContextKey" -Name "ItKey" $itValue = New-ItemProperty -Path "TestRegistry:\ContextKey\ItKey" -Name "ItValue" -Value 3 $describeKey.PSPath | Should -Exist $describeValue.PSPath | Should -Exist $contextKey.PSPath | Should -Exist $contextValue.PSPath | Should -Exist $itKey.PSPath | Should -Exist $itValue.PSPath | Should -Exist } } It "Context key and value removed when returning to Describe" { $script:contextKey.PSPath | Should -Not -Exist $script:contextValue.PSPath | Should -Not -Exist } It "Describe key and value are still available in Describe" { $describeKey.PSPath | Should -Exist $describeValue.PSPath | Should -Exist } } $registryKeyVariableHasValue = $null -ne $script:drivePath $registryKeyWasRemoved = $registryKeyVariableHasValue -and -not (Test-Path $script:drivePath) $testRegistryDriveWasRemoved = -not (Test-Path "TestRegistry:\") Describe "cleanup" { It "Removed the key used in the previous Describe" { $registryKeyWasRemoved | Should -BeTrue } It "Removed the drive" { $testRegistryDriveWasRemoved | Should -BeTrue } }
combined_dataset/train/non-malicious/767.ps1
767.ps1
function Invoke-MyCommand { Write-Output "My command's function was executed!" } Register-EditorCommand -Verbose ` -Name "MyModule.MyCommandWithFunction" ` -DisplayName "My command with function" ` -Function Invoke-MyCommand Register-EditorCommand -Verbose ` -Name "MyModule.MyCommandWithScriptBlock" ` -DisplayName "My command with script block" ` -ScriptBlock { Write-Output "My command's script block was executed!" } function Invoke-MyEdit([Microsoft.PowerShell.EditorServices.Extensions.EditorContext]$context) { $context.CurrentFile.InsertText( "`r`n 35, 1); } Register-EditorCommand -Verbose ` -Name "MyModule.MyEditCommand" ` -DisplayName "Apply my edit!" ` -Function Invoke-MyEdit ` -SuppressOutput
combined_dataset/train/non-malicious/sample_6_67.ps1
sample_6_67.ps1
#************************************************ # TS_PowerCFG.ps1 # Version 3.0 # Date: 14/03/2013 # Author: v-kaw # Description: Running powercfg.exe to obtain power settings information # Note: This is the third edition of this file. Ideal ID for this edition is 6292. # Ideal ID for second edition is 4735. The original ideal id is 1103 #************************************************ #Rule ID 4735,6292 #----------- # http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4735 # http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=6292 #Description #----------- # Running powercfg.exe to obtain power settings information #Related KB #---------- # https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=KB;EN-US;980869 #Script Author #------------- # kate wang(v-kaw) Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_PowerCFG -Status $ScriptStrings.ID_PowerCFGDesc #******************** #Data gathering #******************** $fileDescription = "PowerCFG Output" $sectionDescription = "Power Settings" function Header($Command, $file) { "-" * ($Command.Length + 35) + "`r`n $Command`r`n" + "-" * ($Command.Length + 35) | Out-File -FilePath $file -Append "`n" | Out-File -FilePath $OutputFile -append } if ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -ge 2)) -or ($OSVersion.Major -eq 10)) #Win 8, Win10 { if($null -ne (Get-CimInstance -Class Win32_Battery )) #if system has a battery { $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_BatteryReport.htm" $CommandToExecute = "powercfg -batteryreport -duration 28 -output $OutputFile" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG Battery Report" } # # PowerCFG /sleepstudy cannot be run if ConnectedStandby -ne 1. # Creating an output file called _PowerCFG_SleepstudyReport.TXT with contents indicating that Powercfg /sleepstudy failed to run, etc. # Check for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power "CsEnabled" = dword:00000000 # # Run this first with no checks so that non-ConnectedStandby machines are not affected. $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_SleepstudyReport.htm" $CommandToExecute = "powercfg -sleepstudy -duration 28 -output $OutputFile" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG SleepStudy Report" # Now checking for the ConnectedStandby machines $regkeyPower = "HKLM:\SYSTEM\CurrentControlSet\Control\Power" If (test-path $regkeyPower) { "[info] Power regkey exists" | WriteTo-StdOut $regvaluePowerCsEnabled = Get-ItemProperty -path $regkeyPower -name "CsEnabled" -ErrorAction SilentlyContinue if ($null -ne $regvaluePowerCsEnabled) { $regvaluePowerCsEnabled = $regvaluePowerCsEnabled.CsEnabled "[info] Connected Standby registry value exists: $regvaluePowerCsEnabled" | WriteTo-StdOut if ($regvaluePowerCsEnabled -ne 1) { $fileDescription = "PowerCFG Output" $sectionDescription = "Power Settings" $outputFile = $Computername + "_PowerCFG_SleepStudyReport.TXT" "====================================================" | Out-File -FilePath $OutputFile -append "PowerCFG /Sleepstudy" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "Connected Standby has been DISABLED." | Out-File -FilePath $outputFile -Append "The PowerCFG_Sleepstudyreport.htm cannot be generated." | Out-File -FilePath $outputFile -Append "PowerCFG /sleepstudy outputs the following message when Connected Standby is disabled:" | Out-File -FilePath $outputFile -Append " `"Connected Standby is not supported on this machine. Cannot run tool.`"" | Out-File -FilePath $outputFile -Append "`n`n`n" | Out-File -FilePath $OutputFile -append CollectFiles -filesToCollect $outputFile -fileDescription "$fileDescription" -SectionDescription $sectionDescription } } } } if( (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win 7/ R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -ge 2)) ) #Win 8/8.1 { $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG_Energy_Report.htm" $CommandToExecute = "powercfg -energy -duration 5 -output $OutputFile" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "PowerCFG Energy Report" -BackgroundExecution $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt" $CommandToExecute = "powercfg -list" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -qh" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -requests" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -lastwake" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -availablesleepstates" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription } elseif(($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) #Server 2008 / Vista { $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt" $CommandToExecute = "powercfg -list" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -query" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -devicequery all_devices_verbose" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription } elseif((($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 1)) -or (($OSVersion.Major -eq 5) -and ($OSVersion.Minor -eq 2))) #XP/#Server 2003 { $OutputFile = join-path $PWD.Path "$($computername)_PowerCFG.txt" $CommandToExecute = "powercfg -list" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -collectFiles $false $CommandToExecute = "powercfg -query" header -Command $CommandToExecute -file $OutputFile RunCmD -commandToRun ("cmd.exe /c $CommandToExecute >> `"$OutputFile`"") -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoGXjsiFzEBH5m # fbxQAo3QVB+SULWpQ3SNrxvVyKdPuqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPoL # EqFQBwqW32AKEvrFKWk1/bD56lW0dd+yy5scr6nCMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAkxhl02f8WYmZLNxNCxs0gU1vtKz7695ZTr7O # bhICBsFKtMf2lwwRapsyCxIxVV1QX6zAKPhbJadZMb8oiI5ZxuwG4kh6EgNB2XUj # VEsXZHEU+isMpodd+uZD/O0AV34hCxrKnX5AME2fKrn2NZUH+x4XD0nzH2flai7Y # V9HhQKPaOudv5E35z6E3GN6CRUGrkpxAr6lz5n0//Ty+xofMbzEdZzeUpzh/PCKe # dIRXz8Z+vZiwMzw6/lJemVvtakxavV4WCpx4FDw26RfsGvu0PcP52urFdszuPhvZ # gsf5/hMujdg+x7m4rCaZ5+hP2IxpDVp671LD45Ep/fh0bf2gtKGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDWRANZsAYsW/xnqnkzx/9+jNL/Lzru2xg4 # G40Tqtu/LQIGZutLSANnGBMyMDI0MTAyODExNDAzOS4yNTlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/xI4 # fPfBZdahAAEAAAH/MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOVoXDTI1MTAyMjE4MzExOVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # yeiV0pB7bg8/qc/mkiDdJXnzJWPYgk9mTGeI3pzQpsyrRJREWcKYHd/9db+g3z4d # U4VCkAZEXqvkxP5QNTtBG5Ipexpph4PhbiJKwvX+US4KkSFhf1wflDAY1tu9CQqh # hxfHFV7vhtmqHLCCmDxhZPmCBh9/XfFJQIUwVZR8RtUkgzmN9bmWiYgfX0R+bDAn # ncUdtp1xjGmCpdBMygk/K0h3bUTUzQHb4kPf2ylkKPoWFYn2GNYgWw8PGBUO0vTM # KjYD6pLeBP0hZDh5P3f4xhGLm6x98xuIQp/RFnzBbgthySXGl+NT1cZAqGyEhT7L # 0SdR7qQlv5pwDNerbK3YSEDKk3sDh9S60hLJNqP71iHKkG175HAyg6zmE5p3fONr # 9/fIEpPAlC8YisxXaGX4RpDBYVKpGj0FCZwisiZsxm0X9w6ZSk8OOXf8JxTYWIqf # RuWzdUir0Z3jiOOtaDq7XdypB4gZrhr90KcPTDRwvy60zrQca/1D1J7PQJAJObbi # aboi12usV8axtlT/dCePC4ndcFcar1v+fnClhs9u3Fn6LkHDRZfNzhXgLDEwb6dA # 4y3s6G+gQ35o90j2i6amaa8JsV/cCF+iDSGzAxZY1sQ1mrdMmzxfWzXN6sPJMy49 # tdsWTIgZWVOSS9uUHhSYkbgMxnLeiKXeB5MB9QMcOScCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTD+pXk/rT/d7E/0QE7hH0wz+6UYTAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOSNN5MpLiyunm866frWIi0hdazKNLgRp3WZPfhYgPC3K/DNMzLliYQUA # p6WtgolIrativXjOG1lIjayG9r6ew4H1n5XZdDfJ12DLjopap5e1iU/Yk0eutPyf # OievfbsIzTk/G51+uiUJk772nVzau6hI2KGyGBJOvAbAVFR0g8ppZwLghT4z3mkG # Zjq/O4Z/PcmVGtjGps2TCtI4rZjPNW8O4c/4aJRmYQ/NdW91JRrOXRpyXrTKUPe3 # kN8N56jpl9kotLhdvd89RbOsJNf2XzqbAV7XjV4caCglA2btzDxcyffwXhLu9HMU # 3dLYTAI91gTNUF7BA9q1EvSlCKKlN8N10Y4iU0nyIkfpRxYyAbRyq5QPYPJHGA0T # y0PD83aCt79Ra0IdDIMSuwXlpUnyIyxwrDylgfOGyysWBwQ/js249bqQOYPdpyOd # gRe8tXdGrgDoBeuVOK+cRClXpimNYwr61oZ2/kPMzVrzRUYMkBXe9WqdSezh8tyt # uulYYcRK95qihF0irQs6/WOQJltQX79lzFXE9FFln9Mix0as+C4HPzd+S0bBN3A3 # XRROwAv016ICuT8hY1InyW7jwVmN+OkQ1zei66LrU5RtAz0nTxx5OePyjnTaItTS # Y4OGuGU1SXaH49JSP3t8yGYA/vorbW4VneeD721FgwaJToHFkOIwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo0QzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqROMbMS8JcUl # cnPkwRLFRPXFspmggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ2mUwIhgPMjAyNDEwMjgwOTM5NDlaGA8yMDI0 # MTAyOTA5Mzk0OVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snaZQIBADAKAgEA # AgIFPAIB/zAHAgEAAgIUKTAKAgUA6ssr5QIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAuUNJmV2WEmZgWBM3JyTJwjd7eR8W+zIfvWlXZUbOA7OoenLTmvdaH # yPjIBqzVVX+OsCmMA4rCSBiFVyt7vD7pw6C0gQ7G74pHE4Gq9isau89V6yFZb0cq # WgcxpcvR5+XFiKoxtNrZ+ICNQNLSApRh1tFZ9AnOa6pEAE5pAKzFFp/iKZGVnedW # cWiD6dyYPjiJ10ZllDJAkIeS/woyKVVqERxiqfnvmh4F99BaY+397LAfLvWQaQ7a # Y8kNavDIwAwm/WFtYzSwFv/glTjgOSnvFh3mK6ge1RicMM3VTlq/fA5vSiu69a+4 # swD4QJBUY7k+61Fk5XlZu6ho9FxO1O8OMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgv+zd0wgr9BPM5e2LcWepOc40C0H4H13F83/EknofpTEwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDkMu++yQJ3aaycIuMT6vA7JNuMaVOI3qDj # SEV8upyn/TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/xI4fPfBZdahAAEAAAH/MCIEIO0+ZZpc8738ZRzG1JkViDUqNGwOmGhcvuJk # D9cXZckbMA0GCSqGSIb3DQEBCwUABIICAJnM9DeFzY6IqKIxmmdZUVc00a+0dzHj # ljlDVk7n5BYA304KgztVzKL+ZMVAWj3dpvM4FpMSr7329fCoXjV7wlvQiXL3ex6x # mbxgaHNtO0sfmu8zzKE7Xod/DpdEzsqhgOR8m16RaTSmvm5NnkPF3qMVxEAVPXTF # vbcxY4mhpVDZxVzr1ydK2c5ppl8sWWoRGPMHKJXlEdAScXx8wuU+19NGMlVPfw+y # /INqtHA+suE9FXbFP3/fosvbzmwpIE3R0MdC+W3V5ZW2rPB7WDc8ZDzyzHeYmEIO # 08iwz0nVu4Lz1yh5vMsn5uons4H73kPJSXgCO7UbOGrpaly5FIua2vsHuQqXiyEK # 8x/VzdGhO+7U+yec14ShTf0/4w2Um3sgFW6QS34WAs5WLYXzpGJnLMZJRDxIBb1b # qJstN7RbQ+UVq/HWfJRBuWE9URHur9np9M6kzQma//CjMKuv0rGU+iOO+4zMSvNK # 47cpgmH0+0zwX/XeBXHuSYZ/sU7icUhrvFlDFEkknsZ43wUIMNlrve0WhQmFHgvD # NzCNJr5s9T0JbTnqLYgUPJHobS0myySDesN+47zYSWkSVSp7wyoO7jw8qVdIz6SL # Vcg7PcT1owCKZ4JfzCvfeIb/Ut3RjIq6jOp2D3tO8rZOqXuluohCKTqK1JvHEc9S # IJ4MZ3PXH7CP # SIG # End signature block
combined_dataset/train/non-malicious/422.ps1
422.ps1
Register-PSFTeppScriptblock -Name 'PSFramework-config-validation' -ScriptBlock { [PSFramework.Configuration.ConfigurationHost]::Validation.Keys }
combined_dataset/train/non-malicious/3096.ps1
3096.ps1
function Verify-False { param ( [Parameter(ValueFromPipeline = $true)] $Actual ) if ($Actual) { throw [Exception]"Expected `$false but got '$Actual'." } $Actual }
combined_dataset/train/non-malicious/lazywinadmin.com.ps1
lazywinadmin.com.ps1
Get-WmiObject Win32_Service -ComputerName . |` where {($_.startmode -like "*auto*") -and ` ($_.state -notlike "*running*")}|` select DisplayName,Name,StartMode,State|ft -AutoSize
combined_dataset/train/non-malicious/2384.ps1
2384.ps1
function Invoke-SqlDatabaseBackupToFile { [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Database, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Connection -ComputerName $_ -Quiet -Count 1 })] [string]$Server, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateSet('Full','Differential')] [string]$Type = 'Full', [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ -not (Test-Path -Path $_ -PathType Leaf) })] [string]$FilePath ) $query = @" BACKUP DATABASE $Database TO DISK = '$FilePath' "@ if ($Type -eq 'Differential') { $query += ' WITH DIFFERENTIAL' } Write-Verbose -Message "Running query: $($query)" Invoke-SQLCmd -ServerInstance $Server -Database $Database -Query $query }
combined_dataset/train/non-malicious/Get-StructFromMemory.ps1
Get-StructFromMemory.ps1
function Get-StructFromMemory { <# .SYNOPSIS Marshals data from an unmanaged block of memory in an arbitrary process to a newly allocated managed object of the specified type. Author: Matthew Graeber (@mattifestation) License: BSD 3-Clause .DESCRIPTION Get-StructFromMemory is similar to the Marshal.PtrToStructure method but will parse and return a structure from any process. .PARAMETER Id Process ID of the process whose virtual memory space you want to access. .PARAMETER MemoryAddress The address containing the structure to be parsed. .PARAMETER StructType The type (System.Type) of the desired structure to be parsed. .EXAMPLE C:\\PS> Get-Process | ForEach-Object { Get-StructFromMemory -Id $_.Id -MemoryAddress $_.MainModule.BaseAddress -StructType ([PE+_IMAGE_DOS_HEADER]) } Description ----------- Parses the DOS headers of every loaded process. Note: In this example, this assumes that [PE+_IMAGE_DOS_HEADER] is defined. You can get the code to define [PE+_IMAGE_DOS_HEADER] here: http://www.exploit-monday.com/2012/07/structs-and-enums-using-reflection.html .NOTES Be sure to enclose the StructType parameter with parenthesis in order to force PowerShell to cast it as a Type object. Get-StructFromMemory does a good job with error handling however it will crash if the structure contains fields that attempt to marshal pointers. For example, if a field has a custom attribute of UnmanagedType.LPStr, when the structure is parsed, it will attempt to dererence a string pointer for virtual memory in another process and access violate. .LINK http://www.exploit-monday.com/ #> [CmdletBinding()] Param ( [Parameter(Position = 0, Mandatory = $True)] [Alias('ProcessId')] [Alias('PID')] [UInt16] $Id, [Parameter(Position = 1, Mandatory = $True)] [IntPtr] $MemoryAddress, [Parameter(Position = 2, Mandatory = $True)] [Alias('Type')] [Type] $StructType ) Set-StrictMode -Version 2 $PROCESS_VM_READ = 0x0010 # The process permissions we'l ask for when getting a handle to the process # Get a reference to the private GetProcessHandle method is System.Diagnostics.Process $GetProcessHandle = [Diagnostics.Process].GetMethod('GetProcessHandle', [Reflection.BindingFlags] 'NonPublic, Instance', $null, @([Int]), $null) try { # Make sure user didn't pass in a non-existent PID $Process = Get-Process -Id $Id -ErrorVariable GetProcessError # Get the default process handle $Handle = $Process.Handle } catch [Exception] { throw $GetProcessError } if ($Handle -eq $null) { throw "Unable to obtain a handle for PID $Id. You will likely need to run this script elevated." } # Get a reference to MEMORY_BASIC_INFORMATION. I don't feel like making the structure myself $mscorlib = [AppDomain]::CurrentDomain.GetAssemblies() | ? { $_.FullName.Split(',')[0].ToLower() -eq 'mscorlib' } $Win32Native = $mscorlib.GetTypes() | ? { $_.FullName -eq 'Microsoft.Win32.Win32Native' } $MEMORY_BASIC_INFORMATION = $Win32Native.GetNestedType('MEMORY_BASIC_INFORMATION', [Reflection.BindingFlags] 'NonPublic') if ($MEMORY_BASIC_INFORMATION -eq $null) { throw 'Unable to get a reference to the MEMORY_BASIC_INFORMATION structure.' } # Get references to private fields in MEMORY_BASIC_INFORMATION $ProtectField = $MEMORY_BASIC_INFORMATION.GetField('Protect', [Reflection.BindingFlags] 'NonPublic, Instance') $AllocationBaseField = $MEMORY_BASIC_INFORMATION.GetField('BaseAddress', [Reflection.BindingFlags] 'NonPublic, Instance') $RegionSizeField = $MEMORY_BASIC_INFORMATION.GetField('RegionSize', [Reflection.BindingFlags] 'NonPublic, Instance') try { $NativeUtils = [NativeUtils] } catch [Management.Automation.RuntimeException] # Only build the assembly if it hasn't already been defined { # Build dynamic assembly in order to use P/Invoke for interacting with the following Win32 functions: ReadProcessMemory, VirtualQueryEx $DynAssembly = New-Object Reflection.AssemblyName('MemHacker') $AssemblyBuilder = [AppDomain]::CurrentDomain.DefineDynamicAssembly($DynAssembly, [Reflection.Emit.AssemblyBuilderAccess]::Run) $ModuleBuilder = $AssemblyBuilder.DefineDynamicModule('MemHacker', $False) $Attributes = 'AutoLayout, AnsiClass, Class, Public, SequentialLayout, Sealed, BeforeFieldInit' $TypeBuilder = $ModuleBuilder.DefineType('NativeUtils', $Attributes, [ValueType]) $TypeBuilder.DefinePInvokeMethod('ReadProcessMemory', 'kernel32.dll', [Reflection.MethodAttributes] 'Public, Static', [Reflection.CallingConventions]::Standard, [Bool], @([IntPtr], [IntPtr], [IntPtr], [UInt32], [UInt32].MakeByRefType()), [Runtime.InteropServices.CallingConvention]::Winapi, 'Auto') | Out-Null $TypeBuilder.DefinePInvokeMethod('VirtualQueryEx', 'kernel32.dll', [Reflection.MethodAttributes] 'Public, Static', [Reflection.CallingConventions]::Standard, [UInt32], @([IntPtr], [IntPtr], $MEMORY_BASIC_INFORMATION.MakeByRefType(), [UInt32]), [Runtime.InteropServices.CallingConvention]::Winapi, 'Auto') | Out-Null $NativeUtils = $TypeBuilder.CreateType() } # Request a handle to the process in interest try { $SafeHandle = $GetProcessHandle.Invoke($Process, @($PROCESS_VM_READ)) $Handle = $SafeHandle.DangerousGetHandle() } catch { throw $Error[0] } # Create an instance of MEMORY_BASIC_INFORMATION $MemoryBasicInformation = [Activator]::CreateInstance($MEMORY_BASIC_INFORMATION) # Confirm you can actually read the address you're interested in $NativeUtils::VirtualQueryEx($Handle, $MemoryAddress, [Ref] $MemoryBasicInformation, [Runtime.InteropServices.Marshal]::SizeOf($MEMORY_BASIC_INFORMATION)) | Out-Null $PAGE_EXECUTE_READ = 0x20 $PAGE_EXECUTE_READWRITE = 0x40 $PAGE_READONLY = 2 $PAGE_READWRITE = 4 $Protection = $ProtectField.GetValue($MemoryBasicInformation) $AllocationBaseOriginal = $AllocationBaseField.GetValue($MemoryBasicInformation) $GetPointerValue = $AllocationBaseOriginal.GetType().GetMethod('GetPointerValue', [Reflection.BindingFlags] 'NonPublic, Instance') $AllocationBase = $GetPointerValue.Invoke($AllocationBaseOriginal, $null).ToInt64() $RegionSize = $RegionSizeField.GetValue($MemoryBasicInformation).ToUInt64() Write-Verbose "Protection: $Protection" Write-Verbose "AllocationBase: $AllocationBase" Write-Verbose "RegionSize: $RegionSize" if (($Protection -ne $PAGE_READONLY) -and ($Protection -ne $PAGE_READWRITE) -and ($Protection -ne $PAGE_EXECUTE_READ) -and ($Protection -ne $PAGE_EXECUTE_READWRITE)) { $SafeHandle.Close() throw 'The address specified does not have read access.' } $StructSize = [Runtime.InteropServices.Marshal]::SizeOf($StructType) $EndOfAllocation = $AllocationBase + $RegionSize $EndOfStruct = $MemoryAddress.ToInt64() + $StructSize if ($EndOfStruct -gt $EndOfAllocation) { $SafeHandle.Close() throw 'You are attempting to read beyond what was allocated.' } try { # Allocate unmanaged memory. This will be used to store the memory read from ReadProcessMemory $LocalStructPtr = [Runtime.InteropServices.Marshal]::AllocHGlobal($StructSize) } catch [OutOfMemoryException] { throw Error[0] } Write-Verbose "Memory allocated at 0x$($LocalStructPtr.ToString("X$([IntPtr]::Size * 2)"))" # Zero out the memory that was just allocated. According to MSDN documentation: # "When AllocHGlobal calls LocalAlloc, it passes a LMEM_FIXED flag, which causes the allocated memory to be locked in place. Also, the allocated memory is not zero-filled." # http://msdn.microsoft.com/en-us/library/s69bkh17.aspx $ZeroBytes = New-Object Byte[]($StructSize) [Runtime.InteropServices.Marshal]::Copy($ZeroBytes, 0, $LocalStructPtr, $StructSize) $BytesRead = [UInt32] 0 if ($NativeUtils::ReadProcessMemory($Handle, $MemoryAddress, $LocalStructPtr, $StructSize, [Ref] $BytesRead)) { $SafeHandle.Close() [Runtime.InteropServices.Marshal]::FreeHGlobal($LocalStructPtr) throw ([ComponentModel.Win32Exception][Runtime.InteropServices.Marshal]::GetLastWin32Error()) } Write-Verbose "Struct Size: $StructSize" Write-Verbose "Bytes read: $BytesRead" $ParsedStruct = [Runtime.InteropServices.Marshal]::PtrToStructure($LocalStructPtr, $StructType) [Runtime.InteropServices.Marshal]::FreeHGlobal($LocalStructPtr) $SafeHandle.Close() Write-Output $ParsedStruct }
combined_dataset/train/non-malicious/2201.ps1
2201.ps1
[CmdletBinding(SupportsShouldProcess)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateScript({Test-Connection -ComputerName $_ -Count 2})] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Value in WQL query statement to look for")] [string]$Locate, [parameter(Mandatory=$true, HelpMessage="Value in WQL query statement to replace the matched value with")] [string]$Replace, [parameter(Mandatory=$false, HelpMessage="When specified a collection membership update cycle will be invoked for the current collection being processed if it's about to be amended")] [switch]$UpdateMembership ) Begin { $CurrentLocation = Get-Location try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [Exception] { Throw "Unable to determine SiteCode" } } Process { Write-Verbose -Message "Enumerating all Collections" $Collections = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer foreach ($Collection in $Collections) { Write-Verbose -Message "Processing Collection: '$($Collection.Name)'" $Collection.Get() foreach ($Rule in $Collection.CollectionRules) { if ($Rule.__CLASS -like "SMS_CollectionRuleQuery") { if ($Rule.QueryExpression -match $Locate) { Write-Verbose -Message "Rule '$($Rule.RuleName)' has been validated as a matched QueryRule" $NewQueryExpression = $Rule.QueryExpression -replace "$($Locate)","$($Replace)" $NewRuleName = $Rule.RuleName Write-Verbose -Message "Stored the values from rule '$($Rule.RuleName)' in memory" if ($PSCmdlet.ShouldProcess("RuleName: '$($Rule.RuleName)'","DeleteMembershipRule")) { $RemoveRule = $Collection.DeleteMembershipRule($Rule) } if ($RemoveRule.ReturnValue -eq 0) { Write-Verbose -Message "Rule '$($Rule.RuleName)' was successfully removed" } else { Throw "Unable to remove current rule '$($Rule.RuleName)'" } Write-Verbose -Message "Stored QueryRule expression: `n$($Rule.QueryExpression)" try { if ($PSCmdlet.ShouldProcess("RuleName: '$($NewRuleName)'","CreateMembershipRule")) { $NewRule = ([WmiClass]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_CollectionRuleQuery").CreateInstance() $NewRule.QueryExpression = $NewQueryExpression $NewRule.RuleName = $NewRuleName $Collection.CollectionRules = $NewRule $Collection.Put() | Out-Null if (($Collection.CollectionRules | Where-Object { ($_.RuleName -like "$($NewRuleName)") -and ($_.__CLASS -like "SMS_CollectionRuleQuery") } | Measure-Object).Count -eq 1) { Write-Verbose -Message "Amended QueryRule expression: `n$($NewQueryExpression)" Write-Verbose -Message "Successfully created a new QueryRule named '$($NewRuleName)' on collection '$($Collection.Name)'" if ($PSBoundParameters["UpdateMembership"]) { $InvokeMethod = $Collection.RequestRefresh() if ($InvokeMethod.ReturnValue -eq 0) { Write-Verbose -Message "Invoking Collection Membership Update method for Collection: $($Collection.Name)" } else { Write-Warning -Message "Failed to invoke Collection Membership Update method for Collection: $($Collection.Name)" } } } } } catch { Throw "Failed to create a new QueryRule instance" } } } } } }
combined_dataset/train/non-malicious/sample_31_25.ps1
sample_31_25.ps1
# Localized 05/07/2022 02:58 AM (GMT) 303:7.0.30723 TestDtc.psd1 ConvertFrom-StringData @' ###PSLOC start localizing FirewallRuleEnabled="{0}: Firewall rule for {1} is enabled." FirewallRuleDisabled="{0}: Firewall rule for {1} is disabled. This computer cannot participate in network transactions." CmdletFailed="The {0} cmdlet failed. Please make sure the {1} module is installed." InvalidLocalComputer="{0} is not a valid local computer name." RPCEndpointMapper="RPC Endpoint Mapper" DtcIncomingConnection="DTC incoming connections" DtcOutgoingConnection="DTC outgoing connections" MatchingDtcNotFound="A DTC instance with VirtualServerName {0} does not exist." InboundDisabled="{0}: Inbound transactions are not allowed and this computer cannot participate in network transactions." OutboundDisabled="{0}: Outbound transactions are not allowed and this computer cannot participate in network transactions." OSVersion="{0} Operating System Version: {1}." OSQueryFailed="Failed to query operating system of {0}." VersionNotSupported="Testing DTC on Windows versions below {0} is not supported with this cmdlet." FailedToCreateCimSession="Failed to create a CIM Session to {0}." NotARemoteComputer="{0} is not a remote computer." PingingSucceeded="Pinging computer {0} from {1} succeeded." PingingFailed="Pinging computer {0} from {1} failed." SameCids="The {0} CID on {1} and {2} is the same. The CID should be unique to each computer." DiagnosticTestPrompt="This diagnostic test will attempt to carry out a transaction propagation between {0} and {1}. It requires that a TCP port is opened on {0} so that a Test Resource Manager can participate in network transactions." DefaultPortDescription="The default port is {0} and you can change it using the 'ResourceManagerPort' parameter and rerunning the test. " PortDescription="You have specified {0} as the 'ResourceManagerPort'." FirewallRequest="Please open port {0} in the firewall to proceed with the test." QueryText="Do you want to proceed with the test?" InvalidDefaultCluster="{0} is not the Virtual Server Name of the default DTC configured on this computer. You can use 'Set-DtcClusterDefault' cmdlet configure the default DTC on this computer." InvalidDefault="{0} is not the Virtual Server Name of the default DTC configured on this computer. You can use 'Set-DtcDefault' cmdlet to configure the default DTC on this computer." NeedDtcSecurityFix="DTC security settings and firewall settings should be fixed in order to complete the transactions propagation test." StartResourceManagerFailed="Test resource manager creation failed." ResourceManagerStarted="Test resource manager started." PSSessionCreated="A new PSSession to {0} created." TransactionPropagated="Transaction propagated from {0} to {1} using {2} propagation." TransactionPropagationFailed="Transaction propagation {0} to {1} failed using {2} propagation." TestRMVerboseLog="Test Resource Manager Verbose Log:" TestRMWarningLog="Test Resource Manager Warning Log:" InvalidParameters="At least one of LocalComputerName or RemoteComputerName parameters should be specified." ###PSLOC '@
combined_dataset/train/non-malicious/3377.ps1
3377.ps1
[CmdletBinding()] Param( [Parameter(Mandatory = $True, Position = 0)] [string]$ReleaseDate, [Parameter(Mandatory = $True, Position = 1)] [string]$ReleaseVersion, [Parameter(Mandatory = $False, Position = 2)] [string]$PathToRepo ) function UpdateCurrentDoc([string]$PathToCurrentDoc, [string]$ModuleVersion) { $service = (Get-Item -Path "$PathToCurrentDoc\..\..").Name $content = Get-Content $PathToCurrentDoc -Encoding UTF8 $found = $False $changes = @() for ($idx = 1; $idx -lt $content.Length; $idx++) { if ($found -and $content[$idx] -like " { $found = $False } elseif ($found -and $changes.Length -eq 0) { $changes += " $changes += "" $changes += $content[$idx] } elseif ($found) { $changes += $content[$idx] } if ($content[$idx - 1] -eq " { $found = $True } } if ($changes.Length -gt 0) { $end = $ModuleVersion.IndexOf(".") $ModuleVersion = "$($ModuleVersion.Substring(0, $end)).0.0" $newContent = New-Object string[] ($content.Length + 2) $buffer = 0 for ($idx = 0; $idx -lt $content.Length; $idx++) { if ($content[$idx] -eq " { $newContent[$idx] = " $newContent[$idx + 1] = "" $newContent[$idx + 2] = " $buffer = 2 $idx++ } $newContent[$idx + $buffer] = $content[$idx] } $result = $newContent -join "`r`n" $tempFile = Get-Item $PathToCurrentDoc [System.IO.File]::WriteAllText($tempFile.FullName, $result, [Text.Encoding]::UTF8) } return $changes } function GetModuleVersion([string]$PathToModule) { return (Test-ModuleManifest -Path $PathToModule).Version.ToString() } function UpdateARMBreakingChangeDocs([string]$PathToServices) { $docs = Get-ChildItem -Path $PathToServices -Recurse | Where { $_.Attributes -match "Directory" } | Where { $_.Name -eq "documentation" } $allChanges = @() foreach ($doc in $docs) { $currentDocPath = "$($doc.FullName)\current-breaking-changes.md" $upcomingDocPath = "$($doc.FullName)\upcoming-breaking-changes.md" $Service = Get-Item -Path "$($doc.FullName)\.." $serviceName = $Service.Name if ($serviceName -eq "AzureBackup") { $serviceName = "Backup" } if ($serviceName -eq "AzureBatch") { $serviceName = "Batch" } $modulePath = "$PathToRepo\artifacts\Debug\Az.$serviceName\Az.$serviceName.psd1" $moduleVersion = GetModuleVersion -PathToModule $modulePath $changes = UpdateCurrentDoc -PathToCurrentDoc $currentDocPath -ModuleVersion $moduleVersion if ($changes.Length -gt 0) { $allChanges += $changes } } return $allChanges } function UpdateBreakingChangeDoc([string]$PathToDoc, [string[]]$ChangesToAdd) { $content = Get-Content -Path $PathToDoc -Encoding UTF8 $size = $content.Length + $ChangesToAdd.Length + 2 $newContent = New-Object string[] $size $newContent[0] = " $newContent[1] = "" $buffer = 2 for ($idx = 0; $idx -lt $ChangesToAdd.Length; $idx++) { $newContent[$idx + $buffer] = $ChangesToAdd[$idx] } $buffer += $ChangesToAdd.Length for ($idx = 0; $idx -lt $content.Length; $idx++) { $newContent[$idx + $buffer] = $content[$idx] } $result = $newContent -join "`r`n" $tempFile = Get-Item $PathToDoc [System.IO.File]::WriteAllText($tempFile.FullName, $result, [Text.Encoding]::UTF8) } if (!$PathToRepo) { $PathToRepo = "$PSScriptRoot\.." } $ResourceManagerChanges = UpdateARMBreakingChangeDocs -PathToServices $PathToRepo\src $allChanges = @() if ($ResourceManagerChanges.Length -gt 0) { $allChanges += $ResourceManagerChanges } UpdateBreakingChangeDoc -PathToDoc $PathToDoc -ChangesToAdd $allChanges
combined_dataset/train/non-malicious/sample_64_31.ps1
sample_64_31.ps1
########################################################################## # DELL PROPRIETARY INFORMATION # # This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this # software to you under the terms of a license agreement,nondisclosure agreement or both. # You may not copy, disclose, or use this software except in accordance with those terms. # # Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved. # # DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE, # EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. # DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, # MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. # # # ########################################################################## function Get-DellBiosSettings { <# .Synopsis retrieves all BIOS settings applicable to the system .Description This CmdLet retrieves the BIOS settings that are applicable to the system. .Example Get-DellBiosSettings #> BEGIN { } PROCESS { $DellBIOS = get-childitem -path DellSmbios:\ | select category | foreach { get-childitem -path @("DellSmbios:\" + $_.Category) | select attribute, currentvalue, possiblevalues, PSPath } $DellBIOS | Out-GridView } END{ } } # SIG # Begin signature block # MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBgRpAvWg/3Tals # Ic0Ie1oHgiTItaOHs13U1me04uUj8aCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3 # AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx # IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi # BCBeKiwYbuiQH8aNByiGWveKqEp5FvNdn7bUMk1VLbfoBDANBgkqhkiG9w0BAQEF # AASCAYBu5BwBKbQlT5JnsOKEYPAmYusThlEvWn9kyOMJN8Odo3IDJiaguKL8mEu6 # 8JLv/L0W4RqNE50p5NjquP1kS4x76NpKv4Czv6OMpnOkaeKMIMtcGLkLYiAP/5JZ # F5PS1fyiHRiAMw18oouTl4iF/YMiv/QIimUuIwsQw0F8deeIcR6i5AmQvAoM5EoG # 5ck8tqTqjs2cJSNAhUs/B0r1Ohs82wsdnkzQrD+thUwKxfojqcBnayMUzU2Xr0Vb # gjQljG39DD/j+jhA1UYt1Cy6ANjyfcSwVEG8t+eNHnGqOwCv664MBzFrjS0+v5+t # bEMHO4WMnBldDYOU47MEUaUnpoofQC5AsfKYI6AYnX1kTz2SMDcM7jgu5mTxPPwa # MJBT/HdEcmXv53FKIY+aRBnlh8HZsLLM/Yi5YJJ6SaCuSLFuWsRA8MLlrwJJDlSW # mzYxlKuALA8bSN/BS+B7I3/oU3O1OmNF/r1FUO0A7F9QFFOttsQsfbnVFqJ6FOw/ # tf7v0XShghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4 # MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C # AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgzMXufUMA7//zYL6H8H0X # IQdZExEkUirlCoUGvEP82O8CCGRBxRAOyRUvGA8yMDI0MDQxODA3MzI1MFowAwIB # AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT # Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz # dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO # QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0 # Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j # LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv # b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa # Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0 # LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm # Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc # Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN # CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT # SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV # EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf # e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM # 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I # H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp # OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL # XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB # o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD # VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo # MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF # BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG # A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww # HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ # Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd # ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU # +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql # z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G # w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi # e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6 # yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F # ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE # Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv # cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL # MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu # dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg # zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM # GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG # sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4 # yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI # fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P # 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0 # spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu # 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W # EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6 # l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb # zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J # +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5 # +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH # lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2 # oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84 # CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f # G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD # DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c # 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr # JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h # ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m # 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2 # EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt # IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT # AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT # DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv # cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4 # Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj # C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I # 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb # Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s # F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS # h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo # FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8 # 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad # scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/ # BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue # JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T # AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw # FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF # BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov # L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE # AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG # +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh # MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC # S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI # WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP # EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk # 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII # 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz # 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk # uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK # SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8 # a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF # gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk # +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD # VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp # bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa # BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx # ODA3MzI1MFowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN # AQENME8GCSqGSIb3DQEJBDFCBEDRyVhidhHLPF9+N0gaRutDnSp0ceZ6Uon8Jh3W # 4XsoanBD7SRCwMTcmz0aQkNEmeCZapeGNrzxxMx8CAQFyf5cMIHQBgsqhkiG9w0B # CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS # ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw # ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl # BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7 # hfYR9W27bjALBgkqhkiG9w0BAQ0EggIAVL83pGx/uTJyhbBnz7gOF8zJDLRVyFAU # L7iKVQCe5pCBtXsHMznNoxQeZAWuf6RAHahRSN8uNCDO1+o3tYRo9Qa4GNohsF/x # Ag0VfIqbwhgF6zXbT52vMpbr7E64+NrNBkYV+QtjAo9XJF7LmHnGfFYdZ2uNTWOy # OJfsig8W7HU7tEzvrCWX2gb4h5AYGD4OQQ9rF3tXZR4q0osjQAUaM7ByYFLjgzzt # +371yxfnXtmA2js7+z5e76PSzq6pJlH0+bHu+SwEPK22B1Y7MivqrglTShpfIj2z # 8SHbl4u7ANYLbSNcBETxuOUoV2SHxlVnYwm87QvTab+FA/MakOiwjCn1JXI+ZL0l # KnMAh5+BhQ+XXLfCWMBBxKjihDrFB9OFGlXpLSAQH/QPxYMe3QVQGEc2imHqE1e2 # GhNgZ+jfX7dNXYq48oJyHYaV5Q8wMBWSwg4lVLWeUDm/wvIRh8NoVGbBmARYxOqI # dow0yS2h92sNpY1CgYh0Ng2h8WFGY3KJvdjvW2Ug78yxF2+sg3Egeh+5N8fz0fDr # Lk5z527sa2hy2+1R0+Tn9zKqgtwcd2F2auPFp8zgNWKlIsmSvfkITrG9r8T4aQAw # t+70VQduZGPQTZvhcLSWJCtqp4GKbgjnCWv/Cii8MBdhVq+l3d+IBcCAy2QuEtYF # xNIruELFBGU= # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_63.ps1
sample_53_63.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ScheduledQueryRule.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ScheduledQueryRule.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWtylvi9zXfQsb # FYuQI3Vr1RKjuHU/TtrPlNqx6gM93aCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDvx # kBkuaWn1yjsj3AV662QmviJ/VicAzzWsAtNkBucAMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAWaaJlW/uzJfFLKKzo4oc/nRfFDg9HwTocHKI # ZjjiDOPvqRwA9aSHuV4sm+GwhXAM9M5h4sSH6C13OE+r9Tg8QM3x8zIWc7P/2SVh # hPXaPexGHtqrqml+fwPvm+3I4DQuqBfPI2Mjove8viNhSGyk1aCjUzZD616k+qTg # q+lRwhcNXVC6F6RVu9fnKVOBrBlZAGe+jbsdWrGZh1/uPxCXisLkf3s6HpPEohOb # 5WQk/Y/oc1gvC90BUIIT4TgfdR69KndRjeZIggtvoQ+mASEMgBSMj28w1IFIjO65 # LeHXNQZGuyGZnUvzFLUH8/iUPuF5FBUaQONRGoxcTTF8gznuv6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBnO/i/QPqfGRk4FdZjqonA8gdb99Ta7daF # R/2i18blHgIGZjK/xO+ZGBMyMDI0MDUxNjA2NDIxMi45ODlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB # AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq # YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz # 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo # mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI # YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc # QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x # uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE # 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL # CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ # wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF # kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+ # cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM # jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc # 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15 # j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s # gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA # GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0 # SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B # 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ # n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v # ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5 # aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ # IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0 # 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e8JcjAi # GA8yMDI0MDUxNTEwMTQxMFoYDzIwMjQwNTE2MTAxNDEwWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp7wlyAgEAMAoCAQACAhwfAgH/MAcCAQACAhK7MAoCBQDp8Fry # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKr1B/rLMsdEgXnXDh5Ie+HB # Kw4SvHEicuCL/PcvkybJxi0a/BBFfOY2z6SPDMitqmzQ9fWRBbA1L/qMqS2/QCTy # C/SlgJr6jyPJqMdksnvmWbW4vBigqIZxb7a0zAcQiCWsQFH5wu30w7O6390PzNrO # EJ/xTdGO1e7ypgQA0f8/Zqp4AxkPMQ9PT+q3bQdyBJNNdBrUV39ysRxw6uYCm93Y # 1fK1F14UIOPsZ0G1o5AyrdgfJ6PsJEenttQ+yQF6t41fZYQRD9mj8WEij61kJ7Yi # UPO8RlNaTVvt8C86L3PtBJUen48Qz35tPpT4LO0lWPwdS+sqjv6Fi633rVOhbvsx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBvPX8lGmaZGq4RoOWvhjkf # i9DeSdU/qrWwh6aXeRzSODCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8 # 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg2cCr # DQIdbsf0+tyBTTuQrs/4PYHMxi7QbHuul90FSlYwDQYJKoZIhvcNAQELBQAEggIA # Btkym8q+/RHBe3qTMlUU5DrzOKc8wOTMCtsm3b4NtXHMRzEU4MEyst9gKdfiFVKP # r0cmMCe03Hp9A+fAvPcJRHazfvsV6q+38ew0Io6lvJhIBJ2gyQz4f+Z9ASSU24x8 # AiTO1S3vBS0q415gs0QrS0RrNUIXVmBQCIPnn60oBQNwebQoYSUOOxovhVgnsYvC # PixGBf55bvhsDhdJlBf6C8t2LgJf5w/w5m67dShbuteZAkDBuAniyf06hd6kYTn2 # szpp+viagGVbRmAJnVCixIOgobnvz0N+mbZxtBxKujnjYgIIyTPjb4SijkABNKql # 3ekOwSBevi1mfoh+egxYiJlLe1dGyErdhUTjznNpxa4JWmjAtKSgdOOsC8mZpRjh # F1wYVVtQR925jDyUAaNMMzEBjnj6fco1kRVQqY3GrktX2Yw0hzlYZ5GjUjKQkx50 # qGg+aGmONP414NTx6+rV4KYJlS5U8DNk+PfOo6+xBb8hhmITSgeK0evvoS3Vjx1c # 32lPa6uvRWyjQUcEWQqfZS+FYL7DkvV/F9h86Cdu+PxrSomlal4YT4Ihf9xq5j2f # ZUyWx3Acl/mpJpBiz/ZeD2vIDMtHdF3PO9kOvZXZMFlLIfzDnABR7KV8zuND+RUe # yprb5L3pZQQa2sL3tWsJtCKFhiNwWiAglWdyuR3pMGQ= # SIG # End signature block
combined_dataset/train/non-malicious/4109.ps1
4109.ps1
Clear-Host Set-Variable -Name OS -Scope Global -Force Set-Variable -Name RelativePath -Scope Global -Force Function RenameWindow ($Title) { Set-Variable -Name a -Scope Local -Force $a = (Get-Host).UI.RawUI $a.WindowTitle = $Title Remove-Variable -Name a -Scope Local -Force } Function GetRelativePath { $Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" } Function GetOSArchitecture { $Global:Architecture = Get-WMIObject win32_operatingsystem $Global:Architecture = $Global:Architecture.OSArchitecture } Function ProcessRunning($Description,$Process) { Set-Variable -Name ProcessActive -Scope Local -Force Write-Host $Description"....." -NoNewline $ProcessActive = Get-Process $Process -ErrorAction SilentlyContinue if($ProcessActive -eq $null) { Write-Host "Not Running" -ForegroundColor Yellow } else { Write-Host "Running" -ForegroundColor Red } Remove-Variable -Name ProcessActive -Scope Local -Force } Function KillProcess($Description,$Process) { Set-Variable -Name ProcessActive -Scope Local -Force Write-Host $Description"....." -NoNewline $ProcessActive = Stop-Process -Name $Process -Force If ($ProcessActive -eq $null) { Write-Host "Killed" -ForegroundColor Yellow } else { Write-Host "Still Running" -ForegroundColor Red } } Function CopyFile($FileName,$SourceDir,$DestinationDir,$NewFileName) { If ($SourceDir.SubString($SourceDir.length-1) -ne "\") { $SourceDir = $SourceDir+"\" } If ((Test-Path -Path $SourceDir$FileName) -eq $true) { Write-Host "Copying"$FileName"....." Copy-Item -Path $SourceDir$FileName -Destination $DestinationDir -Force If ($NewFileName -ne "") { If ($DestinationDir.SubString($DestinationDir.length-1) -ne "\") { $DestinationDir = $DestinationDir+"\" } Rename-Item -Path $DestinationDir$FileName -NewName $NewFileName -Force } } } Function BalloonTip($ApplicationName, $Status, $DisplayTime) { Set-Variable -Name balloon -Scope Local -Force Set-Variable -Name icon -Scope Local -Force Set-Variable -Name path -Scope Local -Force [system.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms') | Out-Null $balloon = New-Object System.Windows.Forms.NotifyIcon $path = Get-Process -id $pid | Select-Object -ExpandProperty Path $icon = [System.Drawing.Icon]::ExtractAssociatedIcon($path) $balloon.Icon = $icon $balloon.BalloonTipIcon = 'Info' $balloon.BalloonTipTitle = "Gresham, Smith and Partners" $balloon.BalloonTipText = $ApplicationName+[char]13+[char]13+$Status $balloon.Visible = $true $balloon.ShowBalloonTip($DisplayTime) Remove-Variable -Name balloon -Scope Local -Force Remove-Variable -Name icon -Scope Local -Force Remove-Variable -Name path -Scope Local -Force } Function UninstallOldMSIApplication($Description) { Set-Variable -Name AppName -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Set-Variable -Name Desc -Scope Local -Force Set-Variable -Name ErrCode -Scope Local -Force Set-Variable -Name GUID -Scope Local -Force Set-Variable -Name Output -Scope Local -Force Set-Variable -Name Output1 -Scope Local -Force $Desc = [char]34+"description like"+[char]32+[char]39+[char]37+$Description+[char]37+[char]39+[char]34 $Output1 = wmic product where $Desc get Description cls $Output1 | ForEach-Object { $_ = $_.Trim() if(($_ -ne "Description")-and($_ -ne "")){ $AppName = $_ } } If ($AppName -eq $null) { return } Write-Host "Uninstalling"$AppName"....." -NoNewline $Output = wmic product where $Desc get IdentifyingNumber $Output | ForEach-Object { $_ = $_.Trim() if(($_ -ne "IdentifyingNumber")-and($_ -ne "")){ $GUID = $_ } } $Arguments = "/X"+[char]32+$GUID+[char]32+"/qb- /norestart" $ErrCode = (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode $Result = (AppInstalled $Description) If ($Result) { Write-Host "Failed with error code"$ErrCode -ForegroundColor Red } else { Write-Host "Uninstalled" -ForegroundColor Yellow } Remove-Variable -Name AppName -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force Remove-Variable -Name Desc -Scope Local -Force Remove-Variable -Name ErrCode -Scope Local -Force Remove-Variable -Name GUID -Scope Local -Force Remove-Variable -Name Output -Scope Local -Force Remove-Variable -Name Output1 -Scope Local -Force } Function InstallMSIApplication($App,$Switches,$Transforms,$Desc) { Set-Variable -Name App -Scope Local -Force Set-Variable -Name Arguments -Scope Local -Force Set-Variable -Name ErrCode -Scope Local -Force Set-Variable -Name Result -Scope Local -Force Write-Host "Installing"$Desc"....." -NoNewline $App = [char]32+[char]34+$RelativePath+$App+[char]34 $Switches = [char]32+$Switches If ($Transforms -ne $null) { $Transforms = [char]32+"TRANSFORMS="+$RelativePath+$Transforms $Arguments = "/I"+$App+$Transforms+$Switches } else { $Arguments = "/I"+$App+$Switches } $ErrCode = (Start-Process -FilePath "msiexec.exe" -ArgumentList $Arguments -Wait -Passthru).ExitCode $Result = (AppInstalled $Desc) If ($Result) { Write-Host "Installed" -ForegroundColor Yellow } else { Write-Host "Failed with error"$ErrCode -ForegroundColor Red } Remove-Variable -Name App -Scope Local -Force Remove-Variable -Name Arguments -Scope Local -Force Remove-Variable -Name ErrCode -Scope Local -Force Remove-Variable -Name Result -Scope Local -Force } Function InstallEXEApplication($App,$Switches,$Desc) { Set-Variable -Name ErrCode -Scope Local -Force Set-Variable -Name Result -Scope Local -Force Write-Host "Installing <Application>....." -NoNewline $App = [char]32+[char]34+$RelativePath+$App+[char]34 $ErrCode = (Start-Process -FilePath $App -ArgumentList $Switches -Wait -Passthru).ExitCode $Result = (AppInstalled $Desc) If ($Result) { Write-Host "Installed" -ForegroundColor Yellow } else { Write-Host "Failed with error"$ErrCode -ForegroundColor Red } Remove-Variable -Name ErrCode -Scope Local -Force Remove-Variable -Name Result -Scope Local -Force } Function AppInstalled($Description) { Set-Variable -Name AppName -Scope Local -Force Set-Variable -Name Output -Scope Local -Force $Description = [char]34+"description like"+[char]32+[char]39+[char]37+$Description+[char]37+[char]39+[char]34 $Output = wmic product where $Description get Description $Output | ForEach-Object { $_ = $_.Trim() if(($_ -ne "Description")-and($_ -ne "")){ $AppName = $_ } } If ($AppName -eq $null) { return $false } else { return $true } Remove-Variable -Name AppName -Scope Local -Force Remove-Variable -Name Output -Scope Local -Force } Function ExecuteDCSU($App,$Switches) { Set-Variable -Name ErrCode -Scope Local -Force $App = [char]34+"C:\Program Files (x86)\Dell\ClientSystemUpdate\"+$App+[char]34 $Switches = "/policy"+[char]32+$RelativePath+$Switches $ErrCode = (Start-Process -FilePath $App -ArgumentList $Switches -Wait -Passthru).ExitCode If ($ErrCode -eq 0) { Write-Host "Drivers Updated" -ForegroundColor Yellow } else { Write-Host "Failed with error"$ErrCode -ForegroundColor Red } Remove-Variable -Name ErrCode -Scope Local -Force } RenameWindow "Install Dell Client System Update" GetRelativePath GetOSArchitecture BalloonTip "Dell Client System Update" "Updating Drivers...." 10000 InstallMSIApplication "Dell Client System Update.msi" "/qb- /norestart" $null "Dell Client System Update" ExecuteDCSU "dcsu-cli.exe" "BuildPolicy.xml" UninstallOldMSIApplication "Dell Client System Update" BalloonTip "Dell Client System Update" "Driver Update Complete" 30000 Remove-Variable -Name OS -Scope Global -Force Remove-Variable -Name RelativePath -Scope Global -Force
combined_dataset/train/non-malicious/Get-Parameter_5.ps1
Get-Parameter_5.ps1
function Get-Parameter ( $Cmdlet, [switch]$ShowCommon ) { foreach ($paramset in (Get-Command $Cmdlet).ParameterSets){ $Output = @() foreach ($param in $paramset.Parameters) { if ( !$ShowCommon ) { if ($param.aliases -match "vb|db|ea|wa|ev|wv|ov|ob") { continue } } $process = "" | Select-Object Name, ParameterSet, Aliases, Position, IsMandatory $process.Name = $param.Name if ( $paramset.name -eq "__AllParameterSets" ) { $process.ParameterSet = "Default" } else { $process.ParameterSet = $paramset.Name } $process.Aliases = $param.aliases if ( $param.Position -lt 0 ) { $process.Position = $null } else { $process.Position = $param.Position } $process.IsMandatory = $param.IsMandatory $output += $process } Write-Output $Output } }
combined_dataset/train/non-malicious/2004.ps1
2004.ps1
Describe "ProviderIntrinsics Tests" -tags "CI" { BeforeAll { setup -d TestDir } It 'If a childitem exists, HasChild method returns $true' { $ExecutionContext.InvokeProvider.ChildItem.HasChild("$TESTDRIVE") | Should -BeTrue } It 'If a childitem does not exist, HasChild method returns $false' { $ExecutionContext.InvokeProvider.ChildItem.HasChild("$TESTDRIVE/TestDir") | Should -BeFalse } It 'If the path does not exist, HasChild throws an exception' { { $ExecutionContext.InvokeProvider.ChildItem.HasChild("TESTDRIVE/ThisDirectoryDoesNotExist") } | Should -Throw -ErrorId 'ItemNotFoundException' } }
combined_dataset/train/non-malicious/New-GenericObject.ps1
New-GenericObject.ps1
##############################################################################\n##\n## New-GenericObject\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nCreates an object of a generic type:\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.ObjectModel.Collection System.Int32\nCreates a simple generic collection\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.Generic.Dictionary `\n System.String,System.Int32\nCreates a generic dictionary with two types\n\n.EXAMPLE\n\nPS >$secondType = New-GenericObject System.Collections.Generic.List Int32\nPS >New-GenericObject System.Collections.Generic.Dictionary `\n System.String,$secondType.GetType()\nCreates a generic list as the second type to a generic dictionary\n\n.EXAMPLE\n\nPS >New-GenericObject System.Collections.Generic.LinkedListNode `\n System.String "Hi"\nCreates a generic type with a non-default constructor\n\n#>\n\nparam(\n ## The generic type to create\n [Parameter(Mandatory = $true)]\n [string] $TypeName,\n\n ## The types that should be applied to the generic object\n [Parameter(Mandatory = $true)]\n [string[]] $TypeParameters,\n\n ## Arguments to be passed to the constructor\n [object[]] $ConstructorParameters\n)\n\nSet-StrictMode -Version Latest\n\n## Create the generic type name\n$genericTypeName = $typeName + '`' + $typeParameters.Count\n$genericType = [Type] $genericTypeName\n\nif(-not $genericType)\n{\n throw "Could not find generic type $genericTypeName"\n}\n\n## Bind the type arguments to it\n[type[]] $typedParameters = $typeParameters\n$closedType = $genericType.MakeGenericType($typedParameters)\nif(-not $closedType)\n{\n throw "Could not make closed type $genericType"\n}\n\n## Create the closed version of the generic type\n,[Activator]::CreateInstance($closedType, $constructorParameters)
combined_dataset/train/non-malicious/sample_35_91.ps1
sample_35_91.ps1
# # Module manifest for module 'OCI.PSModules' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. # RootModule = '' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '5ee167f1-0abc-4d85-b9b3-6d354fcaaa35' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'Oracle Cloud Infrastructure (OCI) PowerShell Modules - Cmdlets to manage resources in OCI. For more information, please visit: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/powershell.htm' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Accessgovernancecp'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Adm'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Aianomalydetection'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Aidocument'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Ailanguage'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Aispeech'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Aivision'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Analytics'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Announcementsservice'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Apigateway'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmconfig'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmcontrolplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmsynthetics'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmtraces'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Applicationmigration'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Appmgmtcontrol'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Artifacts'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Audit'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Autoscaling'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Bastion'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Bds'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Blockchain'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Budget'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Capacitymanagement'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificates'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificatesmanagement'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Cims'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudbridge'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudguard'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudmigrations'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Computecloudatcustomer'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Computeinstanceagent'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerengine'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerinstances'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Core'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Dashboardservice'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Database'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemanagement'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemigration'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasetools'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Datacatalog'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataflow'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataintegration'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservice'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservicedataplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Datasafe'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Datascience'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Desktops'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Devops'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Disasterrecovery'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Dns'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Dts'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Email'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Emaildataplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Emwarehouse'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Events'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Filestorage'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Fleetsoftwareupdate'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Functions'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Fusionapps'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeai'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeaiinference'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Genericartifactscontent'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Globallydistributeddatabase'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Goldengate'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Governancerulescontrolplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Healthchecks'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Identity'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydataplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydomains'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Integration'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Jms'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Jmsjavadownloads'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Keymanagement'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Licensemanager'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Limits'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Loadbalancer'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Lockbox'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Loganalytics'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Logging'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingingestion'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingsearch'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementagent'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementdashboard'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplace'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplacepublisher'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Mediaservices'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Monitoring'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Mysql'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkfirewall'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkloadbalancer'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Nosql'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Objectstorage'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Oce'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocicontrolcenter'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocvp'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Oda'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Onesubscription'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Ons'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Opa'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Opensearch'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Operatoraccesscontrol'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Opsi'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Optimizer'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagement'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagementhub'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Ospgateway'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubbillingschedule'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osuborganizationsubscription'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubsubscription'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubusage'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Psql'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Queue'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Recovery'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Redis'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcemanager'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcesearch'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Rover'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Sch'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Secrets'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicecatalog'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemanagerproxy'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemesh'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Stackmonitoring'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Streaming'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Tenantmanagercontrolplane'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Threatintelligence'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Usage'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Usageapi'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Vault'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Vbsinst'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Visualbuilder'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Vnmonitoring'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Vulnerabilityscanning'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Waa'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Waas'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Waf'; RequiredVersion = '80.0.0'; }, @{ModuleName = 'OCI.PSModules.Workrequests'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Start-Presentation_1.ps1
Start-Presentation_1.ps1
if(-not(get-command New-System.Windows.Window -EA 0)){ Import-Module PowerBoots } Add-BootsTemplate $PSScriptRoot\\PresentationFrame.xaml $name = [System.Windows.Navigation.JournalEntry]::NameProperty [double]$global:zoomLevel = 1 $SlideCount = 0 function Start-Zoom { PARAM( [Parameter(Position=0)] $Zoom = 0 , [Parameter(ValueFromPipeline=$true)] $Root = $($global:Frame) , [Parameter()] $Window = $presentationTitle ) $null = Invoke-BootsWindow $Window { Param($Window,$Root) if(!$Root.RenderTransform.Children) { $Root.RenderTransform = TransformGroup { ScaleTransform -ScaleX $zoomLevel -ScaleY $zoomLevel TranslateTransform } $BootsWindow.Add_MouseDown( { if($zoomLevel -ne 1) { trap { Write-Host $( $_ | fl * | out-string ) } $global:MouseDownPoint = [System.Windows.Input.Mouse]::GetPosition($BootsWindow) $this.CaptureMouse() } } ) $BootsWindow.Add_MouseUp( { if($zoomLevel -ne 1) { trap { Write-Host $( $_ | fl * | out-string ) } $this.ReleaseMouseCapture() } } ) $BootsWindow.Add_MouseMove( { if($zoomLevel -ne 1) { trap { Write-Host $( $_ | fl * | out-string ) } if($_.LeftButton -eq "Pressed") { $newPos = [System.Windows.Input.Mouse]::GetPosition($BootsWindow) $this.Content.RenderTransform.Children[1].SetValue( [System.Windows.Media.TranslateTransform]::XProperty, $this.Content.RenderTransform.Children[1].Value.OffsetX + ($newPos.X - $MouseDownPoint.X) ) $this.Content.RenderTransform.Children[1].SetValue( [System.Windows.Media.TranslateTransform]::YProperty, $this.Content.RenderTransform.Children[1].Value.OffsetY + ($newPos.Y - $MouseDownPoint.Y) ) $global:MouseDownPoint = $newPos; } } } ) } } $Root } function Set-Zoom { PARAM( [Parameter(Position=0)] $Zoom = 0 , [Parameter()] $Root = $global:Frame , [Parameter()] $Window = $presentationTitle ) if($Zoom -gt 0) { $global:zoomLevel *= (1+($Zoom/10)) } elseif($Zoom -lt 0) { $global:zoomLevel /= (1+($Zoom/-10)) } else { $global:zoomLevel = 1.0 } $null = Invoke-BootsWindow $Window { Param($Window,$Root) $Root.RenderTransform.Children[0].SetValue( [System.Windows.Media.ScaleTransform]::ScaleXProperty, $zoomLevel ) $Root.RenderTransform.Children[0].SetValue( [System.Windows.Media.ScaleTransform]::ScaleYProperty, $zoomLevel ) ## Note that we have to account for rounding errors ;) if([Math]::Round($zoomLevel, 10) -eq 1.0 ) { $Root.NavigationUIVisibility = "Visible" $Root.RenderTransform.Children[1].SetValue( [System.Windows.Media.TranslateTransform]::XProperty, 0.0 ) $Root.RenderTransform.Children[1].SetValue( [System.Windows.Media.TranslateTransform]::YProperty, 0.0 ) } else { $Root.NavigationUIVisibility = "Hidden" } } $Root } function Show-Url { [CmdletBinding()] PARAM( [Parameter(Position=0, ValueFromPipeline=$true)] [Uri]$Content , [Parameter()] $Window = $presentationTitle ) Invoke-BootsWindow $Window { $global:Frame.Navigate( $Content ) } } New-Alias Navigate Show-Url # backwards compat function Add-Slide { #.Synopsis # Add a slide to the presentation #.Description # Add any .net object as a slide to a presentation, wrapping it in a Page to set the title. [CmdletBinding(DefaultParameterSetName="Script")] PARAM( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Name")] [String]$Title = "Slide $SlideCount" , [Parameter(Position=1, ValueFromPipeline=$true, Mandatory=$true)] $Content , [Parameter()] $Window = $presentationTitle ) PROCESS { $SlideCount++ Invoke-BootsWindow $Window { Param($Frame, $Content, $Title) $Frame.Content = Page -Content $Content -Title $Title } $global:Frame $Content $Title } } function Add-TextSlide { #.Synopsis # Add a text slide to the presentation #.Description # Add a textual slide to the presentation with a header and several points [CmdletBinding()] PARAM( [Parameter(Position=0)] $Title = "Slide $SlideCount" , [Parameter(Position=1, ValueFromPipeline=$true)] [string[]]$Content = @("Several bullet points", "Which are equally important") , [Parameter()] $Window = $presentationTitle ) BEGIN { [string[]]$global:Points = @() } PROCESS { [string[]]$global:Points += $Content } END { Add-Slide -Title $Title -Window $Window -Content { StackPanel -Margin 10 { grid { TextBlock $Title -FontSize 85 -FontFamily Impact -Foreground White -Effect { BlurEffect -Radius 15 } -TextAlign Center TextBlock $Title -FontSize 85 -FontFamily Impact -Foreground $global:TitleBrush -TextAlign Center } write-host "Points: $Points" $Points | % { TextBlock $_ -FontSize 64 -FontWeight Bold -Foreground "White" -TextWrapping Wrap -Effect { DropShadowEffect -BlurRadius 15 } } } }.GetNewClosure() } } function Add-TitleSlide { #.Synopsis # Add a text slide to the presentation #.Description # Add a textual slide to the presentation with a header and several points [CmdletBinding()] PARAM( [Parameter(Position=0)] $Title , [Parameter()] $Window = $presentationTitle ) BEGIN { [string[]]$Points = @() } PROCESS { [string[]]$Points += $Content } END { Add-Slide -Title $Title -Window $Window -Content { Grid { TextBlock $Title ` -FontSize 125 -FontFamily Impact -Foreground White ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` -Effect { BlurEffect -Radius 20 } TextBlock $Title ` -FontSize 125 -FontFamily Impact -Foreground White ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` -Effect { BlurEffect -Radius 20 } TextBlock $Title ` -FontSize 125 -FontFamily Impact -Foreground $global:TitleBrush ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` -Effect {DropShadowEffect -Color White -Radius 15} } } } } function Remove-Slide { #.Synopsis # Removes the specified slide from the deck (history) #.Description # Takes an index or name, and removes that slide, except that you CANNOT remove the last slide. PARAM( [Parameter(ParameterSetName="ByIndex", Mandatory=$true, Position=0)] [int]$index , [Parameter(ParameterSetName="ByTitle", Mandatory=$true, Position=0)] [Alias("Name")] [string]$Title , [Parameter()] $Window = $presentationTitle ) $null = Invoke-BootsWindow $Window { # Figure out where we are now, because we'll need to come back $global:currentSlide = @($global:Frame.BackStack.GetEnumerator()).Count # Activate the slide they want to delete ... [int]$removable = Set-Slide @PsBoundParameters -passthru } # Separate Invoke's are required for the window to register what's going on? $global:removable = $true $null = Invoke-BootsWindow $Window { if($global:Frame.CanGoForward) { $global:Frame.GoForward() } else { $global:removable = $false Write-Host "Sorry, you can't remove the last slide in the deck." -Fore Red } } if($global:removable) { # Separate Invoke's are required for the window to register what's going on? Invoke-BootsWindow $Window { $null = $global:Frame.RemoveBackEntry() Set-Slide $currentSlide } } } function Show-Slide { #.Synopsis # Set the active slide in a deck #.Description # Sets the active slide by index or name (title) [CmdletBinding(DefaultParameterSetName="ByIndex")] PARAM( [Parameter(ParameterSetName="ByIndex", Mandatory=$true, Position=0)] [int]$index , [Parameter(ParameterSetName="ByTitle", Mandatory=$true, Position=0)] [Alias("Name")] [string]$Title , [Parameter()] $Window = $presentationTitle , [Parameter()] [Switch]$Passthru ) switch($PSCmdlet.ParameterSetName) { "ByIndex" { $null = Invoke-BootsWindow $Window { # Figure out where we are now... [int]$global:current = @($global:Frame.BackStack.GetEnumerator()).Count # Then go where we need to for(;$current -lt $index -and $global:Frame.CanGoForward ;$global:current++) { $global:Frame.GoForward() } for(;$current -gt $index -and $global:Frame.CanGoBack ;$global:current--) { $global:Frame.GoBack() } } if($Passthru) { return $global:current } } "ByTitle" { [int]$global:result = -1 [int]$global:current = -1 $null = Invoke-BootsWindow $Window { # Figure out where we are now... $global:current = @($global:Frame.BackStack.GetEnumerator()).Count # Start with backward history ('cause it's more likely) [int]$i = 0; foreach($page in $global:Frame.BackStack) { if($page.Name -eq $Title) { $global:result = $current - $i - 1 for(;$i -gt $0 -and $global:Frame.CanGoBack;$i--) { $global:Frame.GoBack() } break; } $i++ } # Failing that, try forward history [int]$i = 0; foreach($page in $global:Frame.ForwardStack) { if($page.Name -eq $Title) { $global:result = $current + $i + 1 for(;$i -gt $0 -and $global:Frame.CanGoForward ;$i--) { $global:Frame.GoForward() } break; } $i++ } } if($Passthru) { if($global:result -ge 0) { return $global:result } else { return $global:current } } } } } New-Alias Set-Slide Show-Slide # backwards compat function Move-NextSlide { #.Synopsis # Navigates to the next slide (if there is another) PARAM( [Parameter()] $Window = $presentationTitle , [Parameter()] [Switch]$Passthru ) $DidGo = Invoke-BootsWindow $Window { Write-Output $global:Frame.CanGoForward if($global:Frame.CanGoForward) { $global:Frame.GoForward() } } if($Passthru){ $DidGo } } New-Alias Next-Slide Move-NextSlide # backwards compat function Move-PreviousSlide { #.Synopsis # Navigates to the previous slide (if there is another) PARAM( [Parameter()] $Window = $presentationTitle , [Parameter()] [Switch]$Passthru ) $DidGo = Invoke-BootsWindow $Window { Write-Output $global:Frame.CanGoForward if($global:Frame.CanGoBack) { $global:Frame.GoBack() } } if($Passthru){ $DidGo } } New-Alias Prev-Slide Move-PreviousSlide New-Alias Previous-Slide Move-PreviousSlide # backwards compat function Start-Presentation { #.Synopsis # Start a presentation window #.Description # This is the kick-off function you have to call to create the presentation window PARAM( $PresentationTitle = "PowerShell Presentation" , $BackgroundImagePath = $(Get-ItemProperty "HKCU:\\Control Panel\\Desktop" | Select -Expand Wallpaper | Get-ChildItem) ) $BackgroundImagePath = Convert-Path (Resolve-Path $BackgroundImagePath) $global:PresentationTitle = $PresentationTitle ## Finally, make the slide window Boots -Title $PresentationTitle ` -Height $([System.Windows.SystemParameters]::PrimaryScreenHeight) ` -Width $([System.Windows.SystemParameters]::PrimaryScreenWidth) ` { $global:TitleBrush = LinearGradientBrush -Start "0.5,0" -End "0.5,1" { GradientStop -Color "#FF084670" -Offset 0 GradientStop -Color "#FF084670" -Offset 0.6 GradientStop -Color "#FF000000" -Offset 0.6 } $global:Frame = Frame -Content { Page -Title "Welcome" { Grid { TextBlock $PresentationTitle ` -FontSize 125 -FontFamily Impact -Foreground White ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` -Effect { BlurEffect -Radius 30 } TextBlock $PresentationTitle ` -FontSize 125 -FontFamily Impact -Foreground White ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` -Effect { BlurEffect -Radius 30 } TextBlock $PresentationTitle ` -FontSize 125 -FontFamily Impact -Foreground $global:TitleBrush ` -VerticalAlignment Center -TextAlignment Center ` -HorizontalAlignment Stretch -TextWrapping Wrap ` } } } #Start-Zoom -Root $global:Frame $global:Frame } -Async -Popup -On_SourceInitialized { if(Test-Path $BackgroundImagePath) { $this.Background = ImageBrush -ImageSource $BackgroundImagePath } $this.WindowState = "Maximized" } -On_KeyDown { trap { Write-Host $( $_ | fl * | Out-String ) } switch -regex ($_.Key) { "Escape" { Set-Zoom 0; break; } "OemPlus|Add" { Set-Zoom +1; break; } "OemMinus|Subtract" { Set-Zoom -1; break; } "MediaNextTrack|BrowserForward|Right" { Next-Slide; break; } "MediaPreviousTrack|BrowserBack|Left" { Previous-Slide; break; } } } -On_MouseWheel { if($_.Delta -gt 0 ) { Set-Zoom +1 } else { Set-Zoom -1 } } # -WindowStyle None -AllowsTransparency $true } function Test-Presentation { Start-Presentation "PowerShell for Developers" Add-TextSlide "Overview" "What is PowerShell?", "How can it help me?", "Should I code for it?", "How do I ..." Add-TextSlide "What is PowerShell?" "A .Net Console","A new .Net Language","An admin scripting tool","An app automation engine", "All of the above" ls ~\\Pictures\\Comix | Add-Slide Set-Slide 0 ## The simple, automatic, force-my-hand slide timer. ## One slide, every 20 seconds: ## go forward and check if we can go forward again while( Move-NextSlide -Passthru ) { # note that we have to sleep outside the invoke... # otherwise the window can't update sleep 20 } } Export-ModuleMember -Function * -Alias *
combined_dataset/train/non-malicious/sample_62_97.ps1
sample_62_97.ps1
# # Module manifest for module 'OCI.PSModules.Events' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Events.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e1c10f7-8832-4248-b692-89297c84ea32' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Events Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList', 'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule', 'Remove-OCIEventsRule', 'Update-OCIEventsRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_43_12.ps1
sample_43_12.ps1
#This script converts securestring to plaintext param( [Parameter(Mandatory, ValueFromPipeline)] [System.Security.SecureString] ${SecureString} ) $ssPtr = [System.Runtime.InteropServices.Marshal]::SecureStringToBSTR($SecureString) try { $plaintext = [System.Runtime.InteropServices.Marshal]::PtrToStringBSTR($ssPtr) } finally { [System.Runtime.InteropServices.Marshal]::ZeroFreeBSTR($ssPtr) } return $plaintext # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDT7ZbNoY98P1cW # CLQEXghewcRRqpuzw+uOgG2nbQ8aHaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAmRZNAgxcDFKH97A6YERhvK # rSJCqORTlbGk5c1WcUAXMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAmDM3dETWF3IZty6w755Po2MXNNpeqpQk84QAyw9GvwX8JDoov6aPzDL0 # T4U6RU/y2fQ7DEGwyFIScXm6R4RRpeF1X8fooQEb/lvtIW9/cm77MUh9ph7mleZD # 8lMVnGm6NGrr0Y/Yie2YDT0AqRUSZjaJJOvZF2+l4LdgZ3i/LpERKRxlBfmyQ0ud # lHvrYW7FWg/fNXjzYq6aJ86c0sdrWT23PFbUIkTosc6XoP4VZrNiUHrGpMYlImWo # fpYIQgDx9cCehT/o5b7dnL+b/dYTPukH+yzgXRX8hvQ9sqll2QOv3FBr30/sseZs # nQdSgouPdEmqQIAHbsrGOlwN2SPE06GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBlkG1rco6/gfcB+/9WbE+emoQWqDJpdLg2r4YtaeUqywIGZjOaePor # GBMyMDI0MDUxNjA2NDIxMy4yMTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAiGA8yMDI0MDUxNjAxNDgz # OVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+R3 # AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vVD5ZLQF2IVTBpgme2LkAy # RNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk84cbeSEfs3ona7Atp4Vjb # 6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+sFS9/5M9THX/JkjED/UJ+ # Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0VaMYL7Zwea7M7OuTf1U0J # tHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2ssdUPFHWHCJ3gTkcOB6y # FOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB # 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCQa/JbpCr1S3MfzpLdhJ+Yq1A0549b2s25U1Ri9ghw # MTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb # HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3U7IzUMEK7mnRzIEEZ3gJ # GNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIAebCs4CdM9zAgwuj6kvzh # CG7rXCtSSOgCqXvqjxxLuV/sAEyfe5yfJr3rcVJOHXCbYa/VyCrOsp4hPavLbSSo # H7v8r0zdVYiBZuwK+t4vQEjlze431GbO1NBggoOtUAg4/YKywWJObN1oYzPTiNE3 # 0yqw/dIKae0bKCKJ07+SNUcLwu38YVUvFvJrutzBqNSgahXvLNbszCSS6LR/pMOD # s3pcaF92IGsBLXQ6zcbgvVlVQvVqFyctQis9XoGhDBIsNvF3WubGRcQPy/i9I5gc # MB/xcLiBtY7wG+98flybiQ5pIV62ndy3sqaq/lJJbBsaWRyKnWge0oxZ56c6uCdQ # 4GhptqWRua3gAXNgyqO+OMKDVVd7pYcAa4I+ha7f8cEt/Pt2v6RuFaTc4jOMbTzN # 41sBU/yePz3pPUrgShKi0zCE4mCnFbAVPc6NklcGJ16PIzkcm5SzAh/RBQAndeQp # 7l8X6yz6y+yciTEaQ3QLiFYwJ86G5nKxfBgnn/+akaXWvsdHBF74lo8h3h6Tnrrh # 0m3y4cWu8cqY8DsBmqM36NbS5oOsdEZmop/JCgrV3YAEAM+L0eHbKzY4udEbldB9 # J7UDsFkA6SstaIgViowSXxP4/8eYgYUWD1nlEA8R+rS5KTFAiqaKpTosL8PZ8cjO # 3kMlGnrI6XPPkgTwlKpOjJE= # SIG # End signature block
combined_dataset/train/non-malicious/3088.ps1
3088.ps1
function Verify-Same { param ( [Parameter(ValueFromPipeline = $true)] $Actual, [Parameter(Mandatory = $true, Position = 0)] $Expected ) if (-not [object]::ReferenceEquals($Expected, $Actual)) { throw [Exception]"Expected the objects to be the same instance but they were not." } $Actual }
combined_dataset/train/non-malicious/269.ps1
269.ps1
function Get-ADDirectReports { [CmdletBinding()] PARAM ( [Parameter(Mandatory)] [String[]]$Identity, [Switch]$Recurse ) BEGIN { TRY { IF (-not (Get-Module -Name ActiveDirectory)) { Import-Module -Name ActiveDirectory -ErrorAction 'Stop' -Verbose:$false } } CATCH { Write-Verbose -Message "[BEGIN] Something wrong happened" Write-Verbose -Message $Error[0].Exception.Message } } PROCESS { foreach ($Account in $Identity) { TRY { IF ($PSBoundParameters['Recurse']) { Write-Verbose -Message "[PROCESS] Account: $Account (Recursive)" Get-Aduser -identity $Account -Properties directreports | ForEach-Object -Process { $_.directreports | ForEach-Object -Process { Get-ADUser -Identity $PSItem -Properties * | Select-Object -Property *, @{ Name = "ManagerAccount"; Expression = { (Get-Aduser -identity $psitem.manager).samaccountname } } Get-ADDirectReports -Identity $PSItem -Recurse } } } IF (-not ($PSBoundParameters['Recurse'])) { Write-Verbose -Message "[PROCESS] Account: $Account" Get-Aduser -identity $Account -Properties directreports | Select-Object -ExpandProperty directReports | Get-ADUser -Properties * | Select-Object -Property *, @{ Name = "ManagerAccount"; Expression = { (Get-Aduser -identity $psitem.manager).samaccountname } } } } CATCH { Write-Verbose -Message "[PROCESS] Something wrong happened" Write-Verbose -Message $Error[0].Exception.Message } } } END { Remove-Module -Name ActiveDirectory -ErrorAction 'SilentlyContinue' -Verbose:$false | Out-Null } }
combined_dataset/train/non-malicious/sample_7_35.ps1
sample_7_35.ps1
# # Module manifest for module 'OCI.PSModules.Ospgateway' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ospgateway.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c26fa04-4a4e-49f5-877a-c15e551fc06e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ospgateway Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ospgateway.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOspgatewayAddress', 'Get-OCIOspgatewayAddressRule', 'Get-OCIOspgatewayInvoice', 'Get-OCIOspgatewayInvoiceLinesList', 'Get-OCIOspgatewayInvoicesList', 'Get-OCIOspgatewaySubscription', 'Get-OCIOspgatewaySubscriptionsList', 'Invoke-OCIOspgatewayAuthorizeSubscriptionPayment', 'Invoke-OCIOspgatewayDownloadPdfContent', 'Invoke-OCIOspgatewayPayInvoice', 'Invoke-OCIOspgatewayPaySubscription', 'Invoke-OCIOspgatewayVerifyAddress', 'Update-OCIOspgatewaySubscription' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ospgateway' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Set Active Sync DeviceID.ps1
Set Active Sync DeviceID.ps1
# Requires a connection to Exchange Server, or Exchange Management Shell $s = New-PSSession -ConfigurationName Microsoft.Exchange -Name ExchMgmt -ConnectionUri http://ex14.domain.local/PowerShell/ -Authentication Kerberos Import-PSSession $s # Get all Client Access Server properties for all mailboxes with an ActiveSync Device Partnership $Mailboxes = Get-CASMailbox -Filter {HasActivesyncDevicePartnership -eq $true} -ResultSize Unlimited # Get DeviceID for all mailboxes $EASMailboxes = $Mailboxes | Select-Object PrimarySmtpAddress,@{N='DeviceID';E={Get-ActiveSyncDeviceStatistics -Mailbox $_.Identity | Select-Object –ExpandProperty DeviceID}} # Set the ActiveSyncAllowedDeviceIDs attribute of all Mailboxes $EASMailboxes | foreach {Set-CASMailbox $_.PrimarySmtpAddress -ActiveSyncAllowedDeviceIDs $_.DeviceID}
combined_dataset/train/non-malicious/sample_27_86.ps1
sample_27_86.ps1
# # Script module for module 'Az.Monitor' that is executed when 'Az.Monitor' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 05/16/2024 06:33:08 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"3.0.0") { Write-Error "This module requires Az.Accounts version 3.0.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 3.0.0 -Scope Global } Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Monitor.dll) if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @('Add-AzMetricAlertRule:ResourceGroupName','Add-AzMetricAlertRuleV2:ResourceGroupName','Add-AzWebtestAlertRule:ResourceGroupName') if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDergKc+BPP5qU2 # mqHyT6pYxYhWNfseLmEeyEMZFAOHyaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOhkUh0MSjyiEzO8bpMW0PZV # qTDtk1BFQpoc9m0hIYvWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAT7d5mLMMW3khn7KF+c+Gak0ySZtox/l/ME1u31FL0CHJVG2Ii19af91/ # POgLasXLwihEnQFxqwqci3ABybABEa298p2CaGESBWkCfOOmE11MY9/tFXFQWaDP # 8xaPSFuNPJau9Ue3Wyylep9J1GsCGIilm8XqNOD0YSAdaH7Sr1PSGsRMmKPRm66L # n739kz1QWuBtYZNDsO/L4i5OJz6MjgAVjVw+/FUPU4VqrY9IgsTWlSClcYVIZf7D # IgLAR9D5F1Fxmm613PeNyjUlkT9xYtXZWbclFabvV/GFeMv+idq6/NSqCdesiXs6 # EJtX2bZfpVH0j0einqd8M/WZE9VfS6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAKKK0pF3BKzgLx9gd5eUDyxHOt4E7UYGiXaQgW22g7HgIGZjOTMI/+ # GBMyMDI0MDUxNjA2NDIxNS40MDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/dJTAiGA8yMDI0MDUxNjAxMTcy # NVoYDzIwMjQwNTE3MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp790l # AgEAMAoCAQACAiY8AgH/MAcCAQACAhN/MAoCBQDp8S6lAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAEhVGnVlLQhp31Br8gQI4FrzQ3vgx9Hz7GvwwXnR7GaG # Ut443VjhqROBrxMxQAcaG7FEj9Ec75+06i7qsIn29zx09CxxDDhDGN2gDPFciLsE # BiuURZx2G5F9uUGFDLtMdH7wD0O9iNBOy4u6pEX8Ip1IkkkmbgAGeDW66AJ2vhiv # tKEdEy5eaL8estsNjCQ3L6A3hKgxoH2kApXhBX/zLQPT6H3lzouSfxjm3v3SXXHf # iXrIxLwskfDd6kHcAiEHUrdKpYIpKCrcG9rtprvYW65JqkZaE/mtxtCTO1jsw2op # 4gX0JsxTp0cnXjpgIHfNXUkclqhWpMH25ciLVUZGQFcxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDj/HdlpFyl77r1LlS/uh1JuQalAMhySZWIWFEZvc08 # 2zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgIbP0ZWY+r31SEk/v7RUAyrZJ # M1k6l1N9wsbSPOKyaUMwDQYJKoZIhvcNAQELBQAEggIArF6MYMKI9LW0qfyjHdYQ # 1IQtgXJDzlyr9e7ow+LcWNQFBsnjZdnEZKd82jVOUkLwcboUTBohPAgSH6NbcGka # Pb1535v4AyE7aZBRt/fSq//7UPVAGnhqwhYx0XP65gXmowxcGYHSeCBIi63swc1f # Z2rQw04RHdMQF9nFQ24b2ITgFrpxBMgp+HL0bACQ818Fnth5+id9/cQ6BIjHxhMq # +yrtmyDxIcw1Nb1k/leZnj4xjY2z+yjEYHG1o3z6CxQSlcVTxYWAUjgJsFZRLJue # 6aLGSg7q9xNonpLmON+aBr+sPJzZtbuhoOG4d7gIpM1rAFHXt/vF6ocKUmYV2HA1 # gYV6kv6EiEmrywDbkWy9ipIEpMw3EV7S0P/PY2HkzU4bjbSGlQ3hBg7+18M264tm # ah94LOzLH1qzI5MZ7cezvglvh1oNj3hvaHchxgIaZbpqIjocmFisRnaSAw+NSV5Q # km6/JjTK+VGIN14yS2jOVRTCd/PtmxQbFIKK7WhYgCpg6YKtO4jsDssnNlO4JB+c # B3I6vh1t+Zgk/vYqslshzZTqphYj6jZL3AAeEUWCOhJbepFRIGBgzsGCyz0+rV1z # T19/5jBAB6QD/aBEZ9uUml9KThJ1CL9WMZ/9q+b2Nq/zF6la8aI6zUQtuHlM0r+R # qaAzInGSpkK91bGMDvhE9jM= # SIG # End signature block
combined_dataset/train/non-malicious/Upgrade VM's to v7.ps1
Upgrade VM's to v7.ps1
Function PowerOn-VM($vm){ Start-VM -VM $vm -Confirm:$false -RunAsync | Out-Null do { $vmview = get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus Write-Host $vm is starting! -ForegroundColor Yellow sleep 5 }until(($status -match "toolsOld") -or ($status -match "toolsOk")) if ($status -match "Ok"){ $Startup = "Ok"} elseif($status -match "toolsOld"){ $Startup = "ToolsOld"} else{ $Startup = "Not Ready"} return $Startup } Function PowerOff-VM($vm){ sleep 20 Shutdown-VMGuest -VM $vm -Confirm:$false | Out-Null do { $vmview = Get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus Write-Host $vm is stopping! -ForegroundColor Yellow sleep 5 }until($status -match "toolsNotRunning") if ($status -match "toolsNotRunning"){ $Shutdown = "Ok"} else{ $Shutdown = "Not Ready"} return $Shutdown } Function Check-ToolsStatus($vm){ $vmview = get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus if ($status -match "toolsOld"){ $vmTools = "Old"} elseif($status -match "toolsNotRunning"){ $vmTools = "Not Running"} else{ $vmTools = "Ok"} return $vmTools } Function Check-VMHardwareVersion($vm){ $vmView = get-VM $vm | Get-View $vmVersion = $vmView.Config.Version $v4 = "vmx-04" $v7 = "vmx-07" if ($vmVersion -eq $v4){ $vmHardware = "Old"} elseif($vmVersion -eq $v7){ $vmHardware = "Ok"} else{Write-Host "Error!!" -ForegroundColor Red $vmHardware = "Error"} return $vmHardware } Function Upgrade-VMHardware($vm){ $vmview = Get-VM $vm | Get-View $vmVersion = $vmView.Config.Version $v4 = "vmx-04" $v7 = "vmx-07" if ($vmVersion -eq $v4){ Write-Host "Version 4 detected" -ForegroundColor Red # Update Hardware Write-Host "Upgrading Hardware on" $vm -ForegroundColor Yellow Get-View ($vmView.UpgradeVM_Task($v7)) | Out-Null } } Function CreateBeforeList{ Write-Host "Creating a CSV File with VM info" -ForegroundColor Yellow $MyCol = @() ForEach ($vm in Get-Folder $Folder | Get-VM ) { $vmview = get-VM $vm | Get-View $myObj = "" | Select Host, VMName, PowerState, IPAddress, MacAddress, Nics, VMToolsVersion, VMToolsStatus, VMToolsRunningStatus $myObj.Host = $VM.Host.Name $myObj.VMName = $VM.Name $myObj.PowerState = $VM.PowerState $myObj.IPAddress = [String]($vmview.Guest.Net| ForEach {$_.IpAddress}) $myObj.MacAddress = [String]($vmview.Guest.Net | ForEach {$_.MacAddress}) $myObj.Nics = $vmview.Guest.Net.Count $myObj.VMToolsVersion = $vmview.Config.Tools.ToolsVersion $myObj.VMToolsStatus = $vmview.Guest.ToolsStatus $myObj.VMToolsRunningStatus = $vmview.Guest.ToolsRunningStatus $myCol += $myObj } $myCol | Export-Csv C:\\beforeHWchange.csv -NoTypeInformation } Function CreateAfterList{ Write-Host "Creating a CSV and an Excel File with VM info" -ForegroundColor Yellow $xlCSV = 6 $xlXLS = 56 $csvfile = "C:\\afterHWchange.csv" $xlsfile = "C:\\afterHWchange.xls" $Excel = New-Object -ComObject Excel.Application $Excel.visible = $True $Excel = $Excel.Workbooks.Add() $Sheet = $Excel.Worksheets.Item(1) $Sheet.Cells.Item(1,1) = "VMName" $Sheet.Cells.Item(1,2) = "IPAddress" $Sheet.Cells.Item(1,3) = "Settings" $intRow = 2 $WorkBook = $Sheet.UsedRange $WorkBook.Interior.ColorIndex = 19 $WorkBook.Font.ColorIndex = 11 $WorkBook.Font.Bold = $True $import = Import-Csv "C:\\beforeHWchange.csv" $vms = Get-Folder $Folder | Get-VM foreach($vm in $vms){ $vmview = $vm | Get-View foreach($item in $import){ $oldIp = $item.IPAddress $newIP = $vm.Guest.IPAddress if($item.VMName -eq $vm){ if($oldIp -eq $newIP){ $Sheet.Cells.Item($intRow, 1) = [String]$vmview.Name $Sheet.Cells.Item($intRow, 2) = [String]$vm.Guest.IPAddress $Sheet.Cells.Item($intRow, 3) = "Good" $Sheet.Cells.Item($intRow, 3).Interior.ColorIndex = 4 } else{ $Sheet.Cells.Item($intRow, 1) = [String]$vmview.Name $Sheet.Cells.Item($intRow, 2) = [String]$vm.Guest.IPAddress $Sheet.Cells.Item($intRow, 3) = "Wrong" $Sheet.Cells.Item($intRow, 3).Interior.ColorIndex = 3 } } } $intRow = $intRow + 1} $WorkBook.EntireColumn.AutoFit() sleep 5 $Sheet.SaveAs($xlsfile,$xlXLS) $Sheet.SaveAs($csvfile,$xlCSV) } $vCenter = Read-Host "Enter your vCenter servername" $Folder = Read-Host "Enter the name of the folder where the VMs are stored" Connect-VIServer $vCenter $vms = Get-Folder $Folder | Get-VM | Get-View | Where-Object {-not $_.config.template -and $_.Config.Version -eq "vmx-04" } | Select Name CreateBeforeList foreach($item in $vms){ $vm = $item.Name $vmHardware = Check-VMHardwareVersion $vm $vmToolsStatus = Check-ToolsStatus $vm Write-Host "Hardware is old on:" $vm -ForegroundColor Red if($vmToolsStatus -eq "Old"){ Write-Host "The VMware Tools are old on:" $vm -ForegroundColor Red Sleep 20 Get-VMGuest $vm | Update-Tools Sleep 120 Write-Host "VMware Tools are installed on:" $vm -ForegroundColor Cyan $vmToolsStatus = Check-ToolsStatus $vm if($vmToolsStatus -eq "Ok"){ $PowerOffVM = PowerOff-VM $vm if($PowerOffVM -eq "Ok"){ Write-Host $vm "is down" -ForegroundColor Yellow Upgrade-VMHardware $vm PowerOn-VM $vm Write-Host $vm "is up to date" -ForegroundColor Green } } } else{ $PowerOffVM = PowerOff-VM $vm if($PowerOffVM -eq "Ok"){ Upgrade-VMHardware $vm PowerOn-VM $vm Write-Host $vm "is up to date" -ForegroundColor Green } } } Sleep 40 CreateAfterList Disconnect-VIServer -Confirm:$false
combined_dataset/train/non-malicious/sample_65_14.ps1
sample_65_14.ps1
#======================================================================================================================================================================= # Copyright (c) Microsoft Corporation. All rights reserved. # # Description: # UnzipAndCopyMDS.ps1 # Kill all running Monitoring processes and unzip Monitoring files during install. #======================================================================================================================================================================= param ( [Parameter(Mandatory=$true)] [string]$ZipFilePath, [string]$DestinationFolder ) Add-Type -AssemblyName System.IO.Compression.FileSystem function Unzip { param([string]$zipfile, [string]$outpath) Write-Output ">>>>Unzipping file '$zipfile' to folder '$outpath'" [System.IO.Compression.ZipFile]::ExtractToDirectory($zipfile, $outpath) } # Execution of the script begins here: $Error.Clear() $timestamp = Get-Date -UFormat "%Y%m%d-%H%M%S" $transcriptPath = Join-Path $env:TEMP "StorageSyncAgent-UnzipAndCopyMDS-$timestamp.log" Start-Transcript -Path $transcriptPath try { # Killing MonAgentLauncher.exe terminates all child MA processes. $targetProcessName = "MonAgentLauncher" $processes = Get-Process -Name $targetProcessName -ErrorAction SilentlyContinue if ($processes) { foreach ($process in $processes) { $executablePath = $process.MainModule.FileName Write-Output "Found process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath" $installDir = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\Agent").InstallDir if ($executablePath.IndexOf($installDir, [StringComparison]::InvariantCultureIgnoreCase) -ge 0) # Confirm that the process belongs to us i.e is installed in our Agent directory { Write-Output "Terminating process $($process.Name) (ID: $($process.Id)) with executable path: $executablePath" Stop-Process -Id $process.Id -Force } } } else { Write-Output "No processes named '$targetProcessName.exe' found." } } catch { Write-Output "Exception occured while attempting to kill Monitoring Agent processes: $_" Write-Output "Ignoring failures while killing Monitoring Agent processes and proceeding with the script" } $Error.Clear() $attempt = 0 $numAttempts = 5 do { $attempt++ if ($attempt -gt 1) { Start-Sleep -Seconds 1 } try { Unzip $ZipFilePath $DestinationFolder $Error.Clear() break; } catch { Write-Error $_.Exception.InnerException.Message -ErrorAction Continue } } while ($attempt -le $numAttempts) # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCnPxDxbVrsTmb6 # EzGenlIsvcThar5JK5SanoBRvrFNB6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMvhJDNeAlZ42NgbF/5zpEaU # HtHu0AbjOXW8jTs4fFzrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAiEaqWEvriOI5zhlfbitQWBGtK3QWEmyMUTEZ84GL5qox4qVbyfuWU/f0 # wVzeG7fqL2daDERfY94dhvXAEqS36oouTOtPGaym4uEO9wQcI+HIRNxn55iPbRmR # O+826eZRnFkph7SLRisDeYy3NUO8/CNVF1AVO0mS3TxNALudqCkcfjeQ26YUZgqT # frJTjm9u3yXTK6j6hzhhSwprKYKnegXsPilptVzH2XnpaMdmEFKctD6ycqo2TDTZ # O08AbVr6DkmLpZirU86jdJo3Vkk0ayYvTd1CyQzLz9WR/+3kkrQo7Oc9omSzRlOu # nNwazr1IBjO9w44K63ndQsfZdjQvL6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCQr8F6oiWK2C8FPtpxJIgzh3YiD6bshaFsGCWPiiOU+QIGZpWBKSVY # GBMyMDI0MDgxNDA3NTExMC44ODhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6mY4xjAiGA8yMDI0MDgxMzE5NTU1 # MFoYDzIwMjQwODE0MTk1NTUwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqZjjG # AgEAMAoCAQACAh6BAgH/MAcCAQACAhOEMAoCBQDqZ4pGAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAHisVUkZU7awgmH+i9eJfc8ScYxw4eVgRpQSkLlAJ3Rs # zyuoDN1XSdkVhHWRvlhrjZOVwjCWTwlKxEDBS0+BK8DoPksvtOu/j0t8HEN4d1Fb # flhC1+09vzxMWIvPEVF6CXAkaYEcYlK8TnOgSiU43pZ1MdhsygiMV+vdT8sTb+05 # aROafa3WvFaNl5i400KjAqfLXpXT6+B9Iceul4wo8t222S+DGsUYxE4PV10cuVa3 # RXEYFHpEmzr2QLH5mNnJb4UZ8uU20DchXv3iFTi+XD6GozYdebNoCI6Sbm0RTIjP # 7jVSb5m8VVbqUY0uMl17h7NdE668WLj/7Ku7eZFC0yYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCA5JDhyfmGXripQILxDILqNx4J8kh69hTesi0a8omnB # lTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgZ5kayXaTUHk8zkL97k0h4q4O # geys6iAk6wRXa5rjRYEwDQYJKoZIhvcNAQELBQAEggIAWnYeD026fKAKUQFoJZif # 0fhAl7ndXkv61pshZjIfazzj//J/c2r1nSgwKhZiC1PR65OozXDQr7H9vstfbU7+ # d8QFNXrVQ/2MXpq6dtedeTnOevNelNgbN3Az2tyfDVbPOnwOvJY1ds1oApth9P26 # o7q1g9rq4Wo2v7X/vWsDvfWJrIehRhazNp9poB1eUUFSogtT3izVcRt7OxD3G5Ax # 9EzNBGcI14Q7LLgGFAG4uezSEvNBx2KgRr4UaA1wdROT+xvEWDninoUXvsyv3Tpu # R6fdm8amsdZdUtrqsueZ0rF/SeSwDxRfoUT1rTBhQ4dhvPR28op9MN39rPf08qLL # rKROkaHQoQhscT4K2881vghftlbRg68sqSn48OaeQReof1yK6btaHapdACHBnZmJ # /oAmh9kSzNwbjq1BDsauA6+auJI5/ZAXeM4bUsFPXKMULNWc/kE/zW32Jv9knBxn # 2LvKlfIRL1i2kqFeq5imU3Qqbyr+ck4PbPGuDCQqqTfqPn3yCK95nIAcHMUGKt77 # Slgpw3ruv/N+pUkDmyl+dubKf6+cuGa2UkFgSBzyLHhu0QOEgbFTLLLpyhehh1Wf # EqZ0RVBM+VjfFwC7SzOFyll1A57EeszyHfdlYaq9vdgI/Nju+BHzZspj2epRNLe5 # e4TVrynnhuQBbzLf6s/h1iU= # SIG # End signature block
combined_dataset/train/non-malicious/Select-TextOutput.ps1
Select-TextOutput.ps1
##############################################################################\n##\n## Select-TextOutput\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nSearches the textual output of a command for a pattern.\n\n.EXAMPLE\n\nGet-Service | Select-TextOutput audio\nFinds all references to "Audio" in the output of Get-Service\n\n#>\n\nparam(\n ## The pattern to search for\n $Pattern\n)\n\nSet-StrictMode -Version Latest\n$input | Out-String -Stream | Select-String $pattern
combined_dataset/train/non-malicious/sample_40_37.ps1
sample_40_37.ps1
@{ RootModule = 'PSModule.psm1' ModuleVersion = '2.2.5' GUID = '1d73a601-4a6c-43c5-ba3f-619b18bbb404' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' Description = 'PowerShell module with commands for discovering, installing, updating and publishing the PowerShell artifacts like Modules, DSC Resources, Role Capabilities and Scripts.' PowerShellVersion = '3.0' FormatsToProcess = 'PSGet.Format.ps1xml' FunctionsToExport = @( 'Find-Command', 'Find-DSCResource', 'Find-Module', 'Find-RoleCapability', 'Find-Script', 'Get-CredsFromCredentialProvider', 'Get-InstalledModule', 'Get-InstalledScript', 'Get-PSRepository', 'Install-Module', 'Install-Script', 'New-ScriptFileInfo', 'Publish-Module', 'Publish-Script', 'Register-PSRepository', 'Save-Module', 'Save-Script', 'Set-PSRepository', 'Test-ScriptFileInfo', 'Uninstall-Module', 'Uninstall-Script', 'Unregister-PSRepository', 'Update-Module', 'Update-ModuleManifest', 'Update-Script', 'Update-ScriptFileInfo') VariablesToExport = 'PSGetPath' AliasesToExport = @('inmo', 'fimo', 'upmo', 'pumo') FileList = @('PSModule.psm1', 'PSGet.Format.ps1xml', 'PSGet.Resource.psd1') RequiredModules = @(@{ModuleName = 'PackageManagement'; ModuleVersion = '1.4.4' }) PrivateData = @{ "PackageManagementProviders" = 'PSModule.psm1' "SupportedPowerShellGetFormatVersions" = @('1.x', '2.x') PSData = @{ Tags = @('Packagemanagement', 'Provider', 'PSEdition_Desktop', 'PSEdition_Core', 'Linux', 'Mac') ProjectUri = 'https://go.microsoft.com/fwlink/?LinkId=828955' LicenseUri = 'https://go.microsoft.com/fwlink/?LinkId=829061' ReleaseNotes = @' ### 2.2.5 - Security patch for code injection bug ### 2.2.4.1 - Remove catalog file ### 2.2.3 - Update `HelpInfoUri` to point to the latest content (#560) - Improve discovery of usable nuget.exe binary (Thanks bwright86!) (#558) ### 2.2.2 Bug Fix - Update casing of DscResources output ### 2.2.1 Bug Fix - Allow DscResources to work on case sensitive platforms (#521) - Fix for failure to return credential provider when using private feeds (#521) ## 2.2 Bug Fix - Fix for prompting for credentials when passing in -Credential parameter when using Register-PSRepository ## 2.1.5 New Features - Add and remove nuget based repositories as a nuget source when nuget client tool is installed (#498) Bug Fix - Fix for 'Failed to publish module' error thrown when publishing modules (#497) ## 2.1.4 - Fixed hang while publishing some packages (#478) ## 2.1.3 New Features - Added -Scope parameter to Update-Module (Thanks @lwajswaj!) (#471) - Added -Exclude parameter to Publish-Module (Thanks @Benny1007!) (#191) - Added -SkipAutomaticTags parameter to Publish-Module (Thanks @awickham10!) (#452) Bug Fix - Fixed issue with finding modules using macOS and .NET Core 3.0 ## 2.1.2 New Feature - Added support for registering repositories with special characters ## 2.1.1 - Fix DSC resource folder structure ## 2.1.0 Breaking Change - Default installation scope for Update-Module and Update-Script has changed to match Install-Module and Install-Script. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times. For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser. (#421) Bug Fixes - Update-ModuleManifest no longer clears FunctionsToExport, AliasesToExport, nor NestModules (#415 & #425) (Thanks @pougetat and @tnieto88!) - Update-Module no longer changes repository URL (#407) - Update-ModuleManifest no longer preprends 'PSGet_' to module name (#403) (Thanks @ThePoShWolf) - Update-ModuleManifest now throws error and fails to update when provided invalid entries (#398) (Thanks @pougetat!) - Ignore files no longer being included when uploading modules (#396) New Features - New DSC resource, PSRepository (#426) (Thanks @johlju!) - Piping of PS respositories (#420) - utf8 support for .nuspec (#419) ## 2.0.4 Bug Fix * Remove PSGallery availability checks (#374) ## 2.0.3 Bug fixes and Improvements * Fix CommandAlreadyAvailable error for PackageManagement module (#333) * Remove trailing whitespace when value is not provided for Get-PSScriptInfoString (#337) (Thanks @thomasrayner) * Expanded aliases for improved readability (#338) (Thanks @lazywinadmin) * Improvements for Catalog tests (#343) * Fix Update-ScriptInfoFile to preserve PrivateData (#346) (Thanks @tnieto88) * Import modules with many commands faster (#351) New Features * Tab completion for -Repository parameter (#339) and for Publish-Module -Name (#359) (Thanks @matt9ucci) ## 2.0.1 Bug fixes - Resolved Publish-Module doesn't report error but fails to publish module (#316) - Resolved CommandAlreadyAvailable error while installing the latest version of PackageManagement module (#333) ## 2.0.0 Breaking Change - Default installation scope for Install-Module, Install-Script, and Install-Package has changed. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times. For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser. ## 1.6.7 Bug fixes - Resolved Install/Save-Module error in PSCore 6.1.0-preview.4 on Ubuntu 18.04 OS (WSL/Azure) (#313) - Updated error message in Save-Module cmdlet when the specified path is not accessible (#313) - Added few additional verbose messages (#313) ## 1.6.6 Dependency Updates * Add dependency on version 4.1.0 or newer of NuGet.exe * Update NuGet.exe bootstrap URL to https://aka.ms/psget-nugetexe Build and Code Cleanup Improvements * Improved error handling in network connectivity tests. Bug fixes - Change Update-ModuleManifest so that prefix is not added to CmdletsToExport. - Change Update-ModuleManifest so that parameters will not reset to default values. - Specify AllowPrereleseVersions provider option only when AllowPrerelease is specified on the PowerShellGet cmdlets. ## 1.6.5 New features * Allow Pester/PSReadline installation when signed by non-Microsoft certificate (#258) - Whitelist installation of non-Microsoft signed Pester and PSReadline over Microsoft signed Pester and PSReadline. Build and Code Cleanup Improvements * Splitting of functions (#229) (Thanks @Benny1007) - Moves private functions into respective private folder. - Moves public functions as defined in PSModule.psd1 into respective public folder. - Removes all functions from PSModule.psm1 file. - Dot sources the functions from PSModule.psm1 file. - Uses Export-ModuleMember to export the public functions from PSModule.psm1 file. * Add build step to construct a single .psm1 file (#242) (Thanks @Benny1007) - Merged public and private functions into one .psm1 file to increase load time performance. Bug fixes - Fix null parameter error caused by MinimumVersion in Publish-PackageUtility (#201) - Change .ExternalHelp link from PSGet.psm1-help.xml to PSModule-help.xml in PSModule.psm1 file (#215) - Change Publish-* to allow version comparison instead of string comparison (#219) - Ensure Get-InstalledScript -RequiredVersion works when versions have a leading 0 (#260) - Add positional path to Save-Module and Save-Script (#264, #266) - Ensure that Get-AuthenticodePublisher verifies publisher and that installing or updating a module checks for approprite catalog signature (#272) - Update HelpInfoURI to 'http://go.microsoft.com/fwlink/?linkid=855963' (#274) ## 1.6.0 New features * Prerelease Version Support (#185) - Implemented prerelease versions functionality in PowerShellGet cmdlets. - Enables publishing, discovering, and installing the prerelease versions of modules and scripts from the PowerShell Gallery. - [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/PrereleaseModule) * Enabled publish cmdlets on PWSH and Nano Server (#196) - Dotnet command version 2.0.0 or newer should be installed by the user prior to using the publish cmdlets on PWSH and Windows Nano Server. - Users can install the dotnet command by following the instructions specified at https://aka.ms/dotnet-install-script. - On Windows, users can install the dotnet command by running *Invoke-WebRequest -Uri 'https://dot.net/v1/dotnet-install.ps1' -OutFile '.\dotnet-install.ps1'; & '.\dotnet-install.ps1' -Channel Current -Version '2.0.0'* - Publish cmdlets on Windows PowerShell supports using the dotnet command for publishing operations. Breaking Change - PWSH: Changed the installation location of AllUsers scope to the parent of $PSHOME instead of $PSHOME. It is the SHARED_MODULES folder on PWSH. Bug fixes - Update HelpInfoURI to 'https://go.microsoft.com/fwlink/?linkid=855963' (#195) - Ensure MyDocumentsPSPath path is correct (#179) (Thanks @lwsrbrts) ## 1.5.0.0 New features * Added support for modules requiring license acceptance (#150) - [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/RequireLicenseAcceptance) * Added version for REQUIREDSCRIPTS (#162) - Enabled following scenarios for REQUIREDSCRIPTS - [1.0] - RequiredVersion - [1.0,2.0] - Min and Max Version - (,1.0] - Max Version - 1.0 - Min Version Bug fixes * Fixed empty version value in nuspec (#157) ## 1.1.3.2 * Disabled PowerShellGet Telemetry on PS Core as PowerShell Telemetry APIs got removed in PowerShell Core beta builds. (#153) * Fixed for DateTime format serialization issue. (#141) * Update-ModuleManifest should add ExternalModuleDependencies value as a collection. (#129) ## 1.1.3.1 New features * Added `PrivateData` field to ScriptFileInfo. (#119) Bug fixes ## 1.1.2.0 Bug fixes ## 1.1.1.0 Bug fixes ## 1.1.0.0 * Initial release from GitHub. * PowerShellCore support. ## For full history of release notes see changelog: https://github.com/PowerShell/PowerShellGet/blob/master/CHANGELOG.md '@ } } HelpInfoURI = 'http://go.microsoft.com/fwlink/?linkid=2113539' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCRNShWem0qs5De # OoNTMpUMZmnlgRrJHCT4bl+44h9Jy6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN08RC17KKEUhfMSj3scTYcg # x1d7sFH+JkR037Tslb3+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbcxqITK5v1Ot2pnljbqyQCO2WlIMS4WojH/TYVqDWsg9xWhj7mOsCjEW # F28L7N8RC32euTTft3Ucnvf02t+DSCc8TbuJMGZM0T6qSTh0Kkg76AC8k0jprbfV # nupgErySLUIyCfeNfyPE1Bm5PA4yMohBBl4d0KkAXrTNA7gdtjS9sI3u2DxHCiR5 # 87hL2m8hWTRh1apZz9OvehGLtIpjq15HE0W/4RVx8YPUblTcHq32Z9J2973d+4eB # IEJFa2YbeO37hF0htreZ+y+QtdXDPr2qALjKNLNmKQSORzkRg/0eERW9H1ZAcqHZ # nDEawRWYVc8CA5srPfAUF8MCZPDBhaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBmLpPXZd9q8vtvKs7ublRpx4IDJUKdyqAz+80RAaUQDwIGZdYG2R2I # GBMyMDI0MDIyNjAzMDQwOC4zODlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGc08wIhgPMjAyNDAyMjYxMDE3NTFaGA8yMDI0MDIyNzEwMTc1MVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZzTwIBADAHAgEAAgIZYDAHAgEAAgIR3DAKAgUA # 6YfEzwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHDEIjghGzYaGDbtF3vI # cHmzY3Gy1BXTRCVb51kPta30B5L2LVT8gT3smO5EYlUCKSHZAkpmzWSjw/pJGu/z # wFMQjx5nEQGdIZ0y+753iTrtMXJ76LBuiHldvmjcg/q/ZOu5d9UHX96QBgZzgepY # K3h7NFMX/10Zzc9Of/2KL4qJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgykw55JTv3zC2j434QfQuEkVJRa3Ac6I5U4OULs4RTNAwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIPokA7jEYMcKLyr8MC0LdMM2hjE55wuYZR4jOpJchD/u # MA0GCSqGSIb3DQEBCwUABIICADbeUGpaO3FFY6AJm7JiZHlQNII939ztVT2Ui+0h # zrYwceT/8frU53SyYS/rmZVtkyFQOAs6moWlhxP89KHoHdyn8/mWmbA9Al2vdMWH # HCgGMJlRyJIGr995taOOz+AiaBR1CbFT+62jkmsO6i3saTbvVEpzqF0q+vfaBk+l # eJY97JqXh3s8ByzWdHLf2I63iwKxfLlDyimMAHpRBPpq1eUW6qmka2EFZM08ke9b # nonXowGqEdqGESLKt0g/EB42QFP8H9+5+O2kDxSM4jA/DC/2FhP3axkh0EiM1zjC # bJKLCY2RmEdSIUismkxgvG/bR79XHfDNhSKolElvssbpZwjsqanK7j23qt3yc2Ef # SFGSLEF0DMCSVoK8HEdK0onHuoVA+z6z8Ze7NQsG5JRCACT/U4HHFvuYK4MoW8pf # 89HRVlyt0p2CtrFA2N5a1ZgbVJEhqZ+ztVPQDgLku7Wsr1gilHqp3MXYPFagnGBY # VASUPiiXj3e/0peAkcic4MNN0mhMCpbxWGjkdDiWxZUstI5sVuR3/2YvNvoQzWQU # M4bAMvtKyVUf9cy8mf4Xo4+SJVCbKQeMxcFeY5H3aS8gUCOsWpp2z09tgFhb21Op # t67FtDPPogTAidK+T4sINKUQDzxeWs9o9D4tgr5r/uCEMf141PepkZ6Y0SKf9/yC # XAV5 # SIG # End signature block
combined_dataset/train/non-malicious/sample_66_72.ps1
sample_66_72.ps1
# # Module manifest for module 'OCI.PSModules.Osmanagementhub' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osmanagementhub.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '114fe920-9645-46a9-9e65-26c95a3d3613' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osmanagementhub Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagementhub.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIOsmanagementhubPackagesToSoftwareSource', 'Disable-OCIOsmanagementhubModuleStreamOnManagedInstance', 'Disable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup', 'DisMount-OCIOsmanagementhubManagedInstancesFromLifecycleStage', 'DisMount-OCIOsmanagementhubManagedInstancesFromManagedInstanceGroup', 'DisMount-OCIOsmanagementhubProfileFromManagedInstance', 'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstance', 'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstanceGroup', 'Enable-OCIOsmanagementhubModuleStreamOnManagedInstance', 'Enable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup', 'Get-OCIOsmanagementhubAllSoftwarePackagesList', 'Get-OCIOsmanagementhubEntitlementsList', 'Get-OCIOsmanagementhubErrataList', 'Get-OCIOsmanagementhubErratum', 'Get-OCIOsmanagementhubEvent', 'Get-OCIOsmanagementhubEventContent', 'Get-OCIOsmanagementhubEventsList', 'Get-OCIOsmanagementhubLifecycleEnvironment', 'Get-OCIOsmanagementhubLifecycleEnvironmentsList', 'Get-OCIOsmanagementhubLifecycleStage', 'Get-OCIOsmanagementhubLifecycleStageInstalledPackagesList', 'Get-OCIOsmanagementhubLifecycleStagesList', 'Get-OCIOsmanagementhubManagedInstance', 'Get-OCIOsmanagementhubManagedInstanceAnalyticContent', 'Get-OCIOsmanagementhubManagedInstanceAvailablePackagesList', 'Get-OCIOsmanagementhubManagedInstanceAvailableSoftwareSourcesList', 'Get-OCIOsmanagementhubManagedInstanceAvailableWindowsUpdatesList', 'Get-OCIOsmanagementhubManagedInstanceContent', 'Get-OCIOsmanagementhubManagedInstanceErrataList', 'Get-OCIOsmanagementhubManagedInstanceGroup', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailableModulesList', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailablePackagesList', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailableSoftwareSourcesList', 'Get-OCIOsmanagementhubManagedInstanceGroupInstalledPackagesList', 'Get-OCIOsmanagementhubManagedInstanceGroupModulesList', 'Get-OCIOsmanagementhubManagedInstanceGroupsList', 'Get-OCIOsmanagementhubManagedInstanceInstalledPackagesList', 'Get-OCIOsmanagementhubManagedInstanceInstalledWindowsUpdatesList', 'Get-OCIOsmanagementhubManagedInstanceModulesList', 'Get-OCIOsmanagementhubManagedInstancesList', 'Get-OCIOsmanagementhubManagedInstanceUpdatablePackagesList', 'Get-OCIOsmanagementhubManagementStation', 'Get-OCIOsmanagementhubManagementStationsList', 'Get-OCIOsmanagementhubMirrorsList', 'Get-OCIOsmanagementhubModuleStream', 'Get-OCIOsmanagementhubModuleStreamProfile', 'Get-OCIOsmanagementhubModuleStreamProfilesList', 'Get-OCIOsmanagementhubModuleStreamsList', 'Get-OCIOsmanagementhubPackageGroup', 'Get-OCIOsmanagementhubPackageGroupsList', 'Get-OCIOsmanagementhubProfile', 'Get-OCIOsmanagementhubProfilesList', 'Get-OCIOsmanagementhubScheduledJob', 'Get-OCIOsmanagementhubScheduledJobsList', 'Get-OCIOsmanagementhubSoftwarePackage', 'Get-OCIOsmanagementhubSoftwarePackageByName', 'Get-OCIOsmanagementhubSoftwarePackagesList', 'Get-OCIOsmanagementhubSoftwarePackageSoftwareSourcesList', 'Get-OCIOsmanagementhubSoftwareSource', 'Get-OCIOsmanagementhubSoftwareSourcesList', 'Get-OCIOsmanagementhubSoftwareSourceVendorsList', 'Get-OCIOsmanagementhubWindowsUpdate', 'Get-OCIOsmanagementhubWindowsUpdatesList', 'Get-OCIOsmanagementhubWorkRequest', 'Get-OCIOsmanagementhubWorkRequestErrorsList', 'Get-OCIOsmanagementhubWorkRequestLogsList', 'Get-OCIOsmanagementhubWorkRequestsList', 'Import-OCIOsmanagementhubEventContent', 'Invoke-OCIOsmanagementhubInstallAllWindowsUpdatesOnManagedInstancesInCompartment', 'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstance', 'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstance', 'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstance', 'Invoke-OCIOsmanagementhubInstallWindowsUpdatesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstance', 'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubPromoteSoftwareSourceToLifecycleStage', 'Invoke-OCIOsmanagementhubRefreshManagementStationConfig', 'Invoke-OCIOsmanagementhubRefreshSoftwareOnManagedInstance', 'Invoke-OCIOsmanagementhubRunScheduledJobNow', 'Invoke-OCIOsmanagementhubSearchSoftwareSourceModules', 'Invoke-OCIOsmanagementhubSearchSoftwareSourceModuleStreams', 'Invoke-OCIOsmanagementhubSearchSoftwareSourcePackageGroups', 'Invoke-OCIOsmanagementhubSummarizeManagedInstanceAnalytics', 'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstance', 'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubSynchronizeMirrors', 'Invoke-OCIOsmanagementhubSynchronizeSingleMirrors', 'Mount-OCIOsmanagementhubManagedInstancesToLifecycleStage', 'Mount-OCIOsmanagementhubManagedInstancesToManagedInstanceGroup', 'Mount-OCIOsmanagementhubProfileToManagedInstance', 'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstance', 'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstanceGroup', 'Move-OCIOsmanagementhubAvailabilityOfSoftwareSources', 'Move-OCIOsmanagementhubEventCompartment', 'Move-OCIOsmanagementhubLifecycleEnvironmentCompartment', 'Move-OCIOsmanagementhubManagedInstanceGroupCompartment', 'Move-OCIOsmanagementhubManagementStationCompartment', 'Move-OCIOsmanagementhubProfileCompartment', 'Move-OCIOsmanagementhubScheduledJobCompartment', 'Move-OCIOsmanagementhubSoftwareSourceCompartment', 'New-OCIOsmanagementhubEntitlement', 'New-OCIOsmanagementhubLifecycleEnvironment', 'New-OCIOsmanagementhubManagedInstanceGroup', 'New-OCIOsmanagementhubManagementStation', 'New-OCIOsmanagementhubProfile', 'New-OCIOsmanagementhubScheduledJob', 'New-OCIOsmanagementhubSoftwareSource', 'Remove-OCIOsmanagementhubEvent', 'Remove-OCIOsmanagementhubEventContent', 'Remove-OCIOsmanagementhubLifecycleEnvironment', 'Remove-OCIOsmanagementhubManagedInstance', 'Remove-OCIOsmanagementhubManagedInstanceGroup', 'Remove-OCIOsmanagementhubManagementStation', 'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstance', 'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstanceGroup', 'Remove-OCIOsmanagementhubPackagesFromManagedInstance', 'Remove-OCIOsmanagementhubPackagesFromManagedInstanceGroup', 'Remove-OCIOsmanagementhubProfile', 'Remove-OCIOsmanagementhubScheduledJob', 'Remove-OCIOsmanagementhubSoftwareSource', 'Update-OCIOsmanagementhubAllPackagesOnManagedInstanceGroup', 'Update-OCIOsmanagementhubAllPackagesOnManagedInstancesInCompartment', 'Update-OCIOsmanagementhubEvent', 'Update-OCIOsmanagementhubLifecycleEnvironment', 'Update-OCIOsmanagementhubManagedInstance', 'Update-OCIOsmanagementhubManagedInstanceGroup', 'Update-OCIOsmanagementhubManagementStation', 'Update-OCIOsmanagementhubPackagesOnManagedInstance', 'Update-OCIOsmanagementhubProfile', 'Update-OCIOsmanagementhubScheduledJob', 'Update-OCIOsmanagementhubSoftwareSource' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagementhub' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1214.ps1
1214.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) $sourceRoot = $null; $destinationRoot = $null function Assert-Copy { param( $SourceRoot, $DestinationRoot, [Switch] $Recurse ) Get-ChildItem -Path $SourceRoot | ForEach-Object { $destinationPath = Join-Path -Path $DestinationRoot -ChildPath $_.Name if( $_.PSIsContainer ) { if( $Recurse ) { Test-Path -PathType Container -Path $destinationPath | Should -BeTrue Assert-Copy -SourceRoot $_.FullName -DestinationRoot $destinationPath -Recurse } else { $destinationPath | Should -Not -Exist } return } else { Test-Path -Path $destinationPath -PathType Leaf | Should -BeTrue -Because ($_.FullName) } $sourceHash = Get-FileHash -Path $_.FullName | Select-Object -ExpandProperty 'Hash' $destinationHashPath = '{0}.checksum' -f $destinationPath Test-Path -Path $destinationHashPath -PathType Leaf | Should -BeTrue $destinationHash = [IO.File]::ReadAllText($destinationHashPath) $destinationHash | Should -Be $sourceHash } } Describe 'Copy-DscResource' { BeforeEach { $Global:Error.Clear() $script:destinationRoot = Join-Path -Path $TestDrive.FullName -ChildPath ('D.{0}' -f [IO.Path]::GetRandomFileName()) New-Item -Path $destinationRoot -ItemType 'Directory' $script:sourceRoot = Join-Path -Path $TestDrive.FullName -ChildPath ('S.{0}' -f [IO.Path]::GetRandomFileName()) New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir1\Dir3\zip.zip') -Force New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir1\zip.zip') New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'Dir2') -ItemType 'Directory' New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'zip.zip') New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'mov.mof') New-Item -Path (Join-Path -Path $sourceRoot -ChildPath 'msi.msi') } It 'should copy files' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot $result | Should -BeNullOrEmpty Assert-Copy $sourceRoot $destinationRoot } It 'should pass thru copied files' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse $result | Should -Not -BeNullOrEmpty Assert-Copy $sourceRoot $destinationRoot -Recurse $result.Count | Should -Be 10 foreach( $item in $result ) { $item.FullName | Should -BeLike ('{0}*' -f $destinationRoot) } } It 'should only copy changed files' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -Not -BeNullOrEmpty $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -BeNullOrEmpty [IO.File]::WriteAllText((Join-path -Path $sourceRoot -ChildPath 'mov.mof'), ([Guid]::NewGuid().ToString())) $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -Not -BeNullOrEmpty $result.Count | Should -Be 2 $result[0].Name | Should -Be 'mov.mof' $result[1].Name | Should -Be 'mov.mof.checksum' } It 'should always regenerate checksums' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -Not -BeNullOrEmpty [IO.File]::WriteAllText((Join-Path -Path $sourceRoot -ChildPath 'zip.zip.checksum'), 'E4F0D22EE1A26200BA320E18023A56B36FF29AA1D64913C60B46CE7D71E940C6') try { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -BeNullOrEmpty [IO.File]::WriteAllText((Join-Path -Path $sourceRoot -ChildPath 'zip.zip'), ([Guid]::NewGuid().ToString())) $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru $result | Should -Not -BeNullOrEmpty $result[0].Name | Should -Be 'zip.zip' $result[1].Name | Should -Be 'zip.zip.checksum' } finally { Get-ChildItem -Path $sourceRoot -Filter '*.checksum' | Remove-Item Clear-Content -Path (Join-Path -Path $sourceRoot -ChildPath 'zip.zip') } } It 'should copy recursively' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -Recurse $result | Should -BeNullOrEmpty Assert-Copy -SourceRoot $sourceRoot -Destination $destinationRoot -Recurse } It 'should force copy' { $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse $result | Should -Not -BeNullOrEmpty Assert-Copy $sourceRoot $destinationRoot -Recurse $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Recurse $result | Should -BeNullOrEmpty $result = Copy-DscResource -Path $sourceRoot -Destination $destinationRoot -PassThru -Force -Recurse $result | Should -Not -BeNullOrEmpty Assert-Copy $sourceRoot $destinationRoot -Recurse } }
combined_dataset/train/non-malicious/sample_0_60.ps1
sample_0_60.ps1
#************************************************ # DC_HyperVBasicInfo.ps1 # Version 1.0 # Date: 4-7-2015 # Author: Ryutaro Hayashi <Ryutaro.Hayashi@microsoft.com> # Ported to SDP and included in HyperV SDP by Tim Springston <tspring@microsoft.com> # Description: Data collection for hyperv. #************************************************ #Output file info $FileDescription = "Text File containing Hyper-V basic settings and configuration information." $SectionDescription = "Hyper-V Basic Information" $Outputfile = Join-Path $Pwd.Path (($env:COMPUTERNAME) + "_Hyper-VBasicInfo.txt") Get-Date | Out-File $Outputfile -encoding UTF8 Filter Import-CimXml { # Create new XML object from input $CimXml = [Xml]$_ $CimObj = New-Object -TypeName System.Object # Iterate over the data and pull out just the value name and data for each entry ForEach ($CimProperty in $CimXml.SelectNodes("/INSTANCE/PROPERTY[@NAME='Name']")) { $CimObj | Add-Member -MemberType NoteProperty -Name $CimProperty.NAME -Value $CimProperty.VALUE } ForEach ($CimProperty in $CimXml.SelectNodes("/INSTANCE/PROPERTY[@NAME='Data']")) { $CimObj | Add-Member -MemberType NoteProperty -Name $CimProperty.NAME -Value $CimProperty.VALUE } # Display output $CimObj } Function showHVGlobalSettings { $VSMgtServiceSettingData = $args[0] ("Hyper-V Global Settings") | Out-File $Outputfile -Append -encoding UTF8 ("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ("Hyper-V Settings:") | Out-File $Outputfile -Append -encoding UTF8 (" Virtual Hard Disks: " + $VSMgtServiceSettingData.DefaultVirtualHardDiskPath) | Out-File $Outputfile -Append -encoding UTF8 (" Virtual Machines: " + $VSMgtServiceSettingData.DefaultExternalDataRoot) | Out-File $Outputfile -Append -encoding UTF8 (" Physical GPUs: ") | Out-File $Outputfile -Append -encoding UTF8 (" NUMA Spanning: " + $VSMgtServiceSettingData.NumaSpanningEnabled) | Out-File $Outputfile -Append -encoding UTF8 ### Live migrations $VSMigrationService = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemMigrationService' $VSMigServiceSettingData = $VSMigrationService.GetRelated('Msvm_VirtualSystemMigrationServiceSettingData') (" Live Migrations:") | Out-File $Outputfile -Append -encoding UTF8 (" Enable incoming and outgoing live migrations: " + $VSMigServiceSettingData.EnableVirtualSystemMigration) | Out-File $Outputfile -Append -encoding UTF8 switch ($VSMigServiceSettingData.AuthenticationType) { 0 {$AuthTypeStr = "CredSSP(0)"} 1 {$AuthTypeStr = "Kerberos(1)"} } (" Authentication protocol: " + $AuthTypeStr) | Out-File $Outputfile -Append -encoding UTF8 (" Simultaneous live migrations: " + $VSMigServiceSettingData.MaximumActiveVirtualSystemMigration) | Out-File $Outputfile -Append -encoding UTF8 (" Incoming live migrations: ") | Out-File $Outputfile -Append -encoding UTF8 $MigNetworksSettings = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemMigrationNetworkSettingData' $NetworksSet = 0 ForEach($MigNetworksSetting in $MigNetworksSettings) { For($i=0; $i -lt $MigNetworksSetting.Tags.Count; $i++) { If($MigNetworksSetting.Tags[$i] -eq "Microsoft:UserManagedAllNetworks") { $NetworksSet++ } } } If($NetworksSet -gt 0) { $NetworkOptionStr = "Use any available network for live migration" } Else { $NetworkOptionStr = "Use these IP addresses for live migration" $IPList = $VSMigrationService.MigrationServiceListenerIPAddressList For($y=0; $y -lt $IPLIst.count; $y++) { $IPListStr = $IPListStr + " " + $IPList[$y] } } (" Option: " + $NetworkOptionStr) | Out-File $Outputfile -Append -encoding UTF8 If($NetworksSet -eq 0) { (" Network List: " + $IPListStr) | Out-File $Outputfile -Append -encoding UTF8 } #### Storage Migrations (" Storage Migrations:") | Out-File $Outputfile -Append -encoding UTF8 (" Simultaneous storage migrations: " + $VSMigServiceSettingData.MaximumActiveStorageMigration) | Out-File $Outputfile -Append -encoding UTF8 ### Replication Configuration (" Replication Configuration:") | Out-File $Outputfile -Append -encoding UTF8 $HVRServiceSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ReplicationServiceSettingData' If ($HVRServiceSettingData.RecoveryServerEnabled) { switch ($HVRServiceSettingData.AllowedAuthenticationType) { 0 {$AllowedAuthenticationType = "Not defined"} 1 {$AllowedAuthenticationType = "Use kerberos (HTTP)"} 2 {$AllowedAuthenticationType = "Use certificate-based Authentication"} 3 {$AllowedAuthenticationType = "Both certificate based authentication and integrated authentication"} } (" Authentication and ports:") | Out-File $Outputfile -Append -encoding UTF8 (" Authentication Type: " + $AllowedAuthenticationType) | Out-File $Outputfile -Append -encoding UTF8 (" HttpPort(Kerberos) : " + $HVRServiceSettingData.HttpPort) | Out-File $Outputfile -Append -encoding UTF8 (" HttpsPort(Certificate): " + $HVRServiceSettingData.HttpsPort) | Out-File $Outputfile -Append -encoding UTF8 $HVRAuthSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ReplicationAuthorizationSettingData' $AuthEntryCount = ($HVRAuthSettingData | Measure-Object).count (" Authentication and Storage:") | Out-File $Outputfile -Append -encoding UTF8 If($AuthEntryCount -eq 1 -and $HVRAuthSettingData.AllowedPrimaryHostSystem -eq "*") { $AuthServerStr = "Type: Allow replication from any authenticated server" (" " + $AuthServerStr) | Out-File $Outputfile -Append -encoding UTF8 (" Storage location: " + $HVRAuthSettingData.ReplicaStorageLocation) | Out-File $Outputfile -Append -encoding UTF8 } Else { $AuthServerStr = "Type: Allow replication from specifed servers" (" " + $AuthServerStr) | Out-File $Outputfile -Append -encoding UTF8 ForEach($HVRAuthSetting in $HVRAuthSettingData) { (" Primary server: " + $HVRAuthSetting.AllowedPrimaryHostSystem + " | Storage location: " + $HVRAuthSetting.ReplicaStorageLocation + " | TrustGroup: " + $HVRAuthSetting.TrustGroup) | Out-File $Outputfile -Append -encoding UTF8 } } } Else { (" Hyper-V Replica is not configured as replica server.") | Out-File $Outputfile -Append -encoding UTF8 } ### Enhanced Session Mode Policy (WS2012R2 or later) If($VSMgtServiceSettingData.EnhancedSessionModeEnabled -eq $null) { $EnhancedSessionMode = "N/A (Enhanced session mode is supported from Windows Server 2012 R2)" } Else { $EnhancedSessionMode = $VSMgtServiceSettingData.EnhancedSessionModeEnabled } (" Enhanced session mode policy: " + $EnhancedSessionMode) | Out-File $Outputfile -Append -encoding UTF8 ### Memory reserve $memReserveRegKey = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization\" $memReserveReg = Get-ItemProperty $memReserveRegKey $memoryReserve = $memReserveReg."MemoryReserve" If($memoryReserve -ne $null) { (" Memory Reserve: " + $memoryReserve + " MB(WARNING: Memory reserve is set)") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showNUMAinfo() { ("NUMA Information") | Out-File $Outputfile -Append -encoding UTF8 ("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8 $hostName = hostname $hostComputer = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ComputerSystem' | Where-Object { $_.ElementName -eq $hostname} $numaNodes = $hostComputer.GetRelated("Msvm_NumaNode") Foreach($numaNode in $numaNodes) { ("") | Out-File $Outputfile -Append -encoding UTF8 ($numaNode.ElementName + ":") | Out-File $Outputfile -Append -encoding UTF8 (" EnabledState : " + $numaNode.EnabledState) | Out-File $Outputfile -Append -encoding UTF8 (" HealthState : " + $numaNode.HealthState) | Out-File $Outputfile -Append -encoding UTF8 (" NumberOfLogicalProcessors : " + $numaNode.NumberOfLogicalProcessors) | Out-File $Outputfile -Append -encoding UTF8 (" NumberOfProcessorCores : " + $numaNode.NumberOfProcessorCores) | Out-File $Outputfile -Append -encoding UTF8 (" CurrentlyConsumableMemoryBlocks: " + $numaNode.CurrentlyConsumableMemoryBlocks) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 $Memory = $numaNode.GetRelated("Msvm_Memory") | Where-Object { $_.SystemName -eq $hostName} $MemSizeGB = ($Memory.ConsumableBlocks * $Memory.BlockSize / 1024 / 1024 / 1024) $MemSizeGB2 = [math]::round($MemSizeGB, 2) $MemSizeMB = ($Memory.ConsumableBlocks * $Memory.BlockSize / 1024 / 1024) (" ==== " + $Memory.ElementName + " ====") | Out-File $Outputfile -Append -encoding UTF8 (" BlockSize : " + $Memory.BlockSize) | Out-File $Outputfile -Append -encoding UTF8 (" ConsumableBlocks : " + $Memory.ConsumableBlocks) | Out-File $Outputfile -Append -encoding UTF8 (" Size : " + $MemSizeMB + "MB / " + $MemSizeGB2 + "GB") | Out-File $Outputfile -Append -encoding UTF8 (" EnabledState : " + $Memory.EnabledState) | Out-File $Outputfile -Append -encoding UTF8 (" HealthState : " + $Memory.HealthState) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } } Function showVMBasicinfo() { $VM = $args[0] $VSSettingData = $args[1] ("Basic information:") | Out-File $Outputfile -Append -encoding UTF8 (" GUID: " + $VM.Name) | Out-File $Outputfile -Append -encoding UTF8 If($VM.ProcessID -eq $null) { $procId = "N/A => Virtual Machine is not running." } Else { $procId = $VM.ProcessID } (" PID: " + $procId) | Out-File $Outputfile -Append -encoding UTF8 ### VM Version (" Version: " + $VSSettingData.Version) | Out-File $Outputfile -Append -encoding UTF8 ### VM Generation $vmGgeneration = getVmGeneration $VSSettingData (" Generation: " + $vmGgeneration) | Out-File $Outputfile -Append -encoding UTF8 ### Enabled state $vmStatus = getVMEnabledState $VM.EnabledState (" State: " + $vmStatus) | Out-File $Outputfile -Append -encoding UTF8 ### Heartbeat $heartbeatComponent = Get-CimInstance -namespace 'root\virtualization\v2' -query "associators of {$VM} where ResultClass = Msvm_HeartbeatComponent" If($heartbeatComponent -eq $null) { $heartbeartStr = "N/A(Virtual Machine is not running)" } ElseIf($heartbeatComponent.EnabledState -eq 3) { $heartbeartStr = "N/A(Heartbeat service is not enabled)" } Else { $hbStatusStr1 = getHBOperationalStatus $heartbeatComponent.OperationalStatus[0] $hbStatusStr2 = getHBSecondaryStatus $heartbeatComponent.OperationalStatus[1] $heartbeartStr = $hbStatusStr1 + "(Application state - " + $hbStatusStr2 + ")" } (" Heartbeat: " + $heartbeartStr) | Out-File $Outputfile -Append -encoding UTF8 ### Health state switch ($VM.HealthState) { # https://msdn.microsoft.com/en-us/library/hh850116(v=vs.85).aspx 5 {$healthState = "OK" + "(" + $VM.HealthState + ")"} 20 {$healthState = "Major Failure" + "(" + $VM.HealthState + ")"} 25 {$healthState = "Critical failure)" + "(" + $VM.HealthState + ")"} } (" Health state: " + $healthState) | Out-File $Outputfile -Append -encoding UTF8 ### Uptime $uptimeSeconds = $VM.OnTimeInMilliseconds / 1000 $uptimeMinutes = $uptimeSeconds / 60 $seconds = [math]::Truncate($uptimeSeconds % 60) $minutes = [math]::Truncate($uptimeMinutes % 60) $hours = [math]::Truncate($uptimeSeconds / 3600) (" Uptime: " + $hours + ":" + $minutes + ":" + $seconds) | Out-File $Outputfile -Append -encoding UTF8 ### IC version If($VM.EnabledState -eq 2) { $KvpExchangeComponent = $VM.GetRelated("Msvm_KvpExchangeComponent") If($KvpExchangeComponent.count -eq 0) { $versionString = "Unable to retrieve IC version. VM would not be started." } ElseIf($KvpExchangeComponent.GuestIntrinsicExchangeItems -ne $null) { $IntrinsicItems = $KvpExchangeComponent.GuestIntrinsicExchangeItems | Import-CimXml $icVersionItem = $IntrinsicItems | Where {$_.Name -eq "IntegrationServicesVersion"} If($icVersionItem.Data -ne $null) { $versionString = $icVersionItem.Data $icVersionExist = $True } Else { $versionString = "Unable to retrieve IC version. Key exchange service would not be running in guest." } } Else { $versionString = "Unable to retrieve IC version. Key exchange service would not be running in guest." } } Else { $versionString = "N/A(VM is not running)" } $icRegistryKey = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization\GuestInstaller\Version\" $icReg = Get-ItemProperty $icRegistryKey -EA SilentlyContinue if ($icReg) { $hostICVersion = $icReg."Microsoft-Hyper-V-Guest-Installer-Win6x-Package" } If($hostICVersion -eq $icVersionItem.Data) { (" Integration Service Version: " + $versionString + " => IC version is same with host version.") | Out-File $Outputfile -Append -encoding UTF8 } ElseIf($icVersionExist) { (" Integration Service Version: " + $versionString + " => WARNING: IC version is not same with host version(" + $hostICVersion + ").") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Integration Service Version: " + $versionString) | Out-File $Outputfile -Append -encoding UTF8 } If($VM.EnhancedSessionModeState -ne $null) { switch ($VM.EnhancedSessionModeState) { 2 {$EnhancedSessionModeState = "Enhanced mode is allowed and available on the virtual machine(2)"} 3 {$EnhancedSessionModeState = "Enhanced mode is not allowed on the virtual machine(3)"} 6 {$EnhancedSessionModeState = "Enhanced mode is allowed and but not currently available on the virtual machine(6)"} default {$EnhancedSessionModeState = "Unknown"} } (" EnhancedSession Mode: " + $EnhancedSessionModeState) | Out-File $Outputfile -Append -encoding UTF8 } (" Number of NUMA nodes: " + $VM.NumberOfNumaNodes) | Out-File $Outputfile -Append -encoding UTF8 ### Configuration file $configPath = $VSSettingData.ConfigurationDataRoot + "\" + $VSSettingData.ConfigurationFile (" Configuration File: " + $configPath) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showKVPItems() { $VM = $args[0] $VSSettingData = $args[1] $KvpExchangeComponent = $VM.GetRelated("Msvm_KvpExchangeComponent") $KvpExchangeComponentSettingData = $VSSettingData.GetRelated("Msvm_KvpExchangeComponentSettingData") ("KVP Items:") | Out-File $Outputfile -Append -encoding UTF8 (" Guest intrinsic items:") | Out-File $Outputfile -Append -encoding UTF8 If($KvpExchangeComponent.count -eq 0) { (" Unable to retrieve guest items. VM would not be started.") | Out-File $Outputfile -Append -encoding UTF8 } ElseIf($KvpExchangeComponent.GuestIntrinsicExchangeItems -ne $null) { $IntrinsicItems = $KvpExchangeComponent.GuestIntrinsicExchangeItems | Import-CimXml ForEach($IntrinsicItem in $IntrinsicItems) { (" " + $IntrinsicItem.Name + ": " + $IntrinsicItem.Data) | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Unable to retrieve guest items. Key exchange service would not be running in guest.") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 (" Host only items:") | Out-File $Outputfile -Append -encoding UTF8 If($KvpExchangeComponentSettingData.HostOnlyItem -eq $null) { (" No host only items.") | Out-File $Outputfile -Append -encoding UTF8 } Else { $HostItems = $KvpExchangeComponentSettingData.HostOnlyItems | Import-CimXml If($HostItems.count -eq 0) { (" No host only items are registerd.") | Out-File $Outputfile -Append -encoding UTF8 } Else { ForEach($HostItem in $HostItems) { (" " + $HostItem.Name + ": " + $HostItem.Data) | Out-File $Outputfile -Append -encoding UTF8 } } } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showBIOSinfo { $VSSettingData = $args[0] ("BIOS:") | Out-File $Outputfile -Append -encoding UTF8 (" Num Lock: " + $VSSettingData.BIOSNumLock) | Out-File $Outputfile -Append -encoding UTF8 For($i=0; $i -lt $VSSettingData.BootOrder.length; $i++) { switch ($VSSettingData.BootOrder[$i]) { 0 {$deviceStr = "Floppy"} 1 {$deviceStr = "CD-ROM"} 2 {$deviceStr = "Hard Drive"} 3 {$deviceStr = "PXE Boot"} } $BootOrderStr = $BootOrderStr + $deviceStr If($i -lt ($VSSettingData.BootOrder.length-1)) { $BootOrderStr = $BootOrderStr + " -> " } } (" Startup order: " + $BootOrderStr) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showMeminfo { $VSSettingData = $args[0] $MemSettingData = $VSSettingData.GetRelated('Msvm_MemorySettingData') ("Memory:") | Out-File $Outputfile -Append -encoding UTF8 (" Startup RAM: " + $MemSettingData.VirtualQuantity + "MB") | Out-File $Outputfile -Append -encoding UTF8 (" Enable Dynamic Memory: " + $MemSettingData.DynamicMemoryEnabled) | Out-File $Outputfile -Append -encoding UTF8 If($MemSettingData.DynamicMemoryEnabled) { (" Minimum RAM: " + $MemSettingData.Reservation + "MB") | Out-File $Outputfile -Append -encoding UTF8 (" Maximum RAM: " + $MemSettingData.Limit + "MB") | Out-File $Outputfile -Append -encoding UTF8 (" Memory Buffer: " + $MemSettingData.TargetMemoryBuffer) | Out-File $Outputfile -Append -encoding UTF8 } (" Memory Weight: " + $MemSettingData.Weight) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showCPUinfo { $VSSettingData = $args[0] $ProcSettingData = $VSSettingData.GetRelated('Msvm_ProcessorSettingData') ("Processor:") | Out-File $Outputfile -Append -encoding UTF8 (" Number of Virtual Processors: " + $ProcSettingData.VirtualQuantity) | Out-File $Outputfile -Append -encoding UTF8 (" Resource control: ") | Out-File $Outputfile -Append -encoding UTF8 (" Virtual machine reserve: " + $ProcSettingData.Reservation / 1000) | Out-File $Outputfile -Append -encoding UTF8 (" Virtual machine limit : " + $ProcSettingData.Limit / 1000) | Out-File $Outputfile -Append -encoding UTF8 (" Relative weight : " + $ProcSettingData.Weight) | Out-File $Outputfile -Append -encoding UTF8 (" Compatibility: ") | Out-File $Outputfile -Append -encoding UTF8 (" Migrate to physical computer with a differnet processor version: " + $ProcSettingData.LimitProcessorFeatures) | Out-File $Outputfile -Append -encoding UTF8 (" NUMA: ") | Out-File $Outputfile -Append -encoding UTF8 (" Maximum number of virtual processors : " + $ProcSettingData.MaxProcessorsPerNumaNode) | Out-File $Outputfile -Append -encoding UTF8 $MemSettingData = $VSSettingData.GetRelated('Msvm_MemorySettingData') (" MaxMemoryBlocksPerNumaNode : " + $MemSettingData.MaxMemoryBlocksPerNumaNode + " MB") | Out-File $Outputfile -Append -encoding UTF8 (" Maximum NUMA nodes allowed on a socket: " + $ProcSettingData.MaxNumaNodesPerSocket) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showIDEHardDriveinfo { $VM = $args[0] ("IDE Controller :") | Out-File $Outputfile -Append -encoding UTF8 $hardDrives = Get-VMHardDiskDrive -VMName $VM.ElementName | Where-Object {$_.ControllerType -eq "IDE" } If($hardDrives.count -eq 0) { (" No IDE drive attached.") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 return } ForEach($hardDrive in $hardDrives) { If($hardDrive.ControllerType -eq "IDE") { (" Virtual Hard Disks: ") | Out-File $Outputfile -Append -encoding UTF8 If( $hardDrive.Path -eq $null) { (" WARNING: Disk path is null. Probably the disk is removed or deleted.") | Out-File $Outputfile -Append -encoding UTF8 continue } Else { (" - " + $hardDrive.Path) | Out-File $Outputfile -Append -encoding UTF8 (" Location: " + $hardDrive.Name) | Out-File $Outputfile -Append -encoding UTF8 } If(!(Test-Path $hardDrive.Path)) { (" WARNING: the file does not exist.") | Out-File $Outputfile -Append -encoding UTF8 continue } $vhdInfo = Get-VHD -Path $hardDrive.Path $property = Get-ChildItem $hardDrive.Path $fileSize = [math]::round($property.Length / 1GB , 3) $maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3) $ACL = Get-ACL $hardDrive.Path (" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8 (" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8 (" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8 (" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8 (" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8 (" ACL: ") | Out-File $Outputfile -Append -encoding UTF8 $AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount]) ForEach($AccessRule in $AccessRules) { (" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8 } (" ID: " + $hardDrive.ID) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ### Advanced Features(Windows Server 2012 R2 or later) (" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8 $StorageAllocationSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_StorageAllocationSettingData' | Where-Object { $_.HostResource -eq $hardDrive.Path} If($StorageAllocationSettingData.IOPSLimit -eq $null) { $isStorageQoSEnabled = $false $StorageQoSStr = "This feature is supported from Windows Server 2012 R2." } ElseIf($StorageAllocationSettingData.IOPSLimit -eq 0) { $isStorageQoSEnabled = $false $StorageQoSStr = "Disabled" } Else { $isStorageQoSEnabled = $true $StorageQoSStr = "Enabled" } (" Enable Quality of Service management: " + $StorageQoSStr) | Out-File $Outputfile -Append -encoding UTF8 If($isStorageQoSEnabled) { (" Minimum: " + $StorageAllocationSettingData.IOPSReservation) | Out-File $Outputfile -Append -encoding UTF8 (" Maximum: " + $StorageAllocationSettingData.IOPSLimit) | Out-File $Outputfile -Append -encoding UTF8 } } ("") | Out-File $Outputfile -Append -encoding UTF8 } } Function showSCSIHardDriveinfo { $VM = $args[0] ("SCSI Controller :") | Out-File $Outputfile -Append -encoding UTF8 $hardDrives = Get-VMHardDiskDrive -VMName $VM.ElementName | Where-Object {$_.ControllerType -eq "SCSI" } If($hardDrives.count -eq 0) { (" No SCSI drive attached.") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 return } ForEach($hardDrive in $hardDrives) { If($hardDrive.ControllerType -eq "SCSI") { (" Virtual Hard Disks: ") | Out-File $Outputfile -Append -encoding UTF8 If( $hardDrive.Path -eq $null) { (" WARNING: Disk path is null. Probably the disk is detached or deleted.") | Out-File $Outputfile -Append -encoding UTF8 continue } Else { (" - " + $hardDrive.Path) | Out-File $Outputfile -Append -encoding UTF8 (" Location: " + $hardDrive.Name) | Out-File $Outputfile -Append -encoding UTF8 } If(!(Test-Path $hardDrive.Path)) { (" WARNING: above file does not exist.") | Out-File $Outputfile -Append -encoding UTF8 continue } $vhdInfo = Get-VHD -Path $hardDrive.Path $property = Get-ChildItem $hardDrive.Path $fileSize = [math]::round($property.Length / 1GB , 3) $maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3) $ACL = Get-ACL $hardDrive.Path (" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8 (" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8 (" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8 (" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8 (" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8 (" ACL: ") | Out-File $Outputfile -Append -encoding UTF8 $AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount]) ForEach($AccessRule in $AccessRules) { (" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8 } (" ID: " + $hardDrive.ID) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ### Advanced Features(Windows Server 2012 R2 or later) (" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8 $StorageAllocationSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_StorageAllocationSettingData' | Where-Object { $_.HostResource -eq $hardDrive.Path} # Storage Qos If($StorageAllocationSettingData.IOPSLimit -eq $null) { $isStorageQoSEnabled = $false $StorageQoSStr = "This feature is supported from Windows Server 2012 R2." } ElseIf($StorageAllocationSettingData.IOPSLimit -eq 0) { $isStorageQoSEnabled = $false $StorageQoSStr = "Disabled" } Else { $isStorageQoSEnabled = $true $StorageQoSStr = "Enabled" } (" Enable Quality of Service management: " + $StorageQoSStr) | Out-File $Outputfile -Append -encoding UTF8 If($isStorageQoSEnabled) { (" Minimum: " + $StorageAllocationSettingData.IOPSReservation) | Out-File $Outputfile -Append -encoding UTF8 (" Maximum: " + $StorageAllocationSettingData.IOPSLimit) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } # Shared disk support If($StorageAllocationSettingData.PersistentReservationsSupported -eq $null) { $sharedDiskStr = "This feature is supported from Windows Server 2012 R2." } ElseIf($StorageAllocationSettingData.PersistentReservationsSupported) { $sharedDiskStr = "Enabled" } Else { $sharedDiskStr = "Disabled" } (" Enable virtual hard disk sharing: " + $sharedDiskStr) | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showNetworkAdapterinfo { $VSSettingData = $args[0] $EthernetPortAllocationSettings = $VSSettingData.GetRelated('Msvm_EthernetPortAllocationSettingData') ForEach($EthernetPortAllocationSetting in $EthernetPortAllocationSettings) { ### Get GUID for vSwitch $VirtualEthernetSwitch = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualEthernetSwitch' | Where-Object { $_.__PATH -eq $EthernetPortAllocationSetting.HostResource} ("Network Adapter :") | Out-File $Outputfile -Append -encoding UTF8 If ($VirtualEthernetSwitch -ne $null) { $switchName = $VirtualEthernetSwitch.ElementName } Else { $switchName = "Not Connected" } (" Virtual Switch: " + $switchName) | Out-File $Outputfile -Append -encoding UTF8 ### VLAN Info $EthernetSwitchPortVlanSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortVlanSettingData') If($EthernetSwitchPortVlanSettingData -ne $NULL) { switch ($EthernetSwitchPortVlanSettingData.OperationMode) { 0 {$VlanMode = "None(0)"} 1 {$VlanMode = "Access(1)"} 2 {$VlanMode = "Trunk(2)"} 3 {$VlanMode = "Private(3)"} default {$VlanMode = "Disabled"} } (" Enable virtual LAN identification: " + $VlanMode) | Out-File $Outputfile -Append -encoding UTF8 (" VLAN ID: " + $EthernetSwitchPortVlanSettingData.AccessVlanId) | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Enable virtual LAN identification: Disabled") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 ### Bandwidth Management Info $EthernetSwitchPortBandwidthSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortBandwidthSettingData') (" Bandwitdth Management:") | Out-File $Outputfile -Append -encoding UTF8 If($EthernetSwitchPortBandwidthSettingData -ne $NULL) { (" Enable bandwidth management: True") | Out-File $Outputfile -Append -encoding UTF8 (" Minimum bandwidth : " + $EthernetSwitchPortBandwidthSettingData.Reservation / 1000000.0 + " Mbps") | Out-File $Outputfile -Append -encoding UTF8 (" Maximum bandwidth : " + $EthernetSwitchPortBandwidthSettingData.Limit / 1000000.0 + " Mbps") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Enable bandwidth management: False") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 ### Hardware Acceleration $EthernetSwitchPortOffloadSettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortOffloadSettingData') (" Hardware Acceleration:") | Out-File $Outputfile -Append -encoding UTF8 If($EthernetSwitchPortOffloadSettingData.VMQOffloadWeight -ne 0) { $VMQEnabled = "True(VMQOffloadWeight=" + $EthernetSwitchPortOffloadSettingData.VMQOffloadWeight +")" } Else { $VMQEnabled = "False" } (" Enable virtual machine queue: " +$VMQEnabled) | Out-File $Outputfile -Append -encoding UTF8 If($EthernetSwitchPortOffloadSettingData.IPSecOffloadLimit -ne 0) { $IPSecEnabled = "True(Maximum Number = " + $EthernetSwitchPortOffloadSettingData.IPSecOffloadLimit +" Offloaded SA)" } Else { $IPSecEnabled = "False" } (" IPSec task offloading: " +$IPSecEnabled) | Out-File $Outputfile -Append -encoding UTF8 If($EthernetSwitchPortOffloadSettingData.IOVOffloadWeight -ne 0) { $SRIOVEnabled = "True(IOVOffloadWeight = " + $EthernetSwitchPortOffloadSettingData.IOVOffloadWeight + ")" } Else { $SRIOVEnabled = "False" } (" Enable SR-IOV: " +$SRIOVEnabled) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ### Failover TCP/IP $SyntheticEthernetPortSettings = $VSSettingData.GetRelated('Msvm_SyntheticEthernetPortSettingData') # Get Msvm_SyntheticEthernetPortSettingData corresponding to the current Msvm_EthernetPortAllocationSetting ForEach($SyntheticEthernetPortSetting in $SyntheticEthernetPortSettings) { If($EthernetPortAllocationSetting.InstanceID.Contains($SyntheticEthernetPortSetting.InstanceID)) { $SyntheticPort = $SyntheticEthernetPortSetting break } } If($SyntheticPort -eq $null) { (" WARNING: Failed to retrieve Msvm_SyntheticEthernetPortSettingData.") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ### As Msvm_SyntheticEthernetPortSettingData is not found, we cannot show any info on vNIC. return } (" Failover TCP/IP: ") | Out-File $Outputfile -Append -encoding UTF8 $FailoverNetworkAdapterSettingData = $SyntheticPort.GetRelated('Msvm_FailoverNetworkAdapterSettingData') If($FailoverNetworkAdapterSettingData -ne $null) { If($FailoverNetworkAdapterSettingData.DHCPEnabled) { (" IPv4/IPv6 TCP/IP Settings: DHCP(No static IP address is specified)") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" IPv4 TCP/IP Settings:") | Out-File $Outputfile -Append -encoding UTF8 (" IPv4 Address : " + $FailoverNetworkAdapterSettingData.IPAddresses[0]) | Out-File $Outputfile -Append -encoding UTF8 (" Subnet mask : " + $FailoverNetworkAdapterSettingData.Subnets[0]) | Out-File $Outputfile -Append -encoding UTF8 (" Default gateway: " + $FailoverNetworkAdapterSettingData.DefaultGateways[0]) | Out-File $Outputfile -Append -encoding UTF8 (" Prefferred DNS server: " + $FailoverNetworkAdapterSettingData.DNSServers[0]) | Out-File $Outputfile -Append -encoding UTF8 (" Alternate DNS server : " + $FailoverNetworkAdapterSettingData.DNSServers[1]) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 If($FailoverNetworkAdapterSettingData.IPAddresses.length -eq 2) { (" IPv6 TCP/IP Settings:") | Out-File $Outputfile -Append -encoding UTF8 (" IPv4 Address : " + $FailoverNetworkAdapterSettingData.IPAddresses[1]) | Out-File $Outputfile -Append -encoding UTF8 (" Subnet mask : " + $FailoverNetworkAdapterSettingData.Subnets[1]) | Out-File $Outputfile -Append -encoding UTF8 (" Default gateway: " + $FailoverNetworkAdapterSettingData.DefaultGateways[1]) | Out-File $Outputfile -Append -encoding UTF8 (" Prefferred DNS server: " + $FailoverNetworkAdapterSettingData.DNSServers[2]) | Out-File $Outputfile -Append -encoding UTF8 (" Alternate DNS server : " + $FailoverNetworkAdapterSettingData.DNSServers[3]) | Out-File $Outputfile -Append -encoding UTF8 } } } Else { (" Hyper-V replica is not configured.") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 ### Advanced Feature (" Advanced Features:") | Out-File $Outputfile -Append -encoding UTF8 If($SyntheticPort.StaticMacAddress) { $MACAddr = "Static (" + $SyntheticPort.address + ")" } Else { $MACAddr = "Dynamic (" + $SyntheticPort.address + ")" } (" MAC Address: " + $MACAddr) | Out-File $Outputfile -Append -encoding UTF8 $EthernetSwitchPortSecuritySettingData = $EthernetPortAllocationSetting.GetRelated('Msvm_EthernetSwitchPortSecuritySettingData') If($EthernetSwitchPortSecuritySettingData.AllowMacSpoofing -ne $null) { $MACAddressSpoofing = $EthernetSwitchPortSecuritySettingData.AllowMacSpoofing } Else { $MACAddressSpoofing = "False" } (" Enable MAC address spoofing: " + $MACAddressSpoofing) | Out-File $Outputfile -Append -encoding UTF8 ### DHCP guard If($EthernetSwitchPortSecuritySettingData.EnableDhcpGuard -ne $null) { $DHCPGuard = $EthernetSwitchPortSecuritySettingData.EnableDhcpGuard } Else { $DHCPGuard = "False" } (" Enable DHCP guard: " + $DHCPGuard) | Out-File $Outputfile -Append -encoding UTF8 ### Router guard If($EthernetSwitchPortSecuritySettingData.EnableRouterGuard -ne $null) { $RouterGuard = $EthernetSwitchPortSecuritySettingData.EnableRouterGuard } Else { $RouterGuard = "False" } (" Enable router advertisement guard: " + $RouterGuard) | Out-File $Outputfile -Append -encoding UTF8 ### Port mirroring If($EthernetSwitchPortSecuritySettingData.MonitorMode -ne $null) { switch ($EthernetSwitchPortSecuritySettingData.MonitorMode) { 0 {$MonitorMode = "None (0)"} 1 {$MonitorMode = "Destination (1)"} 2 {$MonitorMode = "Source (2)"} default {$MonitorMode = "False"} } } Else { $MonitorMode = "False" } (" Mirrorring mode: " + $MonitorMode) | Out-File $Outputfile -Append -encoding UTF8 ### Proctected Netowrk(WS2012R2 or later) If($SyntheticPort.ClusterMonitored -ne $null) { (" Protected network: " + $SyntheticPort.ClusterMonitored) | Out-File $Outputfile -Append -encoding UTF8 } ### NIC Teaming If($EthernetSwitchPortSecuritySettingData.AllowTeaming -ne $null) { $AllowTeaming = $EthernetSwitchPortSecuritySettingData.AllowTeaming } Else { $AllowTeaming = "False" } (" Enable this network adapter to be partof a team in the guest operating system: " + $AllowTeaming) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } } Function showComPortinfo { $VM = $args[0] $ComPorts = Get-VMComPort -VMName $VM.ElementName ("COM Port:") | Out-File $Outputfile -Append -encoding UTF8 Foreach ($ComPort in $ComPorts) { (" " + $ComPort.Name + ": " + $ComPort.Path) | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showFloppyDriveinfo { $VM = $args[0] $loppyDrive = Get-VMFloppyDiskDrive -VMName $VM.ElementName ("Diskette Drive:") | Out-File $Outputfile -Append -encoding UTF8 (" Path: " + $floppyDrive.Path) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showICinfo { $VSSettingData = $args[0] ("Integration Services:") | Out-File $Outputfile -Append -encoding UTF8 $ShutdownComponentSettingData = $VSSettingData.GetRelated('Msvm_ShutdownComponentSettingData') $enabledState = getStateString($ShutdownComponentSettingData.EnabledState) (" Operating system shutdown: " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 $TimeSyncComponentSettingData = $VSSettingData.GetRelated('Msvm_TimeSyncComponentSettingData') $enabledState = getStateString($TimeSyncComponentSettingData.EnabledState) (" Time synchronization : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 $KvpExchangeComponentSettingData = $VSSettingData.GetRelated('Msvm_KvpExchangeComponentSettingData') $enabledState = getStateString($KvpExchangeComponentSettingData.EnabledState) (" Data Exchange : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 $HeartbeatComponentSettingData = $VSSettingData.GetRelated('Msvm_HeartbeatComponentSettingData') $enabledState = getStateString($HeartbeatComponentSettingData.EnabledState) (" Heartbeat : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 ### Show heartbeat interval if it is enabled. If($HeartbeatComponentSettingData.EnabledState -eq 2) { (" Interval : " + $HeartbeatComponentSettingData.Interval + " ms") | Out-File $Outputfile -Append -encoding UTF8 (" Latency : " + $HeartbeatComponentSettingData.Latency + " ms") | Out-File $Outputfile -Append -encoding UTF8 (" ErrorThreshold: " + $HeartbeatComponentSettingData.ErrorThreshold + " times") | Out-File $Outputfile -Append -encoding UTF8 } $VssComponentSettingData = $VSSettingData.GetRelated('Msvm_VssComponentSettingData') $enabledState = getStateString($VssComponentSettingData.EnabledState) (" Backup (volume snapshot) : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 ### Guest service(Windows server 2012 R2 or later) $GuestServiceInterfaceComponentSettingData = $VSSettingData.GetRelated('Msvm_GuestServiceInterfaceComponentSettingData') $enabledState = getStateString($GuestServiceInterfaceComponentSettingData.EnabledState) (" Guest service : " + $enabledState) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function getStateString { $enabledState = $args[0] switch ($enabledState) { 2 {$enabledStateStr = "Enabled(2)"} 3 {$enabledStateStr = "Disabled(3)"} default {$enabledStateStr = "Unknown"} } return $enabledStateStr } Function showSnapshotFileinfo { $VSSettingData = $args[0] ("Snapshot File Location(File Location for xml):") | Out-File $Outputfile -Append -encoding UTF8 (" Path: " + $VSSettingData.SnapshotDataRoot) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showSmartPagingFileinfo { $VSSettingData = $args[0] ("Smart Paging File Location:") | Out-File $Outputfile -Append -encoding UTF8 (" Path: " + $VSSettingData.SwapFileDataRoot) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showAutomaticActioninfo { $VSSettingData = $args[0] ("Automatic Start Action:") | Out-File $Outputfile -Append -encoding UTF8 switch ($VSSettingData.AutomaticStartupAction) { 2 {$startActionStr = "Nothing(2)"} 3 {$startActionStr = "Automatically start if it was running when the service stopped(3)"} 4 {$startActionStr = "Always start this virtual machine automatically(4)"} default {$startActionStr = "Unknown"} } (" Action: " + $startActionStr) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ("Automatic Stop Action:") | Out-File $Outputfile -Append -encoding UTF8 switch ($VSSettingData.AutomaticShutdownAction) { 2 {$shutdownActionStr = "Turn off the virtual machine(2)"} 3 {$shutdownActionStr = "Save the virtual machine state(3)"} 4 {$shutdownActionStr = "Shut down the guest operating system(4)"} default {$shutdownActionStr = "Unknown"} } (" Action: " + $shutdownActionStr) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showSnapshotInfo { $VM = $args[0] ("Snapshot: ") | Out-File $Outputfile -Append -encoding UTF8 $Snapshots = Get-VMSnapshot -VMName $VM.ElementName If($Snapshots.length -eq 0) { (" No snapshots in this VM.") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 return } (" -----------------------------------------------------") | Out-File $Outputfile -Append -encoding UTF8 ForEach($Snapshot in $Snapshots) { $VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.ElementName -eq $Snapshot.Name } If($VirtualSystemSettingData.count -gt 1) { ### Sometimes there are two same Msvm_StorageAllocationSettingData. So we get first one. Probably this is a bug... $HardDrives = $VirtualSystemSettingData[0].GetRelated('Msvm_StorageAllocationSettingData') } Else { $HardDrives = $VirtualSystemSettingData.GetRelated('Msvm_StorageAllocationSettingData') } (" Name : " + $Snapshot.Name) | Out-File $Outputfile -Append -encoding UTF8 (" Type : " + $Snapshot.SnapshotType) | Out-File $Outputfile -Append -encoding UTF8 (" Creation Time: " + $Snapshot.CreationTime) | Out-File $Outputfile -Append -encoding UTF8 (" Parent : " + $Snapshot.ParentSnapshotName) | Out-File $Outputfile -Append -encoding UTF8 (" File List : ") | Out-File $Outputfile -Append -encoding UTF8 If($HardDrives -eq $null) { continue # No drives attached to this snapshot. } # Get ACL and file property. ForEach($HardDrive in $HardDrives) { If(($HardDrive.HostResource[0]).Contains("vhd")) { (" - " + $HardDrive.HostResource) | Out-File $Outputfile -Append -encoding UTF8 } Else { continue ### Probably physical drive or ISO file } If(!(Test-Path $HardDrive.HostResource)) { (" !!! WARNING: above file does not exist !!!") | Out-File $Outputfile -Append -encoding UTF8 continue } $vhdInfo = Get-VHD -Path $HardDrive.HostResource[0] $property = Get-ChildItem $HardDrive.HostResource[0] $fileSize = [math]::round($property.Length / 1GB , 3) $maxFileSize = [math]::round($vhdInfo.Size / 1GB , 3) $ACL = Get-ACL $HardDrive.HostResource[0] (" VhdType: " + $vhdInfo.VhdType) | Out-File $Outputfile -Append -encoding UTF8 (" Creation time: " + $property.CreationTime + " " + "Last write time: " + $property.LastWriteTime) | Out-File $Outputfile -Append -encoding UTF8 (" Current size: " + $fileSize + " GB" + " / Max file size: " + $maxFileSize + " GB") | Out-File $Outputfile -Append -encoding UTF8 (" LogicalSectorSize: " + $vhdInfo.LogicalSectorSize + " bytes / PhysicalSectorSize: " + $vhdInfo.PhysicalSectorSize + " bytes") | Out-File $Outputfile -Append -encoding UTF8 (" Owner: " + $ACL.Owner) | Out-File $Outputfile -Append -encoding UTF8 (" ACL: ") | Out-File $Outputfile -Append -encoding UTF8 $AccessRules = $ACL.GetAccessRules($true,$true, [System.Security.Principal.NTAccount]) ForEach($AccessRule in $AccessRules) { (" " + $AccessRule.IdentityReference + " => " + $AccessRule.FileSystemRights) | Out-File $Outputfile -Append -encoding UTF8 } } (" -----------------------------------------------------") | Out-File $Outputfile -Append -encoding UTF8 } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function showReplicationinfo { $VM = $args[0] $VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.VirtualSystemType -eq 'Microsoft:Hyper-V:System:Realized' } switch ($VM.ReplicationState) { 0 {$ReplicationState = "Disabled"} 1 {$ReplicationState = "Ready for replication"} 2 {$ReplicationState = "Waiting to complete initial replication"} 3 {$ReplicationState = "Replicating"} 4 {$ReplicationState = "Synced replication complete"} 5 {$ReplicationState = "Recovered"} 6 {$ReplicationState = "Committed"} 7 {$ReplicationState = "Suspended"} 8 {$ReplicationState = "Critical"} 9 {$ReplicationState = "Waiting to start resynchronization"} 10 {$ReplicationState = "Resynchronizing"} 11 {$ReplicationState = "Resynchronization suspended"} 12 {$ReplicationState = "Failover in progress"} 13 {$ReplicationState = "Failback in progress"} 14 {$ReplicationState = "Failback complete"} } switch ($VM.FailedOverReplicationType) { 0 {$FailedOverReplicationType = "None"} 1 {$FailedOverReplicationType = "Regular"} 2 {$FailedOverReplicationType = "Application consistent"} 3 {$FailedOverReplicationType = "Planned"} } switch ($VM.ReplicationHealth) { 0 {$ReplicationHealth = "Not applicable"} 1 {$ReplicationHealth = "Ok"} 2 {$ReplicationHealth = "Warning"} 3 {$ReplicationHealth = "Critical"} } switch ($VM.ReplicationMode) { 0 {$ReplicationMode = "None"} 1 {$ReplicationMode = "Primary"} 2 {$ReplicationMode = "Recovery"} 3 {$ReplicationMode = "Replica"} 4 {$ReplicationMode = "Extended Replica"} } ### Sometimes there are two same Msvm_ReplicationSettingData. So we get first one. $ReplicationSettingData = $VM.GetRelated('Msvm_ReplicationSettingData') | Select-Object -first 1 switch ($ReplicationSettingData.AuthenticationType) { 1 {$AuthenticationType = "Kerberos authentication"} 2 {$AuthenticationType = "Certificate based authentication"} } $HVRConfiRoot = $VirtualSystemSettingData.ConfigurationDataRoot.ToString() $HVRConfigFile = $VirtualSystemSettingData.ConfigurationFile.ToString() $VHD = get-vhd -vmid $VM.Name If($ReplicationSettingData.ReplicationInterval -eq $null) { $ReplicationInterval = 300 } Else { $ReplicationInterval = $ReplicationSettingData.ReplicationInterval } ("Replication:") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 (" Replication:") | Out-File $Outputfile -Append -encoding UTF8 (" This virtual machinge is configured as " + $ReplicationMode + " virtual machine.") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 (" Port on the Replica server : " + $ReplicationSettingData.RecoveryServerPortNumber) | Out-File $Outputfile -Append -encoding UTF8 (" Authentication Type : " + $AuthenticationType) | Out-File $Outputfile -Append -encoding UTF8 (" Compression the data that is transmitted over the network: " + $ReplicationSettingData.CompressionEnabled) | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 (" Recovery Points:") | Out-File $Outputfile -Append -encoding UTF8 If($ReplicationSettingData.RecoveryHistory -eq 0) { (" Only the latest point for recovery") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Additional recovery points") | Out-File $Outputfile -Append -encoding UTF8 (" Number of recovery point: " + $ReplicationSettingData.RecoveryHistory) | Out-File $Outputfile -Append -encoding UTF8 $isVssReplicaEnabled = $True If($ReplicationSettingData.ApplicationConsistentSnapshotInterval -eq 0) { $isVssReplicaEnabled = $False } (" Application consistent replication: " + $isVssReplicaEnabled) | Out-File $Outputfile -Append -encoding UTF8 If($isVssReplicaEnabled) { (" Replicate incremental VSS copy every: " + $ReplicationSettingData.ApplicationConsistentSnapshotInterval + " hour(s)") | Out-File $Outputfile -Append -encoding UTF8 } } ### Windows Server 2012 R2 or later ### We don't show resync setting if it is RecoveryVM as it is not available. If($VM.ReplicationMode -eq 1) { ("") | Out-File $Outputfile -Append -encoding UTF8 (" Resynchronization:") | Out-File $Outputfile -Append -encoding UTF8 $resyncIntervalEnd = [System.Management.ManagementDateTimeConverter]::Totimespan($ReplicationSettingData.AutoResynchronizeIntervalEnd) $resyncIntervalStart = [System.Management.ManagementDateTimeConverter]::Totimespan($ReplicationSettingData.AutoResynchronizeIntervalStart) $oneSecond = New-TimeSpan -Seconds 1 $endPlusOneSec = $resyncIntervalEnd + $oneSecond If($ReplicationSettingData.AutoResynchronizeEnabled) { If(($resyncIntervalStart.Hours -eq $endPlusOneSec.Hours) -and ($resyncIntervalStart.Minutes -eq $endPlusOneSec.Minutes) -and ($resyncIntervalStart.Seconds -eq $endPlusOneSec.Seconds)) { (" Automatically start resynchronization") | Out-File $Outputfile -Append -encoding UTF8 } Else { (" Automatically start resynchronization only during the follwing hours:") | Out-File $Outputfile -Append -encoding UTF8 (" From: " + $resyncIntervalStart.Hours.ToString("00") + $resyncIntervalStart.Minutes.ToString("\:00")) | Out-File $Outputfile -Append -encoding UTF8 (" To: " + $resyncIntervalEnd.Hours.ToString("00") + $resyncIntervalEnd.Minutes.ToString("\:00")) | Out-File $Outputfile -Append -encoding UTF8 } } Else { (" Manually") | Out-File $Outputfile -Append -encoding UTF8 } } ("") | Out-File $Outputfile -Append -encoding UTF8 (" Other replication info: ") | Out-File $Outputfile -Append -encoding UTF8 (" VM GUID : " + $VM.Name) | Out-File $Outputfile -Append -encoding UTF8 (" Configuration file : " + $HVRConfiRoot + "\" + $HVRConfigFile) | Out-File $Outputfile -Append -encoding UTF8 (" Included VHD files : ") | Out-File $Outputfile -Append -encoding UTF8 ForEach($includedDisk in $ReplicationSettingData.IncludedDisks) { (" - " + $includedDisk) | Out-File $Outputfile -Append -encoding UTF8 } (" Primary server : " + $ReplicationSettingData.PrimaryHostSystem) | Out-File $Outputfile -Append -encoding UTF8 (" Primary connection point : " + $ReplicationSettingData.PrimaryConnectionPoint) | Out-File $Outputfile -Append -encoding UTF8 (" Replica server : " + $ReplicationSettingData.RecoveryHostSystem) | Out-File $Outputfile -Append -encoding UTF8 (" Replication interval : " + $ReplicationInterval + " seconds") | Out-File $Outputfile -Append -encoding UTF8 (" ReplicationHealth : " + $ReplicationHealth) | Out-File $Outputfile -Append -encoding UTF8 (" ReplicationMode : " + $ReplicationMode) | Out-File $Outputfile -Append -encoding UTF8 (" ReplicationState : " + $ReplicationState) | Out-File $Outputfile -Append -encoding UTF8 (" Last update time : " + $VM.LastReplicationTime) | Out-File $Outputfile -Append -encoding UTF8 (" Last update time(VSS) : " + $VM.LastApplicationConsistentReplicationTime) | Out-File $Outputfile -Append -encoding UTF8 } Function showHVFileVersion { $system32Files = dir "C:\Windows\System32\vm*" $hypervisorFiles = dir "C:\Windows\System32\hv*" $driversFiles = dir "C:\Windows\System32\drivers\vm*" $fileArray = ($system32Files, $driversFiles, $hypervisorFiles) ("File version:") | Out-File $Outputfile -Append -encoding UTF8 ForEach($files in $fileArray) { ForEach($file in $files) { $ext = (Get-ChildItem $File).get_Extension() If($ext -ne ".dll" -and $ext -ne ".sys" -and $ext -ne ".exe") { continue } (" " + $file.Name + " " + $file.VersionInfo.FileVersion) | Out-File $Outputfile -Append -encoding UTF8 } } ("") | Out-File $Outputfile -Append -encoding UTF8 } Function getVmGeneration { $VSSettingData = $args[0] If($VSSettingData.VirtualSystemSubType -eq $null) ### WS2012 { $vmGgeneration = "1" } Else ### WS2012R2 or later { $subType = $VSSettingData.VirtualSystemSubType.split(":") $vmGgeneration = $subType[3] } return $vmGgeneration } Function getHeartBeatInfo { $heartbeatComponent = $args[0] If ( $heartbeatComponent.StatusDescriptions -ne $null ) { $heartbeat = $HeartbeatComponent.OperationalStatus[0] $strhbPrimaryStatus = getHBOperationalStatus($heartbeat) } } Function getVMEnabledState { $vmStatus = $args[0] # http://msdn.microsoft.com/en-us/library/hh850116(v=vs.85).aspx switch ($vmStatus) { 0 {$EnabledState = "Unknown"} 1 {$EnabledState = "Other"} 2 {$EnabledState = "Running(Enabled - 2)"} 3 {$EnabledState = "Off(Disabled - 3)"} 4 {$EnabledState = "Shutting down(4)"} 5 {$EnabledState = "Not Applicable(5)"} 6 {$EnabledState = "Saved(Enabled but Offline - 6)"} 7 {$EnabledState = "In Test(7)"} 8 {$EnabledState = "Deferred(8)"} 9 {$EnabledState = "Quiesce(9)"} 10 {$EnabledState = "Starting(10)"} } return $EnabledState } Function getHBOperationalStatus { $hbStatus = $args[0] # http://msdn.microsoft.com/en-us/library/hh850157(v=vs.85).aspx switch ($hbStatus) { 2 {$hbPrimaryStatus = "OK"} 3 {$hbPrimaryStatus = "Degraded"} 7 {$hbPrimaryStatus = "Non-Recoverable Error"} 12 {$hbPrimaryStatus = "No Contact"} 13 {$hbPrimaryStatus = "Lost Communication"} 15 {$hbPrimaryStatus = "Paused"} default {$hbPrimaryStatus = "N/A"} } return $hbPrimaryStatus } Function getHBSecondaryStatus { $hbStatus2 = $args[0] # http://msdn.microsoft.com/en-us/library/hh850157(v=vs.85).aspx switch ($hbStatus2) { 2 {$hbSecondaryStatus = "OK"} 32775 {$hbSecondaryStatus = "Protocol Mismatch"} 32782 {$hbSecondaryStatus = "Application Critical State"} 32783 {$hbSecondaryStatus = "Communication Timed Out"} 32784 {$hbSecondaryStatus = "Communication Failed"} default {$hbSecondaryStatus = "N/A"} } return $hbSecondaryStatus } ### ### MAIN ### $osVersion = [environment]::OSVersion.Version $TestPath = Test-Path "C:\Windows\System32\vmms.exe" If (($TestPath -eq $False) -or ($osVersion.Build -lt 9200)) { "Hyper-V basic information cannot be collected on this system." | WriteTo-StdOut "Hyper-V is installed: $TestPath" | WriteTo-StdOut "OS version is build $OSVersion" | WriteTo-StdOut } Else { $hostName = hostname $VMs = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_ComputerSystem' | Where-Object { $_.ElementName -ne $hostName} $VSMgtServiceSettingData = Get-CimInstance -Namespace 'root\virtualization\v2' -Class 'Msvm_VirtualSystemManagementServiceSettingData' showHVGlobalSettings $VSMgtServiceSettingData showNUMAinfo ("Virtual Machine Settings") | Out-File $Outputfile -Append -encoding UTF8 ("----------------------------------------") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 ForEach ($VM in $VMs) { $VirtualSystemSettingData = $VM.GetRelated('Msvm_VirtualSystemSettingData') | Where-Object { $_.VirtualSystemType -eq 'Microsoft:Hyper-V:System:Realized' } ("<<<<<<<<<< " + $VM.elementName + " >>>>>>>>>>") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 showVMBasicinfo $VM $VirtualSystemSettingData ### Hyper-V UI settings showBIOSinfo $VirtualSystemSettingData showMeminfo $VirtualSystemSettingData showCPUinfo $VirtualSystemSettingData # We don't get IDE info in case of Gen2VM as IDE does not exist. $vmGeneration = getVmGeneration $VirtualSystemSettingData If($vmGeneration -eq "1") { showIDEHardDriveinfo $VM } showSCSIHardDriveinfo $VM showNetworkAdapterinfo $VirtualSystemSettingData showComPortinfo $VM If($vmGeneration -eq "1") { showFloppyDriveinfo $VM } showICinfo $VirtualSystemSettingData showSnapshotFileinfo $VirtualSystemSettingData showSmartPagingFileinfo $VirtualSystemSettingData showAutomaticActioninfo $VirtualSystemSettingData ### Additional info showSnapshotInfo $VM showKVPItems $VM $VirtualSystemSettingData # Get replication info if it is enabled if ($VM.ReplicationState -ne 0) { ("Detected Hyper-V replica enabled...") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 showReplicationinfo $VM } ("") | Out-File $Outputfile -Append -encoding UTF8 ("================================================================================") | Out-File $Outputfile -Append -encoding UTF8 ("") | Out-File $Outputfile -Append -encoding UTF8 } showHVFileVersion CollectFiles -filesToCollect $OutputFile -fileDescription $FileDescription -sectionDescription $SectionDescription -renameOutput $false } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEtmMqo9c5RMNT # 0i6yeLSjp5NTQg3w+ms9Fd4xXeF5haCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHvqipDCrkecCbyXhN/puvpO # hG0xJ3VcZnYJO4v2nqsbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEArsR+InkXBsENsndZR2fh+rvqy0XJlhg7FHuZVx7V2hdjA/mHjV8d0pGX # RxlhOVL3knRbDL5+5NfhG9FJIMXKbRAEj5tsVuovY9Y/v4m1a0qiLDWZBKaOWIeA # vlH/XzaXo8xeA9zsaaGZ9y+lQ0iGLRtboqAh2xc1dpewFMn03h6meYKsnQa140vW # h3wnbob+LwC+AUX73IiPPKyZQ848DXkDoISzD8HdGI69dbwDoV3mCFyYl2D8tZQj # kjL//y9igwHXuS/JNOf7epL0rrQWbL2WDwZrTV4KJ85sTR5U3RYWTvqZiiUGZjQO # ey1MilKPvCOxZnO6bQK5MY6rXqcanKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCkrTCCFDigsb5QDsoFVgmAUH2xwgnbNAPXHFIyAyqW8wIGZxqBxlhS # GBMyMDI0MTAyODExNDA0Ni45NzRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAiGA8yMDI0MTAyODA1MTkw # M1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZ1H # AgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFWM2U6+uXp/lZFN9GfKyEA # trE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fVKJCew6OG7JkRgr5zDklX # ZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnrKlnQGDVkrOH7GF9HYG+2 # JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5dTdvC9qaCYqt+eSrC5+s # 3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnmV9xpIrErypW2LN6/e4lr # LQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCA5b/AlMmKHF3uUknjmVsMXU8vClEHgTHCoC8beyLjTujCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5Weq4WPeaZKqGRCLipnTqgX # s5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAHa1XcmsSsJbRrZfWr8tECj+8 # 59UVjHiT93y2Z1VZlKSNztMVxcStm9WsDiZGWsB5pQVYe5QFCvvusnWhXru57Tdr # 3cC0PSN5e97CUo1DhVVcs7jBATunf+KZ+N8MnCCtRRcC5wBYPz9yJfErIASWho3d # ULaAmDs+NcwxrCuvyEaneFaHlFsN69+9SroH1q/4KF48Q89OW8gmIw46AnxtLffF # MkkND6qNvnh9xUJjDh+avywOZhDOV6MOjVY4Md08KcQC8lVJEkseLixlFyFgq6ql # mVVKxMMkW+abiAgZ1bGnr3fbGJXcBn50w1Gl4p53ElOLDivGDEIisW9QPGiV324j # FGY6lfplPluF6X5qAgSIReh58c9L95FNKezKdLdFYiPlWo/hjlaAvc9QC9I52Z15 # q+dIEm5xxyXUySNUHAVH8q/Wut+BXXNfOj4ocIdhvi6iRaYDJ0M4ShaZra3j5NgV # m8LHJkNxQzSxq07eClpbquEZKSYXvbpa5ksn2z8WJ1ACdieXhu0IsTn/Lwkz/pLl # 9JtJB6ox4CfB/ZkmJL0YbIEXF71zqmme21/bo0lKuTCwJhuSwvxCFPibO6s7/crS # 2nuluZ40VvA09U9DJyV07iEaYIEw04DEeJSQw1OhkRANtH9LBKXIZFh2ocegyXGX # 0G3Qw667qUvLUEeYh2Q= # SIG # End signature block
combined_dataset/train/non-malicious/sample_3_61.ps1
sample_3_61.ps1
ConvertFrom-StringData @' id_systemfiles_title=System Files id_systemfiles_status=Collecting System Files id_systemfilesdirectorylistings_title=System Files Directory Listings id_systemfilesdirectorylistings_status=Collecting System Files Directory Listings id_systemfilesacllistings_title=System Files ACL Listings id_systemfilesacllistings_status=Collecting System Files ACL Listings id_dcompermissions_title=DCOM Permissions id_dcompermissions_status=Collecting DCOM Permissions id_environmentvariables_title=Environment Variables id_environmentvariables_status=Collecting Environment Variables id_ipconfig_title=IPConfig id_ipconfig_status=Collecting IPConfig id_systempolicies_title=System Policies id_systempolicies_status=Collecting System Policies id_proxysettings_title=Proxy Settings id_proxysettings_status=Collecting Proxy Settings id_etllogs_title=ETL Logs id_etllogs_status=Collecting ETL Logs id_rootcertificates_title=Root Certificates id_rootcertificates_status=Collecting Root Certificates id_runningservices_title=Running Services id_runningservices_status=Collecting Running Services id_otherlogs_title=Other Logs id_otherlogs_status=Collecting Other Logs '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD3Rq26OvTBcD52 # orzeRWGllCq2lvdJSTdxO5HlQFqAyaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBw+ # ricoCZSZIxSsTvnL3Jqxo/a7RHFjSVSgnlQaWNXEMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmxZ+xUkUqVIVWS/NwFW2RLUuHzYVXXquM4H8 # /1sYGKSydYc94/Gd2z+M6F454d8GO4J1v0bu2i+PH5PuQs82uJrAyUKJihTCmaFG # LP4RHW6ygJYnCdI82T356EduQ+CmuelWPmoRgDPbNcttcDMfYkKGncQ/Vmh9k3Ne # MWrrF8WTyw5qstdkmeucIyZj5QG2aXUHnePyW6YFTInXalgq9ngGX/YADJVTXtO4 # AxIkSp3c5IK1zea+tSwMFAazWVZ60ysgUeVPzIICHHSzMdgiOd9v8ZflS+E+JS9b # 0gwqkkX4T5zi5tGZa1qjlTplDvOsRa8dbkZyt5J8vOAd/j/XSaGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAvJDGWd0+kKOSmMEcaJwjiYYHUGtIMC1+S # SHqIVmBkqgIGZuto66IiGBMyMDI0MTAyODExNDA0MC40MTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgKZzcqM522l3FBq9x1Ba2q58RheWVN9erFiCsi+PaFTkwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAFN0vQT8CacdrHTsmRZv5aePx2grM1s0 # VmOBlVEKmnn4ieSlmNxAY4U9Jff2Kg23rNI015HozFGPCXhmcBOBPU64/2ecKLqt # UyKVEEYq2qk5JXeMchVSlTLNiioNSOuwBDk6e7bkoZ5w7f1xE/e+5kwB5Rq2oLpO # XGI7cSkWyLvRQSQvV7Bx7YqYCbhpP87R16BezTcpVSt2xGnIkpCD6GpEF1Yqz0go # wpaJERB7gRWQz1lkEwmMeiCW2TnEF7oKK6UJWxx7V5hjyolTWlG81R+8V37Lyjgw # IMhDk/4zm0grK8UxTVnB8SMWIfWhiHw/evX8oY6KRyhEatMiBi4wXVvGZN7WX4Sj # SvEH5KskA7ticB28azk4CbOPx4iZQM11uuVaik/pmXThMJ8Z2soF6qUl/VExxvvP # H6uoqcHoluTf238S7+fjKBcWvQRmKjp0Zw9p7h1yv8wGW3wqxgd9JPRasCl9sy5Y # D1zOMMg7USj/0L1uUm0aPJgHEFcuhjmLXfY5D0XyLXWo1sGUOA8hvH9VFdNbbXAH # 37YDA4/CW7cN8oj2neA19y1sjuU9MSLSjGERx2QmEZ20Dqe934+7Uh9108zdZBXY # B8X2CuTSBspQMId40SLZSRRvkv/CmjN2NXWkJerGxbeMWqMo7rSv+bavfO230IAK # bbLAEZiF8A1u # SIG # End signature block
combined_dataset/train/non-malicious/WCF code coverage.ps1
WCF code coverage.ps1
param($msBuildTarget, $configurationName, [bool]$deleteInstrumentedAssemblies) #------------------------------------- # Script to compile coverage for a WCF # solution running in IIS. # See: # http://geekswithblogs.net/EltonStoneman/archive/2011/10/14/end-to-end-wcf-code-coverage-with-powershell.aspx #------------------------------------- #------------------------------------- # Function to get the running app pool #------------------------------------- function get-apppool{ [regex]$pattern="-ap ""($appPoolName)""" gwmi win32_process -filter 'name="w3wp.exe"' | % { $name=$_.name $cmd = $pattern.Match($_.commandline).Groups[1].Value $procid = $_.ProcessId New-Object psobject | Add-Member -MemberType noteproperty -PassThru Name $name | Add-Member -MemberType noteproperty -PassThru AppPoolID $cmd | Add-Member -MemberType noteproperty -PassThru PID $procid } } #--------------------------------------- # Function to get the id of the app pool #--------------------------------------- function get-apppoolpid{ $appPoolPid = 0 $appPools = get-apppool foreach ($appPool in $appPools){ if ($appPool.AppPoolID -eq "$appPoolName"){ $appPoolPid = $appPool.PID } } write-host "$solutionFriendlyName app pool PID: $appPoolPID" return $appPoolPid } #------------------------------------------------ # Starts the app pool by making a service request #------------------------------------------------ function start-apppool{ #ping the service to start a new app pool process: $uri = new-object System.Uri("$wakeUpServiceUrl") $client = new-object System.Net.WebClient $client.DownloadString($uri) | out-null } #------------------- # Kills the app pool #------------------- function kill-apppool{ $procId = get-apppoolpid if ($procId -ne 0){ write-host "Killing app pool process" $proc = [System.Diagnostics.Process]::GetProcessById($procId) $proc.Kill() } } #------------------------------------------------------------------------------ # Instruments an assembly for code coverage, excluding the specified namespaces #------------------------------------------------------------------------------ function instrument2([string]$assemblyName, [string[]]$excludes){ $assy = "$websiteBinDirectory\\$assemblyName" $excludeLine = "" if ($excludes -ne $null){ foreach ($x in $excludes){ write-host "Excluding: $x.*" $excludeLine = "$excludeLine-exclude:$x.* " } } $cmd = "C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe" write-host "Executing $cmd /coverage $excludeLine $assy" & $cmd /coverage "$excludeLine" "$assy" } #------------------------------------------------------------------------------ # Instruments an assembly for code coverage, excluding the specified namespaces #------------------------------------------------------------------------------ function instrument([string]$assemblyName, [string[]]$excludes){ $assy = "$websiteBinDirectory\\$assemblyName" #ES - this doesn't work as the ":" in exlucde gets parsed out by PS: #$excludeParms = "" #$args #foreach($exclude in $args){ # $excludeParms = $excludeParms + '/exclude:' + $exclude + '.* ' #} #$excludeParms #& 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $excludeParms $assy if ($excludes -eq $null){ write-host "Excluding 0 funcspecs" & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $assy } elseif ($excludes.Length -eq 0){ write-host "Excluding 0 funcspecs" & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $assy } elseif ($excludes.Length -eq 1){ write-host "Excluding 1 funcspecs" $exclude1 = '-exclude:' + $excludes[0] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $assy } elseif ($excludes.Length -eq 2){ write-host "Excluding 2 funcspecs" $exclude1 = '-exclude:' + $excludes[0] $exclude2 = '-exclude:' + $excludes[1] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $assy } elseif ($excludes.Length -eq 3){ write-host "Excluding 3 funcspecs" $exclude1 = '-exclude:' + $excludes[0] $exclude2 = '-exclude:' + $excludes[1] $exclude3 = '-exclude:' + $excludes[2] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $assy } elseif ($excludes.Length -eq 4){ write-host "Excluding 4 funcspecs" $exclude1 = '-exclude:' + $excludes[0] $exclude2 = '-exclude:' + $excludes[1] $exclude3 = '-exclude:' + $excludes[2] $exclude4 = '-exclude:' + $excludes[3] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $assy } elseif ($excludes.Length -eq 5){ write-host "Excluding 5 funcspecs" $exclude1 = '-exclude:' + $excludes[0] $exclude2 = '-exclude:' + $excludes[1] $exclude3 = '-exclude:' + $excludes[2] $exclude4 = '-exclude:' + $excludes[3] $exclude5 = '-exclude:' + $excludes[4] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $exclude5 $assy } elseif ($excludes.Length -eq 6){ write-host "Excluding 6 funcspecs" $exclude1 = '-exclude:' + $excludes[0] $exclude2 = '-exclude:' + $excludes[1] $exclude3 = '-exclude:' + $excludes[2] $exclude4 = '-exclude:' + $excludes[3] $exclude5 = '-exclude:' + $excludes[4] $exclude6 = '-exclude:' + $excludes[5] & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsinstr.exe' /coverage $exclude1 $exclude2 $exclude3 $exclude4 $exclude5 $exclude6 $assy } } #----------------------------------- # Starts instrumenting W3WP app pool #------------------------------------ function start-instrumentation{ #set instrumentation on: & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfclrenv' /globaltraceon #restart the app pool and store the ID: kill-apppool start-apppool $procId = get-apppoolpid #start instrumenting: & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /START:COVERAGE /OUTPUT:$coverageOutputPath /CS /USER:$appPoolIdentity & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /ATTACH:$procId & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /status } #-------------------- # Stops instrumenting #-------------------- function stop-instrumentation{ #stop instrumenting & reset app pool: & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /DETACH kill-apppool & 'C:\\Program Files\\Microsoft Visual Studio 10.0\\Team Tools\\Performance Tools\\vsperfcmd' /SHUTDOWN } #------------------------ # Exports coverage to XML #------------------------ function export-coverage{ #export the coverage file to XML: [System.Reflection.Assembly]::LoadFile("C:\\Program Files\\Microsoft Visual Studio 10.0\\Common7\\IDE\\PrivateAssemblies\\Microsoft.VisualStudio.Coverage.Analysis.dll") $coverage = [Microsoft.VisualStudio.Coverage.Analysis.CoverageInfo]::CreateFromFile("$coverageOutputPath") $dataSet = $coverage.BuildDataSet() $dataSet.WriteXml("$coverageOutputPath" + 'xml') } #---------------------------------------------------------------------------------- # Deletes instrumented assemblies, and reinstates original un-instrumented versions #---------------------------------------------------------------------------------- function delete-intstrumentedassemblies{ $dir = new-object IO.DirectoryInfo($websiteBinDirectory) $originalAssemblies = $dir.GetFiles("*.dll.orig") foreach ($originalAssembly in $originalAssemblies){ $targetName = $originalAssembly.FullName.TrimEnd(".orig".ToCharArray()) #overwrite the instrumented DLL with the original: [IO.File]::Copy($originalAssembly.FullName, $targetName, $true) [IO.File]::Delete($originalAssembly.FullName) #delete the instrumented PDB: $instrumentedPdbName = $originalAssembly.FullName.TrimEnd(".dll.orig".ToCharArray()) + ".instr.pdb" [IO.File]::Delete($instrumentedPdbName) } } #-------------- # Script begins #-------------- #set variables: $solutionFriendlyName = 'XYZ' $wakeUpServiceUrl = 'http://localhost/x.y.z/Service.svc' $appPoolName = 'ap_XYZ' $appPoolIdentity = 'domain\\svc_user' $websiteBinDirectory = 'c:\\websites\\xyz\\x.y.z.Services\\bin' $coverageOutputPath = "Test.coverage" #instrument assemblies: # - instrument assembly so ALL namespaces are included in coverage instrument "x.y.z.Services.dll" # - instrument assembly so anything from the Ignore1 and Ignore2 namespaces are excluded from coverage instrument "x.y.z.Core.dll" 'x.y.z.Core.Ignore1.*' , 'x.y.z.Core.Ignore2.*' write-host "Before starting instrumentation, last exit code: $LASTEXITCODE" #instrument W3WP, run tests & export results: start-instrumentation write-host "Before running tests, last exit code: $LASTEXITCODE" & 'C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\msbuild.exe' Build.proj /t:$msBuildTarget /p:ConfigurationName=$configurationName $realExitCode = $LASTEXITCODE write-host "Before stopping instrumentation, last exit code: $LASTEXITCODE, real exit code: $realExitCode" stop-instrumentation export-coverage export-coverage if ($deleteInstrumentedAssemblies -eq $true){ delete-intstrumentedassemblies } write-host "Before existing, last exit code: $LASTEXITCODE, real exit code: $realExitCode" exit $realExitCode #------------ # Script ends #------------
combined_dataset/train/non-malicious/4241.ps1
4241.ps1
function Get-PassPol { $domain = [ADSI]"WinNT://$env:userdomain" $Name = @{Name='DomainName';Expression={$_.Name}} $MinPassLen = @{Name='Minimum Password Length (Chars)';Expression={$_.MinPasswordLength}} $MinPassAge = @{Name='Minimum Password Age (Days)';Expression={$_.MinPasswordAge.value/86400}} $MaxPassAge = @{Name='Maximum Password Age (Days)';Expression={$_.MaxPasswordAge.value/86400}} $PassHistory = @{Name='Enforce Password History (Passwords remembered)';Expression={$_.PasswordHistoryLength}} $AcctLockoutThreshold = @{Name='Account Lockout Threshold (Invalid logon attempts)';Expression={$_.MaxBadPasswordsAllowed}} $AcctLockoutDuration = @{Name='Account Lockout Duration (Minutes)';Expression={if ($_.AutoUnlockInterval.value -eq -1) {'Account is locked out until administrator unlocks it.'} else {$_.AutoUnlockInterval.value/60}}} $ResetAcctLockoutCounter = @{Name='Reset Account Lockout Counter After (Minutes)';Expression={$_.LockoutObservationInterval.value/60}} $domain | Select-Object $Name,$MinPassLen,$MinPassAge,$MaxPassAge,$PassHistory,$AcctLockoutThreshold,$AcctLockoutDuration,$ResetAcctLockoutCounter } $PassPol = Get-PassPol Write-Output 'Domain Password Policy: ' Write-Output $PassPol
combined_dataset/train/non-malicious/35.ps1
35.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( $name ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Remove-DeviceConfigurationPolicy(){ [cmdletbinding()] param ( $id ) $graphApiVersion = "Beta" $DCP_resource = "deviceManagement/deviceConfigurations" try { if($id -eq "" -or $id -eq $null){ write-host "No id specified for device configuration, can't remove configuration..." -f Red write-host "Please specify id for device configuration..." -f Red break } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $CP = Get-DeviceConfigurationPolicy -name "Test Graph Policy" if($CP){ if(@($CP).count -gt 1){ Write-Host "More than one device configuration policy has been found, please specify a single device configuration policy..." -ForegroundColor Red Write-Host } elseif(@($CP).count -eq 1){ Write-Host "Removing device configuration policy" $CP.displayName -ForegroundColor Yellow Remove-DeviceConfigurationPolicy -id $CP.id } } else { Write-Host "Device Configuration Policy doesn't exist..." Write-Host }
combined_dataset/train/non-malicious/38d536b5-87f9-4725-b346-64260dcc55ec.ps1
38d536b5-87f9-4725-b346-64260dcc55ec.ps1
function Invoke-JQuery { <# .SYNOPSIS Function to Invoke JQuery commands via IE COM .DESCRIPTION Invokes JQuery (or plain Javascript) commands via InternetExplorer.Application COM object, after initial injection of JQuery reference in header section. Useful to utilize JQuery selectors and functions for IE automation. .PARAMETER IE Initialized InternetExplorer.Application COM object .PARAMETER Command JQuery/Javascript to Invoke .PARAMETER Function Function to add in header section .PARAMETER Initialize Switch to initially inject JQuery in header section. .EXAMPLE $ie = new-object -com internetexplorer.application $ie.visible = $true $ie.navigate2("http://www.example.com") # Wait for page load while($ie.busy) {start-sleep 1} #add addtional div to store results $div="<div id='myResult'>" $ie.Document.body.innerHTML += $div #hide anchor tags Invoke-JQuery $ie '$("a").hide();' -Initialize #change innerhtml of div Invoke-JQuery $ie 'var str=$("p:first").text();$("#myResult").html(str);' #retrieve the value $result = $ie.document.getElementById("myResult").innerHtml $jFunc=@" function SelectText(element) { var text = document.getElementById(element); var range = document.body.createTextRange(); range.moveToElementText(text); range.select(); } "@ Invoke-JQuery $ie -Function $jFunc Invoke-JQuery $ie 'SelectText("myResult");' #> [cmdletbinding()] param( [parameter(position=0, mandatory=$true)] $IE, [parameter(position=1,mandatory=$false)] $Command, [parameter()] $Function, [parameter()] [switch]$Initialize ) if ($Initialize -or $Function){ $url='http://code.jquery.com/jquery-1.4.2.min.js' $document = $IE.document $head = @($document.getElementsByTagName("head"))[0] $script = $document.createElement('script') $script.type = 'text/javascript' } if ($Initialize){ $script.src = $url $head.appendChild($script) | Out-Null } if ($Command){$IE.document.parentWindow.execScript("$Command","javascript")} if ($Function){ $script.text = $Function $head.appendChild($script) | Out-Null } }
combined_dataset/train/non-malicious/sample_21_26.ps1
sample_21_26.ps1
########################################################### # # 'ExtensionService' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest Import-Module "$PSScriptRoot\ServiceHelper.psm1" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:OperationRetryCount = 5 <# .SYNOPSIS Install Guest Configuration Extension Service. .Example Install-ExtensionService #> Function Install-ExtensionService { [CmdletBinding()] Param() Write-Verbose -Message "In Install-ExtensionService" $ServiceType = "Extension" $gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config' '{ "ServiceType": "Extension" }' | Out-File $gcConfigPath -Encoding utf8 New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath) $packagesPath = Join-Path $env:SystemDrive 'Packages' $extensionInstallPath = Join-Path $packagesPath 'Plugins' if (!(Test-Path -Path $extensionInstallPath)) { # Create extension install directory if it doesn't exist New-Item $extensionInstallPath -Force -ItemType Directory } Set-AclPermissions -ServiceType $ServiceType -Path $extensionInstallPath Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() # Install GC Service and verify it is installed correctly. Install-ServiceInternal -ServiceType "Extension" } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Enable and start Guest Configuration Extension Service. .Example Enable-ExtensionService #> Function Enable-ExtensionService { [CmdletBinding()] Param() Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() Write-Verbose -Message "In Enable-ExtensionService" $ServiceType = "Extension" Start-ServiceInternal -ServiceType $ServiceType } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Uninstall Guest Configuration Extension Service. .Example Uninstall-ExtensionService #> Function Uninstall-ExtensionService { [CmdletBinding()] Param() Write-Verbose -Message "In Uninstall-ExtensionService" $ServiceType = "Extension" # Unregister GC Service Uninstall-ServiceInternal -ServiceType $ServiceType } <# .SYNOPSIS Update Guest Configuration Extension service. .Example Update-ExtensionService #> Function Update-ExtensionService{ [CmdletBinding()] Param() Write-Verbose -Message "In Update-ExtensionService" } Export-ModuleMember -Function @( 'Install-ExtensionService', 'Enable-ExtensionService', 'Uninstall-ExtensionService', 'Update-ExtensionService' ) # SIG # Begin signature block # MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALlNBTkFMvQNzJ # babyhzSqcfsu9XXh3hKpjS5zPO2U2KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICd6 # lDcaMbiGzvIuiPF29+5B15kGK6LA3sYRwkqpr26SMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAy5Flbs5eFTol2aQyj3h130aY0h5cEXScLBNV # 0J3K6G3TNXdyZiSFwmKxrtDYf52hzRwbBTXA2stgK1l5+HcWP8Q1HWPs7ZMgReyJ # svfj0J2XNisTAaFuIYmi3Mkfer4opEukEu5HklLpmgRxJygFQS0yyspq6yVzdRai # CQb+Ds8lMAy3WCBsIKOOn3Gs4T60jtrSa+kKz9fAJhnkLaS+jnlLk82cXHt89u0K # 1VC4jzrs6cWvX6L4oWQJq+EUp8mtP2rQ0QbBNXfi9uJFXehbIUOkJ2Is5T4QTRQ2 # hxql9Nl0tcIp5J/sc3if7EnXNYUTcPcBFk35pJC8aZuyyyElaaGCFygwghckBgor # BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCByBk8mGWOerRUJctU4GFpGWqRZsOwWSQz8 # NtbmxmbhfwIGZh/d1CZAGBMyMDI0MDQxNzE0NDMyNC4zNzRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnKXFQwIhgPMjAyNDA0MTcyMjMzNTZaGA8yMDI0MDQx # ODIyMzM1NlowczA5BgorBgEEAYRZCgQBMSswKTAKAgUA6cpcVAIBADAGAgEAAgEF # MAcCAQACAhE/MAoCBQDpy63UAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB # hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA # YKXBk+c4g6pUrtj19UP/7rMM6a/6zTbayuE+hVnnnOe5vttZVtGP+ew7AST+BoRY # St6AlHjgeXA5kNLol9J/0Rs2kJoTKQA6L0TxYm5Hw/GtRv2F5+OKyPmnAmnnRlpf # ZsWt7v9JiD5mKkTjcYGa29P/xWqgp5xzcTVUpKwGtQsxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeDU/B8TFR9+XQABAAAB # 4DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDgTxby+OfMpdeCg5hzphAiFW1p5KB6kwIpDnNi/4yb # KTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOPuUr/yOeVtOM+9zvsMIJJv # hNkClj2cmbnCGwr/aQrBMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwIgQgi32+uBM5JnOMxmxCYghA41vB # 43U6XthUpo8z5tkvi5MwDQYJKoZIhvcNAQELBQAEggIAh4lxUxjlg9xbtCJUzNey # XJfw+Hy75MydmDHMTV2RX3k8Gmd5QSUcWR5Xlqe1V38WN8GL44GEaYINC+qiADLg # sX0y0Dp63DaupYlWs/iKheqrd6d8jQ5vlUj58jdCrLRSj6Y8znTK2CVeU8x/vzbh # 1vyxVJJvBxEl8J1I2VpM+euphFjSMx1eI0gqA1yj1JlHCMD0QWrmJprTcvnYPJMi # SlrxEUxTfIus47+fqHQW5PIOKQm09XZ0fGR5I0Oe7hHH+wKY96g6lFZNykSu7b7I # ZEQ/l3lHVAkMM/TtwfjfEkXTk6Y/iN6giJwYpkHljPWNZfsaPpbhVSXuYKfqVl7T # gywYdB0ygwHyn4RGxwbWmgSLop232ccMh7hLfYqVuWTdnQZtcegADjAQohHVVw73 # 0/UdXkatiJauxkv51Et8z70bY1nbS6JCUqmKy6OppB6nFjzvdEO6d7Uy82C4hoA+ # vyZrEVTnnn9mPqc4dv5PhwTl5EzQ2PQ6fse2Z6OfzJbzDTwoE9gtsc6/hD0nQlL8 # dQPKaO/SMNS7ts5HpEgMfXXI9gdMhpooWdjNeVgZ+nlQm5qDBYhABVTs8JicigUf # neU285I8HuMN39XVuj1adOm2L34v+il/sSu9Hj/CUJ2rDf2TZZvm+VjAVBHtBHGr # EqYdFDpK3nOsCCNkKRgI4AQ= # SIG # End signature block
combined_dataset/train/non-malicious/4399.ps1
4399.ps1
function Get-PackageManagementProviderName { [CmdletBinding()] Param ( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [Uri] $Location ) $PackageManagementProviderName = $null $loc = Get-LocationString -LocationUri $Location $providers = PackageManagement\Get-PackageProvider | Where-Object { $_.Features.ContainsKey($script:SupportsPSModulesFeatureName) } foreach($provider in $providers) { if($provider.ProviderName -eq $script:PSModuleProviderName) { continue } $packageSource = Get-PackageSource -Location $loc -Provider $provider.ProviderName -ErrorAction SilentlyContinue if($packageSource) { $PackageManagementProviderName = $provider.ProviderName break } } return $PackageManagementProviderName }
combined_dataset/train/non-malicious/sample_34_72.ps1
sample_34_72.ps1
# # Module manifest for module 'Az.ServiceBus' # # Generated by: Microsoft Corporation # # Generated on: 5/16/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.ServiceBus.psm1' # Version number of this module. ModuleVersion = '4.0.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'ced192ca-b6cd-4848-90dc-b83a5970befc' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Service Bus service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on Service Bus, please visit the following: https://learn.microsoft.com/azure/service-bus/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Microsoft.Azure.Management.ServiceBus.dll', 'ServiceBus.Autorest/bin/Az.ServiceBus.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'ServiceBus.Autorest/Az.ServiceBus.format.ps1xml', 'ServiceBus.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('ServiceBus.Autorest/Az.ServiceBus.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Approve-AzServiceBusPrivateEndpointConnection', 'Complete-AzServiceBusMigration', 'Deny-AzServiceBusPrivateEndpointConnection', 'Get-AzServiceBusAuthorizationRule', 'Get-AzServiceBusGeoDRConfiguration', 'Get-AzServiceBusKey', 'Get-AzServiceBusMigration', 'Get-AzServiceBusNamespace', 'Get-AzServiceBusNetworkRuleSet', 'Get-AzServiceBusPrivateEndpointConnection', 'Get-AzServiceBusPrivateLink', 'Get-AzServiceBusQueue', 'Get-AzServiceBusRule', 'Get-AzServiceBusSubscription', 'Get-AzServiceBusTopic', 'New-AzServiceBusAuthorizationRule', 'New-AzServiceBusGeoDRConfiguration', 'New-AzServiceBusIPRuleConfig', 'New-AzServiceBusKey', 'New-AzServiceBusKeyVaultPropertiesObject', 'New-AzServiceBusNamespace', 'New-AzServiceBusQueue', 'New-AzServiceBusRule', 'New-AzServiceBusSubscription', 'New-AzServiceBusTopic', 'New-AzServiceBusVirtualNetworkRuleConfig', 'Remove-AzServiceBusAuthorizationRule', 'Remove-AzServiceBusGeoDRConfiguration', 'Remove-AzServiceBusMigration', 'Remove-AzServiceBusNamespace', 'Remove-AzServiceBusPrivateEndpointConnection', 'Remove-AzServiceBusQueue', 'Remove-AzServiceBusRule', 'Remove-AzServiceBusSubscription', 'Remove-AzServiceBusTopic', 'Set-AzServiceBusAuthorizationRule', 'Set-AzServiceBusGeoDRConfigurationBreakPair', 'Set-AzServiceBusGeoDRConfigurationFailOver', 'Set-AzServiceBusNamespace', 'Set-AzServiceBusNetworkRuleSet', 'Set-AzServiceBusQueue', 'Set-AzServiceBusRule', 'Set-AzServiceBusSubscription', 'Set-AzServiceBusTopic', 'Start-AzServiceBusMigration', 'Stop-AzServiceBusMigration', 'Test-AzServiceBusName' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'New-AzServiceBusAuthorizationRuleSASToken', 'Test-AzServiceBusNameAvailability' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = 'Get-AzServiceBusNamespaceV2', 'New-AzServiceBusNamespaceV2', 'Remove-AzServiceBusNamespaceV2', 'Set-AzServiceBusNamespaceV2' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','ServiceBus' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Moved cmdlets to V4.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDTJpAuLuYWhw39 # 8EcL6TWF+WvXigBzw74fH4Zp26TQd6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINRksoKwazyD0JOxzknWDD+U # BsTv5llPR60NbGuGZLBgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAJnKv+67eXm64PDr9UPprhJvix/0oYC/0bAdhd8dhBbTDShc+qc6bPdoZ # O2IurlTTvTRvppYby2OKV/vgQD1iALIZBf8yjSM0URDwrdK4nVkDxqw0Mq2ly6Dn # ruM2zVQjrQmYbAU3ceEvhjT4Ud8xTgo2S1pBvkkVTcYuJ444DtpQyM2LwsPuAhcy # 244YQyquRlJtXoGiK+M+MzGLOs/ynKIZQcdB7t0j2d8MrhEBbxQAjakZR6YU1lOs # pY9Fu5PjTShSA7qdQ9XQ+0q+3W+v6Wu66nfRBDUYWw6JPTj7rDlbdvtiGh1pqvN9 # BkerszaN4WwdMWap0+rocpKp+iKKCKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCP8T6xmAUm6tAP9/crHIJ6nqtCtzeIFHnrOpD/QG6rAwIGZjOabFTM # GBMyMDI0MDUxNjA3MjMzMy43MTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy # NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq # AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p # RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9 # fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc # dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru # var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb # bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAWXOMavFvxyHnHqqE/p6riCxV0hv2PpajwpkSG3g5g # qzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk # ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAJ7wANcqaROf8tBAGAqhw # 2DnaALHhTRTZIKBqMQ7iOQXvlgDAjUNtkai1WJR2LpZd/F7UhcNP62vQAgQ1SxFr # qbXeH37ZEkstNEvzAPtaRh6/VE4zB4czgY4v1hABXoJw9P7gRLUIdQ1VRPTE5anZ # HQBcXp5uKwWxgTvxaOBypR1wGBiNAhhbQFInat45bSQi+DHfj3q8PuERkUVlwN+l # 9Dwu8fsBgrWgNjh/rY5wBrbBYfFEo8p2Rn2HD9hnc6qVspFOcLRTiPHfMLW7WIDY # O8/vozpTrG7kBNxqMjoj4rV8U8+f+kt/S+ghv8A2moX8+RZq9uLprYZVIcZvt90V # Xs7dme8MErFM7yvuYpsEFonzuHTCjLSzV+Xjogjc/JzGrt0q78GKeXM9L2xytv3E # p/GNdOI25ioqYszhJ01DELJWoZPdiBkUFTfBVmZ0B1jyPOZIc8hCTUC8bZQPugv3 # zqr0XfIJAYa5BCz8lstF6n8ijlJrgrCXwAB9qY5bEGgJwKiQVfjwhBR3K8jsFFbC # MbesahQQ+8zF+iidlZGpmQDrh2SyRZQ2iT6D+g0yn6xBAS3uumTV9KPkO8fohKIg # ymEavXSIM54KSFcyIC5F0yTn/82XXlrahRAXvwlM712vmBzMFcJ3WvWsFqjHNMQi # lAiSktltqD9C1mr4eUM8cnY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_61.ps1
sample_50_61.ps1
ConvertFrom-StringData @' FailoverClustersModuleRequired=Gerekli PowerShell modülü (FailoverClusters) bulunamadı. Yüklemek için Roller ve Özellikler Aracı'nı kullanın: Uzak Sunucu Yönetim Araçları | Özellik Yönetim Araçları | Yük Devretme Kümelemesi Araçları | Windows PowerShell İçin Yük Devretme Küme Modülü. '@ # SIG # Begin signature block # MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAt+B9wNWoeEu3A # IgXAe/Lh8bNhR8MsKLVcxhOXLQnxxaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOYrBJeD8p5KURynfeAi0W/L # EgnLIT5FbJJ8P1AbnHg3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAtkvxIHou5dUPdyWq9dnIvgA/oJIQoXkZ69yeZ3EJK2fgUPW3VIAeKYef # JBCHIH3K4x5e4QzwZc/WSSvCgnxTCnUVI1eRLFgW+/k2ucyj6oqHPiBY/vRUfGhg # N69U72CVxdLGN56tnsBd0dN+vaY0zJz3uu9PNSil6rDWk7QBzwK1nF3MHbTcNOVD # m0PirxkqGqgYlfKpR1ApY7reO6tALui7wgrJfjM9e3Zyxlibj5tgxPOOcNVvfQaT # 4cYmzqNmIcMUYRbLMU8wZ8H7ky+gj0QVJXjJBNop+iHuUXDGD6AWC6xMXtFJlm8u # yFHNkHKeMvxzl6yX7xsW6OODDnHXtaGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC # FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC2K1fe5FML1ofIgpI1Ur+HlrinW1ST4zMozNi3SGMhFwIGZa6C/0q3 # GBMyMDI0MDEyMjIxMzIwMC41MTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlZAXgwIhgPMjAyNDAxMjIyMzAwMDhaGA8yMDI0MDEyMzIzMDAwOFowdjA8Bgor # BgEEAYRZCgQBMS4wLDAKAgUA6VkBeAIBADAJAgEAAgEGAgH/MAcCAQACAhFNMAoC # BQDpWlL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASXzy0QumYD5FJty8 # CaDX5T5aA/+aFNaT3pHiTpwJtjl3YisVMK9spV4xRtiMCt1N1iNFLsvmBdcl3UwJ # jbK/5DWZZjPyUEph8Qon/GfrdC35ZDhTI8L93HwuxbYgD+VwNrsDmZGT2gewGnLg # K5pYatQM1AWj+dtBluuU+3gqzVUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCCWFf0sPb8GvtIrDjjernt5pVKBYAY9urp7P9KJQB48oTCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz # fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe # nkielp8oRD0AAQAAAd4wIgQgYj8w3kfC0Jvs9rCNyXm8xM06hS2hsBx8v5ACk2bu # InAwDQYJKoZIhvcNAQELBQAEggIAXW7YcuW4uSgPSHZK7XTNUIs96RhnffT/yL2U # U+/FLil4cvqJwyu1fx3w3kPP+oyD+EEPxyxftRJlU2vF+mX5T6pL17EEdz7cqhon # 6PtWrtIpRzzyOcvcG2PVd2hkxFrmxO0dTVyPAEl2BSyEErK4pp0rtmd/mQHetIIP # twRtqZEtii6hBh2HrV6OH4xnMeZVagcBP4hLXoSyFq9rfKaTtN6cVmKpuBNoT81b # dwqBYiDU7Dq0t4JAHXuW0lghNsO29k48v5Y1P0puDl8T2HTeNejuV5S76TjydVo4 # JpVcCa9SelZWR6Ygh5q9WDb2QpDpnK4rY1ZXJLw8/2G5DSB5LqXYxmOycqiwHcBh # YUfX0Rr0+jiYRWSX3+KQxgFkhNb4ahAhJ3cdmMEeEvE7S/5HapUsdJvuH25C+5Gr # d/GvZp3m5TqyO9qOGWMes6+HTaFrKRl+kEIyggUEwMl+NzVNPRIsOoQyirjirCMG # YHdk4Hr8mJkgWgP7w3CO8NeWRrtqD5zweoJznR4EVfg49TdsVhk1MJuaeDnGxn4O # ay/tbjXy2BC6VrmcMKqAa61TcAwfv9DNoxPxQcU6hwRwBPDTvWvAHSJjz6vzJpKW # yYDGFnwcJk1BwoQDiZeGQ4yBLuHeOc2sJbR7I8Be8drBzA8hauILwlPqbPAshr4D # 4aCDJao= # SIG # End signature block
combined_dataset/train/non-malicious/1069.ps1
1069.ps1
function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Test-ShouldTestUncPath { Assert-True (Test-UncPath -Path '\\computer\share') } function Test-ShouldTestRelativePath { Assert-False (Test-UncPath -Path '..\..\foo\bar') } function Test-ShouldTestNtfsPath { Assert-False (Test-UncPath -Path 'C:\foo\bar\biz\baz\buz') }
combined_dataset/train/non-malicious/sample_9_20.ps1
sample_9_20.ps1
#************************************************ # DC_DfsrInfo.ps1 # Version 1.2.0 # Date: 4/19/2010 # By Craig Landis (clandis@microsoft.com) #************************************************ # 2019-03-17 WalterE added Trap #_# nneds check for DFSrDiag.exe / OSversion? # 2023-02-08 fix 'CHOICE /T 20 /C 123q' # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } function MenuDiagInput-CollectDFSR{ Write-Host -ForegroundColor Yellow "============AD Collect DFSR Information ==============" Write-Host "1: Collect All (=default)" Write-Host "2: Collect All But Health-Reports" Write-Host "3: Collect Minimal" Write-Host "q: Press Q to skip" } If ((Get-CimInstance -query "Select ProductType from Win32_OperatingSystem").ProductType -ne 1) { $DFSRkey = "HKLM:\SYSTEM\CurrentControlSet\Services\DFSR" If (Test-Path $DFSRkey){ Import-LocalizedData -BindingVariable DfsrInfoStrings -FileName DC_DfsrInfo -UICulture en-us Write-DiagProgress -Activity $DfsrInfoStrings.ID_DfsrInfo -Status $DfsrInfoStrings.ID_DfsrInfoObtaining $sectionDescription = "DFSR Miscellaneous" $OutputFile = "DFSR__Progress.txt" #_#$CollectDFSRInformation_Answer = get-diaginput -id "CollectDFSRInformation" MenuDiagInput-CollectDFSR #$Selection = Read-Host "Choose the DFSR Information level" #$Selection = CHOICE /T 20 /C 123q /D 1 /M "Choose the DFSR Information level: Press 1,2,3,q=quit [Timeout=20sec]" #WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $Selection" -shortformat WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): DFSR Selection: $LASTEXITCODE" -shortformat switch ($LASTEXITCODE) { 1 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} 2 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"} 3 {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"} 4 {} default {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} } <# switch ($CollectDFSRInformation_Answer) { "CollectAll" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt"} "CollectAllButHealthReports" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports"} "CollectMinimal" {$CommandToExecute = "cscript.exe DfsrInfo.vbs /msdt /noreports /nodbguids /nodebuglogs"} } #> RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "Progress Log" CollectFiles -filesToCollect "Dfsr*.log" -fileDescription "DFSR Current Log File" -sectionDescription "DFSR Debug Log Files" -renameOutput $false CollectFiles -filesToCollect "Dfsr*.gz" -fileDescription "DFSR Previous Log file" -sectionDescription "DFSR Debug Log Files" -renameOutput $false CollectFiles -filesToCollect ($ComputerName + "_DFSR_ConflictAndDeleted.xls") -fileDescription "DFSR Conflicts and Deletes" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Events_Last_72_Hours.xls") -fileDescription "DFSR Events Last 3 Days" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_File_Versions.txt") -fileDescription "DFSR File Versions" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Hotfixes.txt") -fileDescription "DFSR Hotfixes" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Info.txt") -fileDescription "DFSR Configuration Information" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Performance_Data.txt") -fileDescription "DFSR Performance Data" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_DBGUIDs.txt") -fileDescription "DFSR Database GUIDs" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_DfsrMachineConfig.XML") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_DFSR.txt") -fileDescription "DFSR Registry Key" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_RegKey_TCPIP.txt") -fileDescription "TCPIP Registry Key" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Replica*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Volume*.xml") -fileDescription "XML File" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_Dfsmgmt*.log") -fileDescription "DFS Management Trace Log" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_File_Screens.txt") -fileDescription "FSRM File Screens" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect ($ComputerName + "_DFSR_FSRM_Quotas.txt") -fileDescription "FSRM Quotas" -sectionDescription "DFSR Miscellaneous" CollectFiles -filesToCollect "*HealthReport*" -fileDescription "Health Report" -sectionDescription "DFSR Health Reports" } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3XQppCIcPWskT # F5FaHmfo0K67pJpbAnun/w4/3VC+naCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDVYJ3DS+UK1PHeyFdg/GMR9 # uTZdLEal0GiV0kMQLW7OMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkot0NVKSbeuB/n5L33NSg2xciai5trTZXBxEYfhbHRHyPIxTfp2PNxWr # a7Oc6D0M5GVUPsbOx1TkO6DsngmdnvLGeDOWXJcY2l0tU/99wlpDGKBtT0Atv3b0 # KRW454UZT9OibbTY6i2jgdBI8usmoHBLklOmCFam4+p3DDKrjmSWkGZZXBRfXllD # ceASnnWfk5qOS1+fEMnuQQKCfNSShvu/ayZkzFGBez16WCCpam7JkY9dJy5Ll96F # tyjAvfMbVDK7fD4cgE/LZbHWiufwuzCPOb28B/vTZ8arDZvsczDj1uH5W7AxZO7R # zDPOIFIWGPR0T38MnH81vMPeKrUzgaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDGr0fT4Q8HD1sZ2Ba8V/62uX9OHtUDt9dXC/RtxflOzwIGZutwxmYr # GBMyMDI0MTAyODExNDA0NS4xNjVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgi31DZ7r24F8L # TCGjTX6qKoAySMDRtqfL9s0P+3yDOVAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAB+dColSLEOJcJ/4gYtlcwDbpawNhquzmiY8A1/BUCSfaYCCn4JC7zD+ # 8wevnKZIxQz+/3EAL4jq3+rAko0pcHWDG3RuSdKvsKLIhP31aqAVRE76AbWpjgzH # z+D8mvE5PN4h4okzJJuwmRrbrniA6BHHVfG3N3EBiZPSBbyVWMgfS5RfDNQJP/Sc # Xnv+79H5H0t9j1Lv/67+uMSzBfEZx1+D3m1CVbBVXr8y16IJiiTW7xckBn+YOsjF # LRj6nssKS+XBkMaq+qxRmNqu7KvP3x7eeow+C0fjjuuAovSmtvEjqSsbVUQTxoXU # OGL5vmqbyKUXpq8ZvI/fh8Vk2V09l39sGrw475JAGV7dl3UZQa4rqPB9TAAa6y4G # gbqeKV1LRa9oWsotlxXFEdbUOFuh6DNx2RKd9IDDIQfZYGOxBUwlFV7ld0NPZ7qU # rDWVh79JysPwer7dWIxhMED5QzVpy1obLXUxzjNrPPw4wDYTyuBQnoiM5pMr9p+B # yCg9m7/c1Konl5/UKhEuaqx0nEtwSJQJESFdk8CXJBwddmLT0ipOW/w0NFi0SxhG # JK7iPjiKJLFyUShmV/HIyPK51j0YYjlQu2CvO072yFVU7DqREwQVOgZ/rMDEe5fO # yVfD/it1vz1e/IFbwBJZusgsbrXDNtp6z7BjWdu5JiYWCPOBr9za # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_54.ps1
sample_1_54.ps1
// ================================================================== // DCIM_CLPConcreteJob // ================================================================== // Class: DCIM_CLPConcreteJob [ dynamic, provider("dcismprovider")] class DCIM_CLPConcreteJob : CIM_ConcreteJob { [Write, Description ( "Identifies the pid of process that the current ConcreteJob belongs to." "It is used to filter the CLPProtocolEndpoing instances associated to this " "concrete job."), ModelCorrespondence { "DCIM_CLPConcreteJob.OEMAvocent_pid " }] string OEMAvocent_pid; }; /* SIG # Begin signature block */ /* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDSxmYnCrApFyUe */ /* +wYmsiqvc8D6ZsHrwrP+wtnaWzw4V6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDH/SBhiBZP */ /* QHJxSAgCa0ktO3iUIK+Kv0P18aE2fGqJijBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYBLK+LEhT9WyFCf+auDTbusTNDiUBZ+WJbxwqDSfJY3NqKc */ /* w+gOacq+T4BbOSIpUaGoHponzVTxrS/toTmg5AxAt/KCFmRX8Z7iQDCKEtPXLLtF */ /* ORMSPrLQROGANiXtCj9Sl5lqRgthXjluEiESGSVmWlvMNb4T10s7IZAUGzdkVgAl */ /* Fx+7okSgxsCV/9vgNstW5+FlwqijDfIEcMgU6hS/sRUg0gKdt9uqCxVpew9y3icl */ /* HMeMA8Uuqifb06YQESR6nwyErlVc463ArCyS/geRkfC+EIXSXkiDq1DX1cToVuut */ /* woWvAX+0Uv1wJZfoTvcvRyjN+lAQ4t1xQ2LDDrqzbqVIdTPmQchQ770aKC0H2vwc */ /* rObTOxvHc1DQH+x0os3zVo5eFOt85XNoSH3REL9nukcPOFfFzkBmUWrVslap4Beg */ /* CTv7Qdwf7OjEldH9FRWTBvL+GTKK/4U00QtEGVZeHMHDKjFNB83E9l8ex6SQdNYI */ /* XPT9wrBJGFGYvyQ4lEehghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */ /* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */ /* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgl99VfQ2+K1ps */ /* Vzj5hwhU0jrPeOOgEe7LxHC/fAOXxJACEQDRfMfEETxH/N2l9bRpV8MMGA8yMDI0 */ /* MDkyMDA3MDAzMlqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */ /* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */ /* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */ /* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */ /* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */ /* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */ /* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */ /* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */ /* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */ /* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */ /* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */ /* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */ /* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */ /* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */ /* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */ /* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */ /* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */ /* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */ /* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */ /* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */ /* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */ /* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */ /* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */ /* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */ /* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */ /* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */ /* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */ /* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */ /* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */ /* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */ /* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */ /* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */ /* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */ /* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */ /* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */ /* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */ /* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */ /* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */ /* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */ /* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */ /* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */ /* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */ /* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */ /* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */ /* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */ /* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */ /* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */ /* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */ /* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */ /* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */ /* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */ /* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */ /* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */ /* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */ /* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */ /* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */ /* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */ /* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */ /* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */ /* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */ /* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */ /* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */ /* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */ /* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */ /* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */ /* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */ /* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */ /* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */ /* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */ /* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */ /* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */ /* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */ /* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */ /* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */ /* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */ /* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */ /* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */ /* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */ /* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */ /* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */ /* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */ /* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */ /* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */ /* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */ /* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */ /* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */ /* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */ /* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */ /* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */ /* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */ /* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */ /* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */ /* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */ /* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */ /* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */ /* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */ /* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */ /* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */ /* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */ /* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */ /* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */ /* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */ /* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */ /* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */ /* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */ /* MDA3MDAzMlowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */ /* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIBBUdtIs0UPyTvP3CgbiILTw+N/FBXQuVo1J */ /* nd3DMKbPMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */ /* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICACLOAMxiple58lZiEOXt */ /* /J+EQ9/tUFvP/VIoyooEUZXjjJfj783z9wVI5L18Vmj9i2Ttd42KTzJGmQ37mk/F */ /* N05pEy3Tf3nHgVfFuIERCHyFBvwJ9ZkIs2J6w8O0OxLzjdW9nh73BYKnBhU4ScCF */ /* j6A8M2rk1ryHW56P1xCILnUw9zOMFAhu3jE9WbtkQRmR8fRQV+chIiDjZ3UhWUDN */ /* jlqwrFoPqqnbfDdMV/ETxvFkCLmXb8Zgc6CfNvM5tcAjHzcjNgtkFQWCagYy7Z7+ */ /* GHY6Qt5LeL16fp8pKpgP597CBIGOv9MFvNOLK+GFvLI4Uh35OYl0CZS4RuYzQpc0 */ /* +eMtV5nopAIMG9GZDfeBCgIR2iLfI18wduCVDWSD8OHX7/rXrFRCErf1aPa/sZ4x */ /* YfOukNSO28l6ipF2KgWdC2sEbg3OyMqAeuvG3dq7s+lf0QPs8N1KdaP4xzLd12Vy */ /* GY0TBSEsmXCtPJwHJ94VeZC8x5bJEJon0280j2aKpXOgELCK46xMKL89ywRERvbi */ /* 3J9hPR7MmQ8bKWHrXdK2f7rmDsQ4EHk8gRxq8ocN2q8/6vlUYZxbKOJ2xcUkoinU */ /* uc38wEt133f4KPB0nfjnjTvtRntZ0qtLBdX9vNx84cq5+7NaG9Ct0QNAHoIYpXO+ */ /* k4SvWYphOTsP7F9dAMwM3nbC */ /* SIG # End signature block */
combined_dataset/train/non-malicious/New-MAML.ps1
New-MAML.ps1
#Requires -version 2.0 #Generates External MAML Powershell help file for any loaded cmdlet or function #Note: Requires Joel Bennet's New-XML script from http: //www.poshcode.com/1244 #place New-XML in same directory as New-MAML #Once the XML/MAML file is generated, you'll need to fill in the TODO items and the parameters options #that are defaulted to false. The position parameter option will need to be changed in the generated MAML also. #Example Usage to generate a test-ispath.ps1-help.xml file: #PS C:\\Users\\u00\\bin> $xml = ./new-maml test-ispath #PS C:\\Users\\u00\\bin> $xml.Declaration.ToString() | out-file ./test-ispath.ps1-help.xml -encoding "UTF8" #PS C:\\Users\\u00\\bin> $xml.ToString() | out-file ./test-ispath.ps1-help.xml -encoding "UTF8" -append #For compiled cmdlets place the MAML file in the same directory as the binary module or snapin dll #For script modules/functions include a reference to the External MAML file for each function #Note: You can use the same MAML file for multiple functions, example: # ## .ExternalHelp C:\\Users\\u00\\bin\\test-ispath.ps1-help.xml ## function test-ipath param ($commandName) $scriptRoot = Split-Path (Resolve-Path $myInvocation.MyCommand.Path) . $scriptRoot\\New-XML.ps1 [XNamespace]$helpItems="http://msh" [XNamespace]$maml="http://schemas.microsoft.com/maml/2004/10" [XNamespace]$command="http://schemas.microsoft.com/maml/dev/command/2004/10" [XNamespace]$dev="http://schemas.microsoft.com/maml/dev/2004/10" $parameters = get-command $commandName | %{$commandName=$_.Name;$_.parameters} | %{$_.Values} New-Xml helpItems -schema "maml" { xe ($command + "command") -maml $maml -command $command -dev $dev { xe ($command + "details") { xe ($command + "name") {"$commandName"} xe ($maml + "description") { xe ($maml + "para") {"TODO Add Short description"} } xe ($maml + "copyright") { xe ($maml + "para") {} } xe ($command + "verb") {"$(($CommandName -split '-')[0])"} xe ($command + "noun") {"$(($commandName -split '-')[1])"} xe ($dev + "version") {} } xe ($maml + "description") { xe ($maml + "para") {"TODO Add Long description"} } xe ($command + "syntax") { xe ($command + "syntaxItem") { $parameters | foreach { xe ($command + "name") {"$commandName"} xe ($command + "parameter") -require "false" -variableLength "false" -globbing "false" -pipelineInput "false" -postion "0" { xe ($maml + "name") {"$($_.Name)"} xe ($maml + "description") { xe ($maml + "para") {"TODO Add $($_.Name) Description"} } xe ($command + "parameterValue") -required "false" -variableLength "false" {"$($_.ParameterType.Name)"} } } } } xe ($command + "parameters") { $parameters | foreach { xe ($command + "parameter") -required "false" -variableLength "false" -globbing "false" -pipelineInput "false (ByValue)" -position "0" { xe ($maml + "name") {"$($_.Name)"} xe ($maml + "description") { xe ($maml + "para") {"TODO Add $($_.Name) Description"} } xe ($command + "parameterValue") -required "true" -variableLength "false" {"$($_.ParameterType.Name)"} xe ($dev + "type") { xe ($maml + "name") {"$($_.ParameterType.Name)"} xe ($maml + "uri"){} } xe ($dev + "defaultValue") {} } } } xe ($command + "inputTypes") { xe ($command + "inputType") { xe ($dev + "type") { xe ($maml + "name") {"TODO Add $commandName inputType"} xe ($maml + "uri") {} xe ($maml + "description") { xe ($maml + "para") {} } } xe ($maml + "description") {} } } xe ($command + "returnValues") { xe ($command + "returnValue") { xe ($dev + "type") { xe ($maml + "name") {"TODO Add $commandName returnType"} xe ($maml + "uri") {} xe ($maml + "description") { xe ($maml + "para") {} } } xe ($maml + "description") {} } } xe ($command + "terminatingErrors") {} xe ($command + "nonTerminatingErrors") {} xe ($maml + "alertSet") { xe ($maml + "title") {} xe ($maml + "alert") { xe ($maml + "para") {} } } xe ($command + "examples") { xe ($command + "example") { xe ($maml + "title") {"-------------- EXAMPLE 1 --------------"} xe ($maml + "introduction") { xe ($maml + "para") {"C:\\PS&gt;"} } xe ($dev + "code") {"TODO Add $commandName Example code"} xe ($dev + "remarks") { xe ($maml + "para") {"TODO Add $commandName Example Comment"} xe ($maml + "para") {} xe ($maml + "para") {} xe ($maml + "para") {} xe ($maml + "para") {} } xe ($command + "commandLines") { xe ($command + "commandLine") { xe ($command + "commandText") {} } } } } xe ($maml + "relatedLinks") { xe ($maml + "navigationLink") { xe ($maml + "linkText") {"$commandName"} xe ($maml + "uri") {} } } } }
combined_dataset/train/non-malicious/sample_16_68.ps1
sample_16_68.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_42_56.ps1
sample_42_56.ps1
# # Module manifest for module 'OCI.PSModules.Ailanguage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ailanguage.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f9edfadc-7cd9-4f7a-8258-fc0671fb808f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ailanguage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ailanguage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAilanguageEndpoint', 'Get-OCIAilanguageEndpointsList', 'Get-OCIAilanguageEvaluationResultsList', 'Get-OCIAilanguageModel', 'Get-OCIAilanguageModelsList', 'Get-OCIAilanguageModelType', 'Get-OCIAilanguageProject', 'Get-OCIAilanguageProjectsList', 'Get-OCIAilanguageWorkRequest', 'Get-OCIAilanguageWorkRequestErrorsList', 'Get-OCIAilanguageWorkRequestLogsList', 'Get-OCIAilanguageWorkRequestsList', 'Invoke-OCIAilanguageBatchDetectDominantLanguage', 'Invoke-OCIAilanguageBatchDetectLanguageEntities', 'Invoke-OCIAilanguageBatchDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageBatchDetectLanguagePiiEntities', 'Invoke-OCIAilanguageBatchDetectLanguageSentiments', 'Invoke-OCIAilanguageBatchDetectLanguageTextClassification', 'Invoke-OCIAilanguageBatchLanguageTranslation', 'Invoke-OCIAilanguageDetectDominantLanguage', 'Invoke-OCIAilanguageDetectLanguageEntities', 'Invoke-OCIAilanguageDetectLanguageKeyPhrases', 'Invoke-OCIAilanguageDetectLanguageSentiments', 'Invoke-OCIAilanguageDetectLanguageTextClassification', 'Move-OCIAilanguageEndpointCompartment', 'Move-OCIAilanguageModelCompartment', 'Move-OCIAilanguageProjectCompartment', 'New-OCIAilanguageEndpoint', 'New-OCIAilanguageModel', 'New-OCIAilanguageProject', 'Remove-OCIAilanguageEndpoint', 'Remove-OCIAilanguageModel', 'Remove-OCIAilanguageProject', 'Update-OCIAilanguageEndpoint', 'Update-OCIAilanguageModel', 'Update-OCIAilanguageProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ailanguage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_45_62.ps1
sample_45_62.ps1
None
combined_dataset/train/non-malicious/sample_42_48.ps1
sample_42_48.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Test-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [OutputType([bool], ParameterSetName='__AllParameterSets')] [OutputType([System.Management.Automation.Language.IScriptExtent], ParameterSetName='PassThru')] [CmdletBinding()] param( [Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Extent, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Inside, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $After, [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Before, [Parameter(ParameterSetName='PassThru')] [switch] $PassThru ) process { if (-not $Extent) { return $false } $passes = (-not $After -or $Extent.StartOffset -gt $After.EndOffset) -and (-not $Before -or $Extent.EndOffset -lt $Before.StartOffset) -and (-not $Inside -or ($Extent.StartOffset -ge $Inside.StartOffset -and $Extent.EndOffset -le $Inside.EndOffset)) if (-not $PassThru.IsPresent) { return $passes } if ($passes) { $Extent # yield } } } # SIG # Begin signature block # MIIn0AYJKoZIhvcNAQcCoIInwTCCJ70CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDh3KaxT3eCSr09 # 0zGLQhhCZ8P7A0AsbPcbsnG6DpAmJqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGAQ # N+mOQZxzZyVbmfEFx8KczzZKcpC3M4HV8vsum11uMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA0E4J/fCTGnMLpepNjU8OXbd8RkTK3QSksZd4 # cqNdkMCj1ZRZ44xOAdvL5z04c3ZuPuoG7GHxEt2YmqoY9N66OLvBsjWT5Hcl+ouh # YkHEXgHuDwG9KNBoRVCRxPBK36YtbqPlGCaE/YXoJN/P/2MZ9YjJLxdv79VakS0N # izTvGpPUqJCcXE+R3GP1on24roZrlG7pzrQTFDLqyVjceThGul9aisEjkoIQWLH6 # Rvq1N3RpGqOlF5cQzMy9aI9QcLkSYO9gtuqj/8rQTto0a/ptTWgD8B+tebf2Qgyn # EtvSjNGN1ZKZCJ7ALKUT2jEZa2b3bQKz//C6cBfwKZgEiR/N46GCFyswghcnBgor # BgEEAYI3AwMBMYIXFzCCFxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAklCjNATiMIEdyVWT0qdtn3hdBrd4RXg0a # 0EZFypaf3gIGZa6U3SvUGBMyMDI0MDEyNjAyMjcxMi4wOTZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHj372b # mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k # DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N # EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35 # fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/ # jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB # P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q # Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs # bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c # Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo # jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ # 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb # udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1 # 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0 # sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX # JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL # iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ # 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms # CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es # DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq # zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub # 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy # 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE # 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOlcXjwwIhgPMjAyNDAxMjUxMjEyNDRaGA8yMDI0MDEy # NjEyMTI0NFowdjA8BgorBgEEAYRZCgQBMS4wLDAKAgUA6VxePAIBADAJAgEAAgFA # AgH/MAcCAQACAhGpMAoCBQDpXa+8AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQAD # gYEAKnPA1njx/Wz26i6hGw8QcEQ9pkfs78FYof3DqqDDSUfhYhVmVcf9ljcZvoy/ # NX8HOQBd3puApv6OXVQgmCy8V/TRfwUahr0pU0DVvEcIgC7ysk87vv9+jjE1y+hI # 6LTvBJyw+pheKl2nVk1DLvukNqOxfCD+uEhZekSoan1dQSIxggQNMIIECQIBATCB # kzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZuaHGiDIgAB # AAAB4zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJ # EAEEMC8GCSqGSIb3DQEJBDEiBCAgjveegC1XcjJob8aN+nrZz4rb2HyqWIReLQ/r # mFaxrjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIDPUI6vlsP5k90SBCNa9 # wha4MlxBt2Crw12PTHIy5iYqMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwIgQgEUIwYvDJir7CRXpQ725L # gL8ISKlt4GImjKU8GjEgb5EwDQYJKoZIhvcNAQELBQAEggIALSncYC36HCCtxidh # qjq6aU/bSnSnFPhnbq8t0vYwfLP3px7dOxsTxWOAHWSO/FojKOZHY61EYNYlF5rn # JDu7GTUwAFFJ36P06Eza973X5HA+b0pDijjB3QD7gtuS9oC7OZZPB/GCFtC7cMVJ # RLd0tlRC7PLUR1+KfJipodG3Mn37EciI8fIh/aOoc0VE5gqAVmcAc61zEkrRSMP2 # /Gbg713MxDqKtTIHshjepFwJKCUsdM1G2haNuIOnX5N3PIS+Cu5N7blJ15RAbXQb # lRpfLALZPbCvRwobtpcq0+UmQN4h9L0F7H03BIZSdYnjxUWCO8KAXu/fpHlrQ9IN # zwg77PqRa2M9w+XDSEvaiBoRuPwnRJtJB63UyIAEgpdz8O9ri1NL/3Gk/m6EpY3z # Jq7PXWT63pN0e8BsjRT+bOk3CFNEthsETu6TPf36pw+/dlywBNj4UTzJ8ctSaK4y # /sTNx0s+NK7hCF0clycM+UIjByjs6u2Lp2DdanpbiJd7/JzhvrLHY0Vx3u2Wx0Ua # fLLtO5+BS7qXR6WkebcM7EQKVD1O/rbnRtL0zEZCbPsEympt7s249sTg1tsmTVJy # uUXx88So+NV4MXmrm/hv92jaadvBVB2G3B5+mtK+eBKrb0wGDPlM3mjxk0VnqcZR # JEfBLtxJCIjirIFzxl3j2LDKWCk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_61_15.ps1
sample_61_15.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ function Publish-NewServiceFabricApplication { <# .SYNOPSIS Publishes a new Service Fabric application type to Service Fabric cluster. .DESCRIPTION This script registers & creates a Service Fabric application. .NOTES Connection to service fabric cluster should be established by using 'Connect-ServiceFabricCluster' before invoking this cmdlet. WARNING: This script creates a new Service Fabric application in the cluster. If OverwriteExistingApplication switch is provided, it deletes any existing application in the cluster with the same name. .PARAMETER ApplicationPackagePath Path to the folder containing the Service Fabric application package OR path to the zipped service fabric applciation package. .PARAMETER ApplicationParameterFilePath Path to the application parameter file which contains Application Name and application parameters to be used for the application. .PARAMETER ApplicationName Name of Service Fabric application to be created. If value for this parameter is provided alongwith ApplicationParameterFilePath it will override the Application name specified in ApplicationParameter file. .PARAMETER Action Action which this script performs. Available Options are Register, Create, RegisterAndCreate. Default Action is RegisterAndCreate. .PARAMETER ApplicationParameter Hashtable of the Service Fabric application parameters to be used for the application. If value for this parameter is provided, it will be merged with application parameters specified in ApplicationParameter file. In case a parameter is found in application parameter file and on commandline, commandline parameter will override the one specified in application parameter file. .PARAMETER OverwriteBehavior Overwrite Behavior if an application exists in the cluster with the same name. Available Options are Never, Always, SameAppTypeAndVersion. Never will not remove the existing application. This is the default behavior. Always will remove the existing application even if its Application type and Version is different from the application being created. SameAppTypeAndVersion will remove the existing application only if its Application type and Version is same as the application being created. .PARAMETER SkipPackageValidation Switch signaling whether the package should be validated or not before deployment. .PARAMETER CopyPackageTimeoutSec Timeout in seconds for copying application package to image store. Default is 600 seconds. .PARAMETER CompressPackage Switch signaling whether the package should be compressed or not before deployment. .PARAMETER RegisterApplicationTypeTimeoutSec Timeout in seconds for registering application type. Default is 600 seconds. .PARAMETER UnregisterApplicationTypeTimeoutSec Timeout in seconds for unregistering application type. Default is 600 seconds. .PARAMETER StartupServicesFilePath Absolute path of StartupServicesFilePath which contains Services and service Parameters. .PARAMETER StartupServiceParameterFilePath Path to the service parameter file which contains service parameters to be used for the services in the application. .PARAMETER StartupServiceParameter Hashtable of the Service Fabric service parameters to be used for the application. If value for this parameter is provided, it will be merged with service parameters specified in StarupServiceParameterFilePath file. In case a parameter is found in service parameter file and on commandline, commandline parameter will override the one specified in service parameter file. .EXAMPLE Publish-NewServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationParameterFilePath 'Local.xml' Registers & Creates an application with AppParameter file containing name of application and values for parameters that are defined in the application manifest. Publish-NewServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationName 'fabric:/Application1' Registers & Creates an application with the specified application name. #> [CmdletBinding(DefaultParameterSetName="ApplicationName")] Param ( [Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")] [Parameter(Mandatory=$true,ParameterSetName="ApplicationName")] [String]$ApplicationPackagePath, [Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")] [String]$ApplicationParameterFilePath, [Parameter(Mandatory=$true,ParameterSetName="ApplicationName")] [Parameter(ParameterSetName="ApplicationParameterFilePath")] [String]$ApplicationName, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [ValidateSet('Register','Create','RegisterAndCreate')] [String]$Action = 'RegisterAndCreate', [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Hashtable]$ApplicationParameter, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [ValidateSet('Never','Always','SameAppTypeAndVersion')] [String]$OverwriteBehavior = 'Never', [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Switch]$SkipPackageValidation, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$CopyPackageTimeoutSec = 600, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Switch]$CompressPackage, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$RegisterApplicationTypeTimeoutSec = 600, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$UnregisterApplicationTypeTimeoutSec = 600, [Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [String]$StartupServicesFilePath, [Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [String]$StartupServiceParameterFilePath, [Parameter(Mandatory=$false,ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Hashtable]$StartupServiceParameter ) if (!(Test-Path $ApplicationPackagePath)) { $errMsg = "$ApplicationPackagePath is not found." throw $errMsg } # Check if the ApplicationPackagePath points to a compressed package. if (Test-Path $ApplicationPackagePath -PathType Leaf) { if((Get-Item $ApplicationPackagePath).Extension -eq ".sfpkg") { $AppPkgPathToUse=[io.path]::combine($env:Temp, (Get-Item $ApplicationPackagePath).BaseName) Expand-ToFolder $ApplicationPackagePath $AppPkgPathToUse } else { $errMsg = "$ApplicationPackagePath is not a valid Service Fabric application package" throw $errMsg } } else { $AppPkgPathToUse = $ApplicationPackagePath } if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath') -and !(Test-Path $ApplicationParameterFilePath -PathType Leaf)) { $errMsg = "$ApplicationParameterFilePath is not found." throw $errMsg } # Check StartupServicesFilePath is valid if provided if ($PSBoundParameters.ContainsKey('StartupServicesFilePath') -AND !(Test-Path $StartupServicesFilePath -PathType Leaf)) { $errMsg = "$StartupServicesFilePath is not found." throw $errMsg } # Check StartupServiceParameterFilePath is valid if provided if ($PSBoundParameters.ContainsKey('ServiceParameterFilePath') -AND !(Test-Path $StartupServiceParameterFilePath -PathType Leaf)) { $errMsg = "$StartupServiceParameterFilePath is not found." throw $errMsg } try { [void](Test-ServiceFabricClusterConnection) } catch { Write-Warning "Unable to verify connection to Service Fabric cluster." throw } # Get image store connection string $clusterManifestText = Get-ServiceFabricClusterManifest $imageStoreConnectionString = Get-ImageStoreConnectionStringFromClusterManifest ([xml] $clusterManifestText) $ApplicationManifestPath = "$AppPkgPathToUse\ApplicationManifest.xml" $ApplicationManifestPathBkp = "$AppPkgPathToUse\ApplicationManifest_bkp.xml" if(!$SkipPackageValidation) { # If StartupServices file is provided, merge content from this file to ApplicationManifest. This is done to validate content of StartupServices.xml file if($StartupServicesFilePath) { [xml]$AppManifestContent = Get-Content -Path $ApplicationManifestPath [xml]$StartupServicesContent = Get-Content -Path $StartupServicesFilePath $ServiceParamsNode = $AppManifestContent.ImportNode($StartupServicesContent.DocumentElement.Parameters, $true) $ServiceNode = $AppManifestContent.ImportNode($StartupServicesContent.DocumentElement.Services, $true) # If Services are present in StartupServices.xml, append them in ApplicationManifest.xml if($ServiceNode) { $DefaultServices = $AppManifestContent.CreateElement($null, 'DefaultServices', "http://schemas.microsoft.com/2011/01/fabric") $DefaultServices.InnerXml = $ServiceNode.InnerXml #If there are multiple services, $AppManifestContent.DocumentElement.ServiceManifestImport will be of list type and count will be >0 #If there is a single service, $AppManifestContent.DocumentElement.ServiceManifestImport will be of XmlElement type and count will be null $count = $AppManifestContent.DocumentElement.ServiceManifestImport.Count if($count -gt 0) { $AppManifestContent.DocumentElement.InsertAfter($DefaultServices, $AppManifestContent.DocumentElement.ServiceManifestImport[$count-1]) | out-null } else { $AppManifestContent.DocumentElement.InsertAfter($DefaultServices, $AppManifestContent.DocumentElement.ServiceManifestImport) | out-null } } # If Parameters are present in StartupServices.xml if($ServiceParamsNode) { # If ApplicationManifest.xml has Application Parameters, append service parameters $existingAppParameters = $null foreach ($node in $AppManifestContent.DocumentElement.ChildNodes) { if ("Parameters" -eq $node.LocalName -and "http://schemas.microsoft.com/2011/01/fabric" -eq $node.NamespaceURI) { $existingAppParameters = $node; break; } } if($existingAppParameters) { $len = $ServiceParamsNode.ChildNodes.Count for($i = 0; $i -lt $len; $i++) { # childNode gets popped up and added to AppManifestContent after each iteration $existingAppParameters.AppendChild($ServiceParamsNode.ChildNodes[0]) | out-null } } else { $AppManifestContent.DocumentElement.PrependChild($ServiceParamsNode) | out-null } } # Move existing ApplicationManifest.xml to bkp file and write new content Move-Item -Path $ApplicationManifestPath -Destination $ApplicationManifestPathBkp -Force $AppManifestContent.Save($ApplicationManifestPath) $packageValidationSuccess = (Test-ServiceFabricApplicationPackage $AppPkgPathToUse) if (!$packageValidationSuccess) { $errMsg = "Validation failed for package: " + $ApplicationPackagePath throw $errMsg } # If validation is successful, put back ApplicationManifest.xml file from backup file Remove-Item $ApplicationManifestPath Move-Item -Path $ApplicationManifestPathBkp -Destination $ApplicationManifestPath } $packageValidationSuccess = (Test-ServiceFabricApplicationPackage $AppPkgPathToUse) if (!$packageValidationSuccess) { $errMsg = "Validation failed for package: " + $ApplicationPackagePath throw $errMsg } } # If ApplicationName is not specified on command line get application name from Application Parameter file. if(!$ApplicationName) { $ApplicationName = Get-ApplicationNameFromApplicationParameterFile $ApplicationParameterFilePath } $names = Get-NamesFromApplicationManifest -ApplicationManifestPath $ApplicationManifestPath if (!$names) { Write-Warning "Unable to read Application Type and Version from application manifest file." return } if($Action.Equals("Register") -or $Action.Equals("RegisterAndCreate")) { # Apply OverwriteBehavior if an applciation with same name already exists. $app = Get-ServiceFabricApplication -ApplicationName $ApplicationName if ($app) { $removeApp = $false if($OverwriteBehavior.Equals("Never")) { $errMsg = "An application with name '$ApplicationName' already exists, its Type is '$($app.ApplicationTypeName)' and Version is '$($app.ApplicationTypeVersion)'. You must first remove the existing application before a new application can be deployed or provide a new name for the application." throw $errMsg } if($OverwriteBehavior.Equals("SameAppTypeAndVersion")) { if($app.ApplicationTypeVersion -eq $names.ApplicationTypeVersion -and $app.ApplicationTypeName -eq $names.ApplicationTypeName) { $removeApp = $true } else { $errMsg = "An application with name '$ApplicationName' already exists, its Type is '$($app.ApplicationTypeName)' and Version is '$($app.ApplicationTypeVersion)'. You must first remove the existing application before a new application can be deployed or provide a new name for the application." throw $errMsg } } if($OverwriteBehavior.Equals("Always")) { $removeApp = $true } if($removeApp) { Write-Host "An application with name '$ApplicationName' already exists in the cluster with Application Type '$($app.ApplicationTypeName)' and Version '$($app.ApplicationTypeVersion)'. Removing it." try { $app | Remove-ServiceFabricApplication -Force -ForceRemove } catch [System.TimeoutException] { # Catch operation timeout and continue with force remove replica. } catch [System.Fabric.FabricElementNotFoundException] { if ($_.Exception.ErrorCode -eq [System.Fabric.FabricErrorCode]::ApplicationNotFound) { # Ignore } else { throw } } foreach ($node in Get-ServiceFabricNode) { [void](Get-ServiceFabricDeployedReplica -NodeName $node.NodeName -ApplicationName $ApplicationName | Remove-ServiceFabricReplica -NodeName $node.NodeName -ForceRemove) } if($OverwriteBehavior.Equals("Always")) { # Unregsiter AppType and Version if there are no other applciations for the Type and Version. # It will unregister the existing application's type and version even if its different from the application being created, if((Get-ServiceFabricApplication | Where-Object {$_.ApplicationTypeVersion -eq $($app.ApplicationTypeVersion) -and $_.ApplicationTypeName -eq $($app.ApplicationTypeName)}).Count -eq 0) { Unregister-ServiceFabricApplicationType -ApplicationTypeName $($app.ApplicationTypeName) -ApplicationTypeVersion $($app.ApplicationTypeVersion) -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec } } } } $reg = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $names.ApplicationTypeVersion } if ($reg) { Write-Host 'Application Type '$names.ApplicationTypeName' and Version '$names.ApplicationTypeVersion' was already registered with Cluster, unregistering it...' $reg | Unregister-ServiceFabricApplicationType -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec if(!$?) { throw "Unregistering of existing Application Type was unsuccessful." } } Write-Host 'Copying application to image store...' $applicationPackagePathInImageStore = $names.ApplicationTypeName Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $AppPkgPathToUse -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -TimeOutSec $CopyPackageTimeoutSec -CompressPackage:$CompressPackage if(!$?) { throw "Copying of application package to image store failed. Cannot continue with registering the application." } Write-Host 'Registering application type...' Register-ServiceFabricApplicationType -ApplicationPathInImageStore $applicationPackagePathInImageStore -ApplicationPackageCleanupPolicy Manual -Async if(!$?) { throw "Registration of application type failed." } # Wait for app registration to finish. $ready = $false $retryTimeInterval = 2 $retryCount = $RegisterApplicationTypeTimeoutSec / $retryTimeInterval $prevStatusDetail = "" do { $appType = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion if($appType.Status -eq "Available") { $ready = $true } elseif($appType.Status -eq "Failed") { if($appType.StatusDetails -ne "") { Write-Host $appType.StatusDetails } throw "Registration of application type failed." } else { if($appType.StatusDetails -ne "") { if($prevStatusDetail -ne $appType.StatusDetails) { Write-Host $appType.StatusDetails } $prevStatusDetail = $appType.StatusDetails } Start-Sleep -Seconds $retryTimeInterval $retryCount-- } } while (!$ready -and $retryCount -gt 0) if(!$ready) { throw "Registration of application package is not completed in specified timeout of $RegisterApplicationTypeTimeoutSec seconds. Please consider increasing this timout by passing a value for RegisterApplicationTypeTimeoutSec parameter." } else { Write-Host "Application package is registered." } Write-Host 'Removing application package from image store...' Remove-ServiceFabricApplicationPackage -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -ImageStoreConnectionString $imageStoreConnectionString } if($Action.Equals("Create") -or $Action.Equals("RegisterAndCreate")) { Write-Host 'Creating application...' # If application parameters file is specified read values from and merge it with parameters passed on Commandline if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath')) { $appParamsFromFile = Get-ApplicationParametersFromApplicationParameterFile $ApplicationParameterFilePath if(!$ApplicationParameter) { $ApplicationParameter = $appParamsFromFile } else { $ApplicationParameter = Merge-Hashtables -HashTableOld $appParamsFromFile -HashTableNew $ApplicationParameter } } New-ServiceFabricApplication -ApplicationName $ApplicationName -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion -ApplicationParameter $ApplicationParameter if(!$?) { throw "Creation of application failed." } if($StartupServicesFilePath) { # Get content from StartupServicesFilePath [xml]$startupServices= Get-Content -Path $StartupServicesFilePath #Get Services from StartupServices file $services = $startupServices.StartupServicesManifest.Services # Get parameter from StartupServices file $Parameters = $startupServices.StartupServicesManifest.Parameters #Convert parameters to hashtable $Parameters = ReadParametersAsHashTable -Parameters $Parameters # Get parameters from ApplicationManifest.xml and over ride above Parameters $paramsFromAppManifest = Get-ApplicationParametersFromApplicationManifestFile $ApplicationManifestPath $Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $paramsFromAppManifest # If service parameters file is specified read values from and merge it with service parameters passed on Commandline if ($PSBoundParameters.ContainsKey('StartupServiceParameterFilePath')) { $serviceParamsFromFile = Get-ServiceParametersFromServiceParameterFile $StartupServiceParameterFilePath if(!$StartupServiceParameter) { $StartupServiceParameter = $serviceParamsFromFile } else { $StartupServiceParameter = Merge-Hashtables -HashTableOld $serviceParamsFromFile -HashTableNew $StartupServiceParameter } } # Merge above StartupServiceParameter to parameters read from StartupServicesFile $Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $StartupServiceParameter # Over ride above Parameters with ApplicationParameter populated before New-ServiceFabricApplication $Parameters = Merge-Hashtables -HashTableOld $Parameters -HashTableNew $ApplicationParameter #Get content from ApplicationManifest [xml]$ApplicationManifestContent= Get-Content -Path $ApplicationManifestPath # Get HasPersistedState values from different serviceManifest files $ServiceImports = $ApplicationManifestContent.ApplicationManifest.ServiceManifestImport $PersistedStateTable = @{} foreach($Import in $ServiceImports) { $PkgName = $Import.ServiceManifestRef.ServiceManifestName $ServiceManifestPath = $AppPkgPathToUse + '\' + $PkgName + '\ServiceManifest.xml' [xml]$ServiceManifestContent = Get-Content -Path $ServiceManifestPath $StatefulServiceType = $ServiceManifestContent.ServiceManifest.ServiceTypes.StatefulServiceType if($StatefulServiceType -and $StatefulServiceType.HasPersistedState) { $PersistedStateTable.add($StatefulServiceType.ServiceTypeName, $StatefulServiceType.HasPersistedState) } } # For each service in services call New-ServiceFabricService with appropriate parameters foreach($Service in $Services.ChildNodes) { $serviceType = Find-ServiceType -Service $service if($serviceType -eq "Stateless") { Create-StatelessService -ApplicationName $ApplicationName -Service $service -Parameters $Parameters if(!$?) { throw "Creation of stateless service : $service.Name failed." } } elseif($serviceType -eq "Stateful") { Create-StatefulService -ApplicationName $ApplicationName -Service $service -Parameters $Parameters -PersistedStateTable $PersistedStateTable if(!$?) { throw "Creation of stateful service : $service.Name failed." } } else { # this will cover if there are some comments continue } } } Write-Host 'Create application succeeded.' } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAhtHHB9BPoA8Lt # 0lxy16dmZ5A2/GwkyFxAaf+Jrz7A/aCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEr4dFz6+8HLHkxNIXHS5nXl # qcegMrAXMZZvUcwFlshmMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEA0pOoRieW1n66uV3XtdGhtrtRXwWn7+L4EilJRWGKRAZdPCwRhd+ws765 # sN4307+qKiyMLZXth7d+SpalfCF8b/vhX5Ww5NAscmgBNuqXiHuDMZrO8MtB65b2 # FDIWUVBQU47irbH1b7pUzdg2fpCLzTzaZ0IPSBxujRU29wU5MU3xStTYGIOIfUQs # aOsvLLM217+QQtRx5sLhnsq+R+OFjC14ysBa7Yh7QMNUmkJukEVMXOo1cziTCQxB # ZBcow105bIAF6V0yD82sx8/hShhYFIGHEwtxlSDDHqY4QHAsUFRcKfYF57yQcadj # +WsN5Z8FIfr3Bjm2YyPKoQWzUXELYKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBQup/7babBzaPx4KvINOgP5pCNS4sB2dRLgXIZqy1yggIGZSizr7jq # GBMyMDIzMTAxNzE4MjUyOS4zMjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAcyGpdw369lhLQABAAABzDANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MDFaFw0yNDAyMDExOTEyMDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDMsSIF8e9NmEc+83NVZGgWWZi/wBYt8zhxAfSGM7xw # 7K7CbA/1A4GhovPvkIY873tnyzdyZe+6YHXx+Rd618lQDmmm5X4euiYG53Ld7WIK # +Dd+hyi0H97D6HM4ZzGqovmwB0fZ3lh+phJLoPT+9yrTLFzkkKw2Vcb7wXMBziD0 # MVVYbmwRlRaypTntl39IENCEijW9j6MElTyXP2zrc0OthQN5RrMTY5iZja3MyHCF # mYMGinmHftsaG3Ydi8Ga8BQjdtoTm5dVhnqs2qKNEOqZSon28R4Xff0tlJL5UHyI # 3bywH/+zQeJu8qnsSCi8VFPOsZEb6cZzhXHaAiSGtdKAbQRaAIhExbIUpeJypC7l # +wqKC3BO9ADGupB9ZgUFbSv5ECFjMDzbfm8M5zz2A4xYNPQXqZv0wGWL+jTvb7kF # YiDPPe+zRyBbzmrSpObB7XqjqzUFNKlwp+Mx15k1F7FMs5EM2uG68IQsdAGBkZbS # DmuGmjPbZ7dtim+XHuh3NS6JmXYPS7rikpCbUsMZMn5eWxiWFIk6f00skR4RLWmh # 0N6Oq+KYI1fA59LzGiAbOrcxgvQkRo3OD4o1JW9z1TNMwEbkzPrXMo8rrGsuGoyY # Wcsm9xhd0GXIRHHC64nzbI3e0G5jqEsWQc4uaQeSRyr70KRijzVyWjjYfsEtvVMl # JwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFIKmHGRdPIdLRXtsR5XRSyM3+2kMMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB5GUMo9XviUl3g72u8oQTorIKDoAdgWZ4L # Q9+dAEQCmaetsThkxbNm15seu7GmwpZdhMQN8TNddGki5s5Ie+aA2VEo9vZz31ll # usHBXAVrQtpufQqtIA+2nnusfaYviitr6p5kVT609LITOYgdKRWEpfx/4yT5R9yM # eKxoxkk8tyGiGPZK40ST5Z14OPdJfVbkYeCvlLQclsX1+WBZNx/XZvazJmXjvYjT # uG0QbZpxw4ZO3ZoffQYxZYRzn0z41U7MDFlXo2ihfasdbHuua6kpHxJ9AIoUevh3 # mzvUxYp0u0z3wYDPpLuo+M2VYh8XOCUB0u75xG3S5+98TKmFbqZYgpgr6P+YKeao # 2YpB1izs850YSzuwaX7kRxAURlmN/j5Hv4wabnOfZb36mDqJp4IeGmwPtwI8tEPs # uRAmyreejyhkZV7dfgJ4N83QBhpHVZlB4FmlJR8yF3aB15QW6tw4CaH+PMIDud6G # eOJO4cQE+lTc6rIJmN4cfi2TTG7e49TvhCXfBS2pzOyb9YemSm0krk8jJh6zgeGq # ztk7zewfE+3shQRc74sXLY58pvVoznfgfGvy1llbq4Oey96KouwiuhDtxuKlTnW7 # pw7xaNPhIMsOxW8dpSp915FtKfOqKR/dfJOsbHDSJY/iiJz4mWKAGoydeLM6zLmo # hRCPWk/Q5jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBO # TuZ3uYfiihS4zRToxisDt9mJpKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Nkg1DAiGA8yMDIzMTAxNzE1MDM0 # OFoYDzIwMjMxMDE4MTUwMzQ4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDo2SDU # AgEAMAcCAQACAjPJMAcCAQACAhcjMAoCBQDo2nJUAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAACWGiMIFDAwDnfJiTK7Ec6aeA3jSV/XYfNGR9G21deKTJcD # ZN/6sAG3xrVlvFhd1XtElL2cBbEVj8TwLd4K5MAMdAQ0VRIXQ1qul7B+qK28nWn+ # 7jldUkBmSIBLXjypBkLlEM9SgOgJo7fDH4yyGAGEpUIVCrIjbdI437I+A5hMpLzW # x7ZNc00B4MXxJdl9IB3DcxlPSn3kCVApsxKAa3tTgNNYhDnA4cYfIn7uV5tMOijI # A5Ka9WAJ79luBC7o7SOYQgIe2JRRbDItFxJVZdGbpnWavRevmUOaOwbg3CmgD7Eu # QR2r44bzLZdqQGkkLaHLyLCizSMVpk2/z1I6igwxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAcyGpdw369lhLQABAAABzDAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAKvSNZUcZQ9cW5u0jQrJPlWawO0aJu7lKdC11ISpGfqjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINbuZQHC/sMCE+cgKVSkwKpDICfn # efFZYgDbF4HrcFjmMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHMhqXcN+vZYS0AAQAAAcwwIgQg6ZrJ+uGm1JhJUYBT+/xap6+32kHu # ak73INae2yo/AMQwDQYJKoZIhvcNAQELBQAEggIAkxCiJYGta4HtcW/rQERqbO0y # cguAfxjz9Pb9JFV39WpTH8+n7iBOw2197Rdfw7hduvHi2uLMv2hkFYDhQVHUK0Vm # Api/MVtc+Oi/opBgMYz1yETkv9wFsS4Cx8FUbRt9y9VarMq2GtX34za+a/QwVUYA # 25r8I+CpIrRCCEVrn2Orv0yKLfF122h4fBCU3RYxiHc/XeUMh0McFdV7zsnAyrBZ # pWnEGQA3ZnW/0TT3qO0dx5W00H5tRrl5uGhizcwBGg7/kXYDPbPwX7MT6eq5Vt7j # jm2sLVYAJ4kfNWg2bgUShKT0uDqKbsknK5o46lCDvHtOZTvwPYz/ghmUc79L9iVi # Y9Ekg649kvvUcsqkk+dgbJ3QiAy9juQPc+M07cZvL2aZ9Rezwx1+e6/A+oAS+1DV # 4lkiJESwET83Dmt1qjHIEcivf5znARrChLUe/v5SvBC91qiH6kIZIhj9HpV6Chxt # z/3U4JI37n+ZutOomLElmvOTh8hKkAIPFwQxX1OPzLb6bSnrGKrBoJMj+cwIOaS8 # DcoXcrpNjWxgP5FXcJuiEnjGrpfdj56/JdRZG5LbN0ER8UN3+dQBfDsMQXSBlZpF # D2IXEanR/mUSkNiygpdnI1uy3Okay8IgvAtWDxM9BVv6HGBUKRryxS+7+xCQlRHr # QDWIdU7ydeTK7Snh9Dg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_62_58.ps1
sample_62_58.ps1
function EnsureAdminPrivileges([String]$mesageOnError) { $identity = [Security.Principal.WindowsIdentity]::GetCurrent() $principal = new-object Security.Principal.WindowsPrincipal $identity if (!($principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator))) { Write-Error $mesageOnError throw } } function GetFabricDataRootFromRegistry { return (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricDataRoot } function GetFabricLogRootFromRegistry { return (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricLogRoot } function AddWindowsFabricAcl([String]$folderPath) { $currAcl = Get-Acl "$folderPath" $accessRuleWinFabAdmin = New-Object System.Security.AccessControl.FileSystemAccessRule("ServiceFabricAdministrators", "FullControl", "ContainerInherit, ObjectInherit", "None", "Allow") $currAcl.SetAccessRule($accessRuleWinFabAdmin) Set-Acl "$folderPath" $currAcl } function TestPathRobust([string]$pathToTest) { [int]$retryCount = 0; do { $testErrors = @() $isPathExists = (Test-Path -Path $pathToTest -ErrorAction SilentlyContinue -ErrorVariable testErrors) if ($testErrors.Count -eq 0) { return $isPathExists } Start-Sleep -Seconds 1 $retryCount++ if($retryCount -eq 40) { $errorString = $testErrors -join ' ' Write-Error $errorString throw } } while($True) } function GetClusterScriptRootDirectory { $sdkInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricSDKInstallPath $clusterScriptDir = Join-Path -Path $sdkInstallPath -ChildPath "ClusterSetup" return $clusterScriptDir } function RemoveFolder([String]$folderPath) { $pathExists = TestPathRobust($folderPath) if ($pathExists) { cmd /c rmdir /S /Q $folderPath > $null # Even after Remove-Item returns, sometimes the folders are still being # deleted. Sleep for few seconds before we check for existence of path. Start-Sleep -Seconds 5 return (!(TestPathRobust($folderPath))) } return $true } function GetCertificateSetupScriptFilePath { $scriptDir = (GetClusterScriptRootDirectory) $certScript = Join-Path -Path $scriptDir -ChildPath "\Secure\CertSetup.ps1" return $certScript } function InstallCertificates { $certScript = (GetCertificateSetupScriptFilePath) Write-Host "Installing certificates for secure cluster setup..." invoke-expression "& '$certScript' -Install" if (!$?) { Write-Error "Certificate Installation failed." throw } } function CleanExistingCluster([bool]$deleteFolders = $True) { Write-Host "Removing cluster configuration..." Remove-ServiceFabricNodeConfiguration -Force > $null # Wait for fabric processes to exit. Get-Process Fabric -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() } Get-Process FabricGateway -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() } Get-Process FabricHost -ErrorAction Ignore | Foreach-Object { $_.WaitForExit() } if(IsMeshClusterDeployed) { Write-Output "Deleting Docker network and removing firewall rule..." DeleteNetworkAndRemoveFirewallRule } # Clear out the reg key indicating the local cluster node count. Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value "" # Clear out the reg key indicating the isMeshCluster. Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "" $certScript = (GetCertificateSetupScriptFilePath) invoke-expression "& '$certScript' -Clean" Write-Host "Stopping all logman sessions..." logman stop FabricAppInfoTraces > $null logman stop FabricCounters > $null logman stop FabricLeaseLayerTraces > $null logman stop FabricQueryTraces > $null logman stop FabricTraces > $null if($deleteFolders) { CleanClusterDataLogFolders } } function CleanExistingLinuxCluster([bool]$deleteFolders = $True) { Write-Host "Removing Linux Local Cluster" try { if((IsWslRunning) -and (IsGenieRunning)) { wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustercleanup.sh } else { Write-Error "WSL2 and Systemd genie inside linux distribution must be running before cleaning up local cluster." exit 1 } } catch { Write-Error "There were error while cleaning up Linux Cluster." exit 1 } $registryPath='HKLM:\Software\Microsoft\Service Fabric SDK' # Clear out the reg key indicating linux cluster mode. Set-ItemProperty -Path $registryPath -Name LinuxClusterModeEnabled -Value 'false' # Clear out the reg key indicating the local linux cluster node count. Set-ItemProperty -Path $registryPath -Name LocalClusterNodeCount -Value '' Write-Host "Linux Local Service Fabric Cluster removed successfully." } function IsWslRunning { try { $wslHostProcess = Get-Process wslhost if ($wslHostProcess -ne $null -and $wslHostProcess -ne ""){ return $true } Write-Error "WSL is not running." return $false } catch [SystemException] { Write-Error "WSL is not installed or not running." return $false } } function IsGenieRunning { try { $isGenieRunning = wsl genie -r if ($isGenieRunning -eq "running"){ return $true } Write-Error "Genie is not running, please start systemd genie inside linux distribtution to setup or update Linux Cluster." return $false } catch { Write-Error "systemd genie is not installed, please start systemd genie inside linux distribtution to setup or update Linux Cluster. Please refer to (https://docs.microsoft.com/azure/service-fabric/service-fabric-local-linux-cluster-windows-wsl2) for details about setting up Service Fabric Linux Cluster on WSL2 based VM." return $false } } function CleanClusterDataLogFolders { $logFolder = GetFabricLogRootFromRegistry $dataFolder = GetFabricDataRootFromRegistry Write-Output "Cleaning log and data folder..." RemoveFolder $logFolder > $null RemoveFolder $dataFolder > $null } function CleanExistingClusterShallow { # Stop FabricHostSvc PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Stop-Service" "Stopped" 10 5 # Remove Service Fabric Node Configuration try { Remove-ServiceFabricNodeConfiguration -Force > $null } catch [System.Exception] { Write-Warning $_.Exception.ToString() Write-Warning "Remove-ServiceFabricNodeConfiguration throws exceptions" } if(IsMeshClusterDeployed) { Write-Output "Deleting Docker network and removing firewall rule..." DeleteNetworkAndRemoveFirewallRule } # Stop all logman sessions logman stop FabricAppInfoTraces > $null logman stop FabricCounters > $null logman stop FabricLeaseLayerTraces > $null logman stop FabricQueryTraces > $null logman stop FabricTraces > $null } function FabricSetupOperations([string]$operationType) { $runtimeInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricCodePath & "$runtimeInstallPath\FabricSetup.exe" /operation:$operationType } function ConstructManifestFileTemplate([string]$jsonTemplate) { $runtimeInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricCodePath $deploymentmangager= Join-Path -Path $runtimeInstallPath -ChildPath "Microsoft.ServiceFabric.DeploymentManager.dll" [Reflection.Assembly]::LoadFrom($deploymentmangager) > $null $manifestFileTemplate = [Microsoft.ServiceFabric.DeploymentManager.Common.StandaloneUtility]::GetClusterManifestFromJsonConfig($jsonTemplate, "", "") return $manifestFileTemplate } function SelectJsonFileTemplate([bool]$isSecure, [bool]$createOneNodeCluster, [bool]$createMeshCluster = $false) { $scriptDir = (GetClusterScriptRootDirectory) $jsonFileTemplate = $ScriptDir + "\NonSecure" if($isSecure) { $jsonFileTemplate = $ScriptDir + "\Secure" } # If Mesh SDK is installed, use the manifests specific to the mesh cluster if($createMeshCluster -eq $true) { $jsonFileTemplate = $jsonFileTemplate + "_Mesh" } if($createOneNodeCluster) { $jsonFileTemplate = $jsonFileTemplate + "\OneNode" } else { $jsonFileTemplate = $jsonFileTemplate + "\FiveNode" } $jsonFileTemplate = $jsonFileTemplate + "\ClusterManifestTemplate.json" if (!(TestPathRobust($jsonFileTemplate))) { Write-Error "Json template file not found at '$jsonFileTemplate'. Please make sure Service Fabric SDK installed correctly." throw } return $jsonFileTemplate } function InstantiateJsonFromTemplate([string]$jsonFileTemplate, [string]$clusterDataRoot, [string]$clusterLogRoot, [bool]$configureFirewall) { $configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json $setupSetting = $configJson.properties.fabricSettings | where {$_.Name -eq "Setup"} if($setupSetting -eq $null){ $setupSetting = New-Object PSObject -Property @{ name="Setup" parameters = @() } $configJson.properties.fabricSettings += $setupSetting } $dataroot = $setupSetting.parameters | where {$_.Name -eq "FabricDataRoot"} if($dataroot -eq $null) { $parameter = New-Object PSObject -Property @{ name="FabricDataRoot" value=$clusterDataRoot } $setupSetting.parameters += $parameter } else { $dataroot.value = $clusterDataRoot } $logroot = $setupSetting.parameters | where {$_.Name -eq "FabricLogRoot"} if($logroot -eq $null) { $parameter = New-Object PSObject -Property @{ name="FabricLogRoot" value=$clusterLogRoot } $setupSetting.parameters += $parameter } else { $logroot.value = $clusterLogRoot } $skipFirewallConfigurationSetting = $setupSetting.parameters | where {$_.Name -eq "SkipFirewallConfiguration"} $skipFirewallConfiguration = "true" if($configureFirewall) { $skipFirewallConfiguration = "false" } if($skipFirewallConfigurationSetting -eq $null) { $parameter = New-Object PSObject -Property @{ name="SkipFirewallConfiguration" value=$skipFirewallConfiguration } $setupSetting.parameters += $parameter } else { $skipFirewallConfigurationSetting.value = $skipFirewallConfiguration } $parameter = New-Object PSObject -Property @{ name="IsDevCluster" value="true" } $setupSetting.parameters += $parameter $jsonObject = ConvertTo-Json $configJson -Depth 10 $temporaryConfigPath = [System.IO.Path]::GetTempFileName() + ".json" $jsonObject > $temporaryConfigPath Write-Host "The generated json path is $temporaryConfigPath" return $temporaryConfigPath } function IsLocalClusterSetup { try { if($null -eq (Get-ServiceFabricNodeConfiguration -WarningAction SilentlyContinue)) { return $false; } return $true; } catch [System.Exception] { return $false; } } function IsLinuxLocalClusterSetup { try { if('true' -eq (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').LinuxClusterModeEnabled) { return $true; } return $false; } catch [System.Exception] { return $false; } } function IsDirectoryEmpty([string]$dirPath) { if((TestPathRobust($dirPath))) { $dirInfo = Get-ChildItem -Path $dirPath | Measure-Object if($dirInfo.Count -eq 0) { return $True } return $False } return $True; } function EnsureDirectoryCleaned([string]$dirPath) { if (!(RemoveFolder($dirPath))) { Write-Error "Cannot clean up $dirPath fully as references are likely being held to items in it. Please remove those and retry." Write-Warning "Hints: Is some other process holding on to references?" throw } } function GetDefaultClusterRootRelativePath([string]$rootName) { if($rootName -ieq "data") { return "SfDevCluster\Data" } if($rootName -ieq "log") { return "SfDevCluster\Log" } if([System.String]::IsNullOrWhiteSpace($rootName)) { throw } } function ComputeClusterRoot([string]$clusterRoot, [string]$rootName) { if([System.String]::IsNullOrWhiteSpace($clusterRoot)) { $clusterRoot = Join-Path -Path $env:SystemDrive -ChildPath (GetDefaultClusterRootRelativePath($rootName)) } elseif(![System.IO.Path]::IsPathRooted($clusterRoot)) { Write-Error "Invalid path provided for cluster $rootName root: $clusterRoot. Please provide a local full path." throw } elseif(($clusterRoot.Length -eq 2) -or ($clusterRoot.Length -eq 3)) { # The path supplied by user is drive itself (e.g. C: or C:\) $clusterRoot = Join-Path -Path $clusterRoot -ChildPath (GetDefaultClusterRootRelativePath($rootName)) } return $clusterRoot } function GetClusterRootValueFromJson([string]$jsonFileTemplate, [string]$name){ $configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json $setupSetting = $configJson.properties.fabricSettings | where {$_.Name -eq "Setup"} if(($setupSetting -eq $null) -or ($setupSetting.parameters -eq $null)){ return $null } $clusteroot = $setupSetting.parameters | where {$_.Name -eq $name} if($clusteroot -eq $null){ return $null } return [System.Environment]::ExpandEnvironmentVariables($clusteroot.value) } function SetupDataAndLogRoot([string]$clusterDataRoot, [string]$clusterLogRoot, [string] $jsonFileTemplate, [bool]$isAuto = $False) { if([System.String]::IsNullOrWhiteSpace($clusterDataRoot)){ $clusterDataRoot = GetClusterRootValueFromJson -jsonFileTemplate $jsonFileTemplate -name "FabricDataRoot" } if([System.String]::IsNullOrWhiteSpace($clusterLogRoot)){ $clusterLogRoot = GetClusterRootValueFromJson -jsonFileTemplate $jsonFileTemplate -name "FabricLogRoot" } $clusterDataRoot = ComputeClusterRoot -clusterRoot $clusterDataRoot -rootName "data" $clusterLogRoot = ComputeClusterRoot -clusterRoot $clusterLogRoot -rootName "log" Write-Host "" Write-Host "Using Cluster Data Root: $clusterDataRoot" -ForegroundColor Green Write-Host "Using Cluster Log Root: $clusterLogRoot" -ForegroundColor Green Write-Host "" if(!$isAuto) { if(!(IsDirectoryEmpty -dirPath $clusterDataRoot)) { Write-Host "" Write-Warning "The cluster data root ($clusterDataRoot) is not empty. All files and subfolders under it will be deleted." $response = Read-Host -Prompt "Do you want to continue [Y/N]?" if($response -ine "Y") { return @($False) } } if(!(IsDirectoryEmpty -dirPath $clusterLogRoot)) { Write-Host "" Write-Warning "The cluster log root ($clusterLogRoot) is not empty. All files and subfolders under it will be deleted." $response = Read-Host -Prompt "Do you want to continue [Y/N]?" if($response -ine "Y") { return @($False) } } } EnsureDirectoryCleaned $clusterDataRoot EnsureDirectoryCleaned $clusterLogRoot return @($clusterDataRoot, $clusterLogRoot) } function SetupImageStore([string]$clusterDataRoot, [bool]$useImageStoreService) { $ImageStoreConnectionString = "fabric:ImageStore"; if(!$useImageStoreService) { $ImageStoreShare = Join-Path -Path $clusterDataRoot -ChildPath "ImageStoreShare" New-Item "$ImageStoreShare" -type directory -force > $null AddWindowsFabricAcl $ImageStoreShare $ImageStoreConnectionString = "file:" + $ImageStoreShare } return $ImageStoreConnectionString } function GetMachineName([bool]$useMachineName) { $machineName = "localhost"; if ($useMachineName) { $machineName = [System.Net.Dns]::GetHostEntry((Get-CIMInstance Win32_ComputerSystem).DNSHostName).HostName; } return $machineName; } function FindAndReplace([string]$filePath, [string]$toReplace, [string]$newString) { (Get-Content $filePath -Encoding UTF8) | ForEach-Object {$_ -replace $toReplace, $newString } | Set-Content $filePath } function IsLocalClusterRunning { try { $fabricService = Get-Service -Name "FabricHostSvc" if ($fabricService.Status -ne "Running") { return $false; } return $true; } catch [System.Exception] { return $false; } } function DockerNetworkCommandFailed( [bool]$warningOnFail ) { Write-Warning "Unable to communicate with Docker. Validate the following" Write-Warning " Docker is installed on the machine" Write-Warning " Docker service is running" Write-Warning " Docker is configured to run Windows containers" Write-Warning " Open a command prompt and make sure the following command succeeds" Write-Warning " docker network create -d=nat --subnet=`"$NetworkSubnet`" --gateway=`"$NetworkGateway`" $NetworkName" $message = "Unable to communicate with Docker. Visit FAQ at https://aka.ms/sfmesh for details" if ( -not $warningOnFail ) { Write-Error $message throw } else { Write-Warning $message } } function EnsureDockerIsRunningAndCheckVersion( [int] $operationMaxRetryCount = 10, [int] $operationRetryInterval = 10) { # Check if docker service is present Get-service -Name docker -ErrorAction SilentlyContinue if(!$? ) { Write-Error "Docker service not installed/configured to run Windows Containers. Visit FAQ at https://aka.ms/sfmesh for details" throw } # Run a docker command, if it fails Restart docker service. docker version > $null if(!$? ) { Write-Output "Stopping docker service" PerformServiceOperationWithWaitforStatus "docker" "Stop-Service" "Stopped" $operationMaxRetryCount $operationRetryInterval "Unable to restart docker service, Ensure its running before setting up cluster. Visit FAQ at https://aka.ms/sfmesh for details" Write-Output "Starting docker service" PerformServiceOperationWithWaitforStatus "docker" "Start-Service" "Running" $operationMaxRetryCount $operationRetryInterval "Unable to restart docker service, Ensure its running before setting up cluster. Visit FAQ at https://aka.ms/sfmesh for details" # Wait for docker service to be in a state to process commands ExecuteDockerCommand -dockercommandParameters "network ls" -retryCommand $true -warningOnFail $true -dockerOperationMaxRetryCount $operationMaxRetryCount -dockerOperationRetryInterval $operationRetryInterval } # Run the command again and check if docker is configured to run windows containers $versionContent = ExecuteDockerCommand -dockercommandParameters "version" -retryCommand $false if( $versionContent -match "linux") { Write-Error "Docker configured to run Linux containers. Configure it to run Windows Containers. Visit FAQ at https://aka.ms/sfmesh for details" throw } } function ExecuteDockerCommand( [string] $dockercommandParameters, [string] $successStringMatchOnError = "", [bool] $warningOnFail = $false, [bool] $retryCommand = $true, [int] $dockerOperationMaxRetryCount = 10, [int] $dockerOperationRetryInterval = 10) { [int]$dockerOperationRetryCount = 0 $dockerOperationSucceeded = $false $dockerOperationContent = "" $tempErrorFile = [System.IO.Path]::GetTempFileName() #Write-Host "Executing 'docker $dockercommandParameters'" while($dockerOperationRetryCount -lt $dockerOperationMaxRetryCount -and $dockerOperationSucceeded -eq $false) { $dockerOperationContent = docker $dockercommandParameters.Split(" ") 2> $tempErrorFile if( $? ) { $dockerOperationSucceeded = $true break } if( -not $? -and -not [string]::IsNullOrEmpty($successStringMatchOnError) ) { (Get-Content $tempErrorFile -Encoding UTF8) -match $successStringMatchOnError if ( $? ) { $dockerOperationSucceeded = $true break; } } if( -not $retryCommand ) { break } Start-Sleep -s $dockerOperationRetryInterval $dockerOperationRetryCount += 1 } if( -not $dockerOperationSucceeded ) { DockerNetworkCommandFailed $warningOnFail } return $dockerOperationContent } function ExecuteDockerNetworkCommand( [string] $dockercommandParameters, [string] $successStringMatchOnError = "", [bool] $warningOnFail = $false, [bool] $retryCommand = $true) { ExecuteDockerCommand -dockercommandParameters "network $dockercommandParameters" ` -successStringMatchOnError $successStringMatchOnError ` -warningOnFail $warningOnFail ` -retryCommand $retryCommand } function PerformServiceOperationWithWaitforStatus( [string] $serviceName, [string] $operation, [string] $intendedState, [int] $serviceStateMaxRetryCount = 20, [int] $serviceStateRetryInterval = 5, [string] $failureMsg = "") { Write-Host "Performing" $operation "on:" $serviceName ". This may take a few minutes..." & $operation $serviceName -WarningAction SilentlyContinue -ErrorAction SilentlyContinue > $null # Check if IntendedServiceState is achieved [int]$retryCount = 0 while($retryCount++ -le $serviceStateMaxRetryCount) { $serviceState = Get-Service -Name $serviceName if ($serviceState.Status -ne $intendedState) { Start-Sleep -s $serviceStateRetryInterval } else { return; } } if($failureMsg -eq "") { $errorStr = [string]::Format( "Could not perform the operation:{0} on the service:{1}.", $operation, $serviceName) Write-Error $errorStr } else { Write-Error $failureMsg } throw } function CreateNetworkAndAddFirewallRule( [string] $jsonFileTemplate) { # unconditionally delete the firewall rule Remove-NetFirewallRule -Name "SF Container to host" -ErrorAction Ignore # check if docker is configured to run windows containers EnsureDockerIsRunningAndCheckVersion # get network configuration information from template file $configJson = Get-Content $jsonFileTemplate -Raw -Encoding UTF8 | ConvertFrom-Json $hostingSetting = $configJson.properties.fabricSettings | Where-Object {$_.Name -eq "Hosting"} if( $hostingSetting -eq $null ) { Write-Error "Hosting section has to be specified in ClusterManifestTemplate.json" throw } $localNatIpProviderNetworkName = $hostingSetting.parameters | Where-Object {$_.Name -eq "LocalNatIpProviderNetworkName"} if( $localNatIpProviderNetworkName.value -eq $null ) { Write-Error "LocalNatIpProviderNetworkName has to be specified in ClusterManifestTemplate.json under Hosting." throw } else { $NetworkName = $localNatIpProviderNetworkName.value if( $NetworkName -eq $null ) { Write-Error "LocalNatIpProviderNetworkName in ClusterManifestTemplate.json cannot be empty" throw } Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalNatIpProviderNetworkName -Value $NetworkName } $localNatIpProviderNetworkRange = $hostingSetting.parameters | Where-Object {$_.Name -eq "LocalNatIpProviderNetworkRange"} if( $localNatIpProviderNetworkRange.value -eq $null ) { Write-Error "LocalNatIpProviderNetworkRange has to be specified in ClusterManifestTemplate.json under Hosting." throw } else { $NetworkSubnet = $localNatIpProviderNetworkRange.value if ( $NetworkSubnet -match '^(([0-9]{1,3}\.){3})[0-9]{1,3}(\/([0-9]|[1-2][0-9]|3[0-2]))?$' ) { $val = $Matches[1] + "1" } else { Write-Error "LocalNatIpProviderNetworkRange specified is not a valid subnet range. Please enter a valid CIDR format subnet." throw } $NetworkGateway = $val } # unconditionally try to delete the network $ignore = ExecuteDockerNetworkCommand -dockercommandParameters "rm $NetworkName" -successStringMatchOnError "No such network:" # try to create the network $ignore = ExecuteDockerNetworkCommand -dockercommandParameters "create -d=nat --subnet=`"$NetworkSubnet`" --gateway=`"$NetworkGateway`" $NetworkName" # inspect to check if the network was created $inspectContent = ExecuteDockerNetworkCommand -dockercommandParameters "inspect $NetworkName" # some additional checks to see if create succeeded $inspectSubnet = ($inspectContent | Convertfrom-Json)[0].IPAM.Config.Subnet $inspectGatewayIP = ($inspectContent | Convertfrom-Json)[0].IPAM.Config.Gateway if( $inspectSubnet -ne $NetworkSubnet -or $inspectGatewayIP -ne $NetworkGateway) { DockerNetworkCommandFailed $false } New-NetFirewallRule -Name "SF Container to host" -DisplayName "SF Container to host" -LocalAddress $NetworkGateway -RemoteAddress $NetworkSubnet > $null } function DeleteNetworkAndRemoveFirewallRule { # unconditionally delete the firewall rule Remove-NetFirewallRule -Name "SF Container to host" -ErrorAction Ignore $NetworkName = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').LocalNatIpProviderNetworkName if( $NetworkName -eq $null -or $NetworkName -eq "" ) { return } EnsureDockerIsRunningAndCheckVersion # unconditionally try to delete the network $ignore = ExecuteDockerNetworkCommand -dockercommandParameters "rm $NetworkName" -successStringMatchOnError "No such network:" -warningOnFail $true # Clear out the reg key indicating the LocalNatIpProviderNetworkName. Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalNatIpProviderNetworkName -Value "" } function PrepareClusterManifest([string]$manifestFileTemplate, [string]$imageStoreConnectionString, [string]$machineName, [bool]$isSecure = $False, [bool]$isMeshCluster = $False) { $manifestFile = Join-Path -Path $env:TEMP -ChildPath "$env:computername-Server-ScaleMin.xml" Copy-Item $manifestFileTemplate $manifestFile -Force FindAndReplace -filePath $manifestFile -toReplace "ComputerFullName" -newString $machineName FindAndReplace -filePath $manifestFile -toReplace "ImageStoreConnectionStringPlaceHolder" -newString $imageStoreConnectionString if ($isSecure -or $isMeshCluster) { $srcStoreScope = "LocalMachine" $srcStoreName = "My" $srcStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $srcStoreName, $srcStoreScope $srcStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly) $cert = $srcStore.certificates -match "CN=ServiceFabricDevClusterCert" if($isSecure) { # Replace cluster cert thumbprint. FindAndReplace -filePath $manifestFile -toReplace "ServiceFabricDevClusterCertParameter" -newString $cert.Thumbprint.ToString() } # Replace EncryptionCertificateThumbprint used by SecretService, this certificate is needed both for secured and unsecured clusters. FindAndReplace -filePath $manifestFile -toReplace "EncryptionCertificateThumbprintParameter" -newString $cert.Thumbprint.ToString() $srcStore.Close() } Test-ServiceFabricClusterManifest -ClusterManifestPath "$manifestFile" > $null if (!$?) { Write-Error "Could not validate cluster manifest '$manifestFile'" throw } return $manifestFile } function DeployNodeConfiguration([string]$clusterDataRoot, [string]$clusterLogRoot, [bool]$isSecure = $False, [bool]$useMachineName = $True, [bool]$createOneNodeCluster = $False, [bool]$configureFirewall = $False, [bool]$createMeshCluster = $False, [bool]$useImageStoreService = $False) { $jsonFileTemplate = SelectJsonFileTemplate -isSecure $isSecure -createOneNodeCluster $createOneNodeCluster -createMeshCluster $createMeshCluster $jsonTemplate = InstantiateJsonFromTemplate -jsonFileTemplate $jsonFileTemplate -clusterDataRoot $clusterDataRoot -clusterLogRoot $clusterLogRoot $configureFirewall $manifestFileTemplate = ConstructManifestFileTemplate -jsonTemplate $jsonTemplate if($createMeshCluster -eq $true) { Write-Output "Creating Docker network and adding firewall rule..." CreateNetworkAndAddFirewallRule -jsonFileTemplate $jsonFileTemplate } # Use Image Store Service when configuring firewall. $imageStoreConnectionString = SetupImageStore -clusterDataRoot $clusterDataRoot -useImageStoreService $useImageStoreService $machineName = GetMachineName -useMachineName $useMachineName $manifestFile = PrepareClusterManifest $manifestFileTemplate $imageStoreConnectionString $machineName $isSecure $createMeshCluster # Stop Fabric Host Service (if running just in case) PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Stop-Service" "Stopped" 10 5 New-ServiceFabricNodeConfiguration -ClusterManifest "$manifestFile" -FabricDataRoot "$clusterDataRoot" -FabricLogRoot "$clusterLogRoot" -RunFabricHostServiceAsManual if (!$?) { Write-Error "Could not create Node configuration for '$manifestFile'" throw } if($createOneNodeCluster) { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value 1 if($createMeshCluster -eq $false) { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "false" } else { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "true" } } else { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name LocalClusterNodeCount -Value 5 if($createMeshCluster -eq $false) { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "false" } else { Set-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK' -Name IsMeshCluster -Value "true" } } # Saves Connection Parameters in dataRoot for REST based powershell to consume. SaveConnectionParameters -dataRoot $clusterDataRoot -isSecure $isSecure -useMachineName $useMachineName } function StartLocalCluster { # Start Service Fabric on this Node PerformServiceOperationWithWaitforStatus "FabricHostSvc" "Start-Service" "Running" 60 10 } function GetConnectionParameters([bool]$isSecure = $False, [bool]$useMachineName = $False) { [HashTable]$connParams = @{} $machineName = GetMachineName -useMachineName $useMachineName $connectionEndpoint = [string]::Concat($machineName, ":19000") $connParams.Add("ConnectionEndpoint", $connectionEndpoint) if ($isSecure) { $connParams.Add("X509Credential", $True) $connParams.Add("ServerCommonName", "ServiceFabricDevClusterCert") $connParams.Add("FindType", 'FindBySubjectName') $connParams.Add("FindValue", 'CN=ServiceFabricDevClusterCert') $connParams.Add("StoreLocation", 'LocalMachine') $connParams.Add("StoreName", "MY") } return $connParams } function SaveConnectionParameters([string] $dataRoot, [bool]$isSecure = $False, [bool]$useMachineName = $False) { # Saves Connection Parameters in dataRoot for REST based powershell to consume. $connectInfoFile = $dataRoot + "\ServiceFabricLocalClusterConnectionParams.json" $httpConnectionEndpoint = "http://" + $machineName + ":19080" if ($isSecure) { $httpConnectionEndpoint = "https://" + $machineName + ":19080" } $connParams = GetConnectionParameters -isSecure $isSecure -useMachineName $useMachineName $connParams.Add("HttpConnectionEndpoint", $httpConnectionEndpoint) $connParams | ConvertTo-Json -Depth 10 | Out-File $connectInfoFile } function TryConnectToCluster([HashTable]$connParams, [int]$waitTime) { [int]$connRetryInterval = 10 [int]$maxExpConnTime = $waitTime [int]$timeSpentConn = 0 $connParams.Add("TimeoutSec", $connRetryInterval) $connParams.Add("WarningAction", 'SilentlyContinue') $IsConnSuccesfull = $False Write-Host "" Write-Host "Waiting for Service Fabric Cluster to be ready. This may take a few minutes..." do { try { [void](Connect-ServiceFabricCluster @connParams) #Test the connection $testWarnings = @() $IsConnSuccesfull = (Test-ServiceFabricClusterConnection -TimeoutSec 5 -WarningAction SilentlyContinue -WarningVariable testWarnings) if (($IsConnSuccesfull -eq $True) -and ($testWarnings.Count -eq 0)) { Write-Host "Local Cluster ready status: 100% completed." return } } catch [System.Exception] { # Retry } if($timeSpentConn -ge $maxExpConnTime) { Write-Warning "Service Fabric Cluster is taking longer than expected to connect." return } Start-Sleep -s $connRetryInterval # Print progress and retry $timeSpentConn += $connRetryInterval $progress = [int]($timeSpentConn * 100 / $maxExpConnTime) Write-Host "Local Cluster ready status: $progress% completed." } while($True) } function CheckNamingServiceReady([HashTable]$connParams, [int]$waitTime) { CheckServiceReady $connParams "fabric:/System/NamingService" $waitTime } function CheckServiceReady([HashTable]$connParams, [string]$serviceName, [int]$waitTime) { [int]$RetryInterval = 10 [int]$maxExpTime = $waitTime [int]$timeSpent = 0 Write-Host "" Write-Host "Waiting for $serviceName to be ready. This may take a few minutes..." [void](Connect-ServiceFabricCluster @connParams) do { try { $nsPartitions = Get-ServiceFabricPartition -ServiceName $serviceName $isReady = $true foreach ($partition in $nsPartitions) { if(!$partition.PartitionStatus.Equals([System.Fabric.Query.ServicePartitionStatus]::Ready)) { $isReady = $false break } } if($isReady) { Write-Host "$serviceName is ready now..." Write-Host "" return; } } catch [System.Exception] { # Retry } if($timeSpent -ge $maxExpTime) { Write-Warning "$serviceName is taking longer than expected to be ready..." return } Start-Sleep -s $RetryInterval # Print progress and retry $timeSpent += $RetryInterval $progress = [int]($timeSpent * 100 / $maxExpTime) Write-Host "$serviceName ready status: $progress% completed." } while($true) } function CleanTicketFiles { $clusterDataRoot = GetFabricDataRootFromRegistry $tktFileDirRelPath = "Fabric\Work" $firstLevelDirs = Get-ChildItem -Path $clusterDataRoot -Directory ForEach($dir in $firstLevelDirs) { $ticketFileDir = Join-Path -Path $dir.FullName -ChildPath $tktFileDirRelPath if(Test-Path($ticketFileDir)) { Get-ChildItem -Path $ticketFileDir -File -Filter *.tkt | ForEach ($_) { Remove-Item $_.FullName -ErrorAction SilentlyContinue } } } } function LaunchLocalClusterManager { Write-Output "Launching Service Fabric Local Cluster Manager..." Write-Output "You can use Service Fabric Local Cluster Manager (system tray application) to manage your local dev cluster." Start-Process "ServiceFabricLocalClusterManager.exe" } function DeployAddonService ([HashTable]$connParams, [string]$appName, [string]$nuPkgName, [int]$waitTime, [HashTable]$appParams, [string]$nugetRoot) { $version = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric').FabricVersion # if add on service not present in the cluster if(!(IsApplicationDeployed $appName)) { Write-Host "Deploying Addon Service:$appName in the cluster..." $tempAppDir = $env:temp + "\$appName" $tempAppPackage = $tempAppDir + "\$appName" Remove-Item $tempAppDir -Recurse -ErrorAction Ignore New-Item -ItemType directory -Path $tempAppDir $srcNugetPath = (Get-ChildItem -Path $nugetRoot | where-object {$_.Name -match $nuPkgName }).FullName #extract nuget at $tempAppDir location Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory($srcNugetPath,$tempAppDir); # deploy service from temp location Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $tempAppPackage -ShowProgress -CompressPackage Register-ServiceFabricApplicationType $appName $appType = $appName+"Type" New-ServiceFabricApplication fabric:/$appName $appType $version -ApplicationParameter $appParams # wait for service ready CheckServiceReady $connParams "fabric:/$appName/Service" $waitTime Remove-Item -Path $tempAppDir -Recurse -Force } else { Write-Host "Addon Service:$appName already deployed in the cluster..." } } function DeployAddonServices ([HashTable]$connParams, [int]$waitTime, [bool]$oneNodeCluster) { # This function is for deploying any addon services needed for this cluster. # This feature will be repleaced with Optional Components as the model for shipping addons going forwards. if(IsMeshSDKInstalled) { [void](Connect-ServiceFabricCluster @connParams) # App parameters: $InstanceCount = 1 $ListenPort = 19100 $nugetRoot = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricMeshToolsPath + "\AddonServices" $appParams = @{"InstanceCount" = "$InstanceCount"; "ListenPort" = "$ListenPort" } DeployAddonService $connParams "AzureFilesVolumePlugin" "Microsoft.ServiceFabric.AzureFiles.VolumePlugin" $waitTime $appParams $nugetRoot } } function IsMeshSDKInstalled { $retVal = (Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Service Fabric SDK').FabricMeshSDKVersion if($retVal -ne $null) { return $true } else { return $false } } function IsMeshClusterDeployed { $keyValue = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').IsMeshCluster if($keyValue -match "true") { return $true } else { return $false } } function IsApplicationDeployed([string]$appName) { $retVal = Get-ServiceFabricApplication -ApplicationName fabric:/$appName if($retVal -ne $null) { return $true } return $false } function DeployLinuxCluster([string]$clusterDataRoot, [string]$linuxDistribution, [bool]$createOneNodeCluster = $False) { Write-Host "Setting up Linux Local Cluster..." -ForegroundColor Green $sdkRegistryPath='HKLM:\Software\Microsoft\Service Fabric SDK' try { if((IsWslRunning) -and (IsGenieRunning)) { if($createOneNodeCluster) { wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustersetup.sh --createonenodecluster Set-ItemProperty -Path $sdkRegistryPath -Name LocalClusterNodeCount -Value 1 } else { wsl genie -c sudo /opt/microsoft/sdk/servicefabric/common/clustersetup/devclustersetup.sh Set-ItemProperty -Path $sdkRegistryPath -Name LocalClusterNodeCount -Value 5 } } else { Write-Error "WSL2 in Windows host and Systemd genie inside linux guest distribution must be running before setting up local cluster. Please refer to (https://docs.microsoft.com/azure/service-fabric/service-fabric-local-linux-cluster-windows-wsl2) for details about setting up Service Fabric Linux Cluster on WSL2 based VM." exit 1 } } catch { Write-Error "There were error while setting up Linux Cluster." exit 1 } Set-ItemProperty -Path $sdkRegistryPath -Name LinuxClusterModeEnabled -Value 'true' # Connect-ServiceFabricCluster cmdlet loads config from FabricHostSettings.xml. Copying this ensures that this cmdlet connects to # linux local cluster without connection endpoint $fabricSettingsPath = "\\wsl$\" + $linuxDistribution + "\home\sfuser\sfdevcluster\data\FabricHostSettings.xml" if(Test-Path $fabricSettingsPath) { Copy-Item $fabricSettingsPath $clusterDataRoot } else { Write-Error "$fabricSettingsPath doesn't exist and is not copied to $clusterDataRoot. This will break Connect-ServiceFabricCluster cmdlet and Visual Studio Integration for linux local cluster." exit 1 } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAf46jbFjK57ql # 9bIgfHI4BsuLJ6N4MCyzlZg28UEal6CCDYUwggYDMIID66ADAgECAhMzAAADTU6R # phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ # Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd # j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k # bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x # zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH # g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD # YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT # 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq # 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY # 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN # fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv # XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE # usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH # Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z # ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab # rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA # A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIM/A # buTckETF/vu0wC5Pw4rW3WRwqgoS8XAzL84LM8B0MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEANHP0rMFc1X2d389I0pRH0OUrBKQEVH8kehGA # fKtHJa5rqsm8kvhBuYpdGut0+KaAzQtCZqRi64pHrjqDCMDI9VVMqLf0urxzLWY6 # cn2Pj9vpP7NtUSVS64k3Tusi9XJ/gsy1KQwUZE+PnrtEqPD3hQ7qZHMdnJS5KloG # KUKxps7s6c6HqbLpQ5CxukpP7S8wWOrOs+6lkbIb0e+Kz6RcqMXimBfuPVNpaUhF # wd4vdUzLNAFozCzAF34a9VGGb8kg+tjUaMK1F65nPIjeaZEiD5Av1ljOec0KNSNG # bXwdX3SpFtOlo7dpzeF1vKt5cuLdc4RXUE5oTa0UENiM0wmjVaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCjjoXZ6hYnG3H6w5R61f8pPwLdtJbDUGJI # +KGNCeXJ3gIGZSid4J4xGBMyMDIzMTAxNzE4MjUzMS42NDJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAAB # AAAB1DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybW # cSAbu8FLwTEtOvw3uXMpa1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4 # CpXB1Hwn1YYovuYujoQV9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyyS # vjwPvZuxH8RNcOOB8ABDhJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1 # F3lt7Ni47pJMGMLqZQCK7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQ # P/7c7oPJPDFgpbGB2HRJaE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1Ls # JmFWJHbqGr6o0irW7IqDkf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBk # rmil0H/tv3HYyE6A490ZFEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/ # ZGHJ2cbuIer9umQYu/Fz1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qm # YRymjDmpfzZvfvGBGUbOpx+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuN # X1Tpz4KZLM8GlzZLje3aHfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/ # wHCt4HyXW4WgTGPizyExTQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6 # EoB5Hedcsru0DHZJMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdR # hYlZ9Bk4/bLzLOzq+wcC7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL # 4PizKnStLDBsWT+ds1hayNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04 # PGjcFhH1gGRphz+tcDNK/CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcT # V9W13cm2FD5F/XWO37Ti+G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40 # YIkTNnuco6ny7vEBmWFjcr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rv # EQ/PUJi3popYsrQKuogphdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHh # eQNd/a3X/2zpSwEROOcy1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+R # XUB4A6UL1E1Xjtzr/b9qz9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYA # TVI2lwL9QDSEt8F0RW6LekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71Hyil # telaMhRUsNVkaKzAJrUoESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy # 3vUDJpjUTYLtaTWkQtz6UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQAtM12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6NkK0TAi # GA8yMDIzMTAxNzEzMjk1M1oYDzIwMjMxMDE4MTMyOTUzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDo2QrRAgEAMAcCAQACAgxjMAcCAQACAhLaMAoCBQDo2lxRAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBADBGHzvjpypDTUrk11BX/Rug7BI6 # pHuLxXSv/Ru4Mi48ICirudS0rxwEyoS8dO6cjgjvyidJe0/HXEf9nHADp/xO+TBb # oP033gI/DGoBaAlcx+fObRAmP+2K2u6mLLfRcHt1ZjxFy8PVMVAwrpqasMo2xEOg # 10P4cimz0BAsICF9zs4qVuVAg7vIS7gFrOS3J7zy0IvLtz+bTKheCvzTbjaiPR+y # Fsn53zMuEho0sKz4+aqq4c/4zcxkK3JnLQSTsAUYNNewVcbU9NKaaWmIbyjQ0v2T # T2qmrrQbKoQ8PAt3GFpGxTpXaJYHVcV3f8hohvgLLZ+L4vAkNe2scVW4654xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdTk # 6QMvwKxprAABAAAB1DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAIEnirKxorekedAO7fmgIAqcMQ # 7Wic6Fd0RBTCrw0txTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzqh/rY # FKXOlzvWS5xCtPi9aU+fBUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQglSBccjx5 # 9C5sMkuCtpoIozrgkg44I70ey15asV3Va2MwDQYJKoZIhvcNAQELBQAEggIAOGY9 # lthFN7Bggs0g+eYikFeJeZzqUikyF2jo9oPlctLCHVySJyhyiPRv75YOJgzqbU6x # IBqAkdPOlK7YUFJmxmLidvRPylmxwDxJ0RrLTKobvc73x9NPjt/McZSPyDUZH3FJ # bMbmk1zvy8ZTTMN37oz7Jx63bIGmSaqy1JSMJziei4mSDtlSSBn5SjG09+q/PDUy # PSRR7xHU28dhydv/WiQN7uGYRBVmkXFTRaQc/v0OYGFk2jG4IjOdnbY2C1kCp9Pd # ko9ymUaPqhkx9asaXQlayLXPN/kpvHeMoxEkLGxochRKUqrTU+wM0DWZIgUExrcb # SZJb1B59lnB5WxjeGxXKg70MxTpze3rr4wX88Zv5E/fjkvsBkm8NNCHYtqbDBCQd # O3sLAPNOvWg8Pgchbl4Bl0soRG1gNkgJakuqK6oleOst0+3Up5iWysUEB+S2Is+2 # 2de2yvJPf4p2LEEGpiOJACsmzcQIrwUb+HwWGD8UhXTHc6ebLzF+I9GVlZwNv4yp # a2Ij6bOLjWl/SzZyKl9phyGhERHy6KcLO1ZknwlDSorU3CBwnYLQMixT57Zr4BaN # 9YU2h1Bt15rPeSJ8i1cULJRIViYXggna20Ydz7/yr/+3knJXAGaQTmqJGcNvW6Ce # YBvSzVTxSfsSj46qosKwTOMLZ0OQYKR7kxwDOlo= # SIG # End signature block
combined_dataset/train/non-malicious/LibraryMSCS_1.ps1
LibraryMSCS_1.ps1
# ------------------------------------------------------------------------ ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Defines functions for working with Microsoft Cluster Service (MSCS) ### </Description> ### <Usage> ### . ./LibraryMSCS.ps1 ### </Usage> ### </Script> # ------------------------------------------------------------------------ ####################### function Get-Cluster { param($cluster) gwmi -class "MSCluster_Cluster" -namespace "root\\mscluster" -computername $cluster } #Get-Cluster ####################### function Get-ClusterName { param($cluster) Get-Cluster $cluster | select -ExpandProperty name } #Get-ClusterName ####################### function Get-ClusterNode { param($cluster) gwmi -class MSCluster_Node -namespace "root\\mscluster" -computername $cluster | add-member -pass NoteProperty Cluster $cluster } #Get-ClusterNode ####################### function Get-ClusterSQLVirtual { param($cluster) gwmi -class "MSCluster_Resource" -namespace "root\\mscluster" -computername $cluster | where {$_.type -eq "SQL Server"} | Select @{n='Cluster';e={$cluster}}, Name, State, @{n='VirtualServerName';e={$_.PrivateProperties.VirtualServerName}}, @{n='InstanceName';e={$_.PrivateProperties.InstanceName}}, ` @{n='ServerInstance';e={("{0}\\{1}" -f $_.PrivateProperties.VirtualServerName,$_.PrivateProperties.InstanceName).TrimEnd('\\')}}, ` @{n='Node';e={$(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($_.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name)}} } #Get-ClusterSQLVirtual ####################### function Get-ClusterNetworkName { param($cluster) gwmi -class "MSCluster_Resource" -namespace "root\\mscluster" -computername $cluster | where {$_.type -eq "Network Name"} | Select @{n='Cluster';e={$cluster}}, Name, State, @{n='NetworkName';e={$_.PrivateProperties.Name}}, ` @{n='Node';e={$(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($_.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name)}} } #Get-ClusterNetworkName ####################### function Get-ClusterResource { param($cluster) gwmi -ComputerName $cluster -Namespace "root\\mscluster" -Class MSCluster_Resource | add-member -pass NoteProperty Cluster $cluster | add-member -pass ScriptProperty Node ` { gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($this.Name)'} WHERE AssocClass = MSCluster_NodeToActiveResource" | Select -ExpandProperty Name } | add-member -pass ScriptProperty Group ` { gwmi -ComputerName $cluster -Namespace "root\\mscluster" -query "ASSOCIATORS OF {MSCluster_Resource.Name='$($this.Name)'} WHERE AssocClass = MSCluster_ResourceGroupToResource" | Select -ExpandProperty Name } } #Get-ClusterResource ####################### function Get-ClusterGroup { param($cluster) gwmi -class MSCluster_ResourceGroup -namespace "root\\mscluster" -computername $cluster | add-member -pass NoteProperty Cluster $cluster | add-member -pass ScriptProperty Node ` { gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_ResourceGroup.Name='$($this.Name)'} WHERE AssocClass = MSCluster_NodeToActiveGroup" | Select -ExpandProperty Name } | add-member -pass ScriptProperty PreferredNodes ` { @(,(gwmi -namespace "root\\mscluster" -computerName $cluster -query "ASSOCIATORS OF {MSCluster_ResourceGroup.Name='$($this.Name)'} WHERE AssocClass = MSCluster_ResourceGroupToPreferredNode" | Select -ExpandProperty Name)) } } #Get-ClusterGroup
combined_dataset/train/non-malicious/3712.ps1
3712.ps1
function Test-AzureRmIotHubRoutingLifecycle { $azureStorageResourceGroupName = 'pshardcodedrg1234' $azureStorageSubscriptionId = '91d12660-3dec-467a-be2a-213b5544ddc0' $ascConnectionString = 'DefaultEndpointsProtocol=https;AccountName=pshardcodedstorage1234;AccountKey=W1ujKNLtPmMtaNqZfOCUU5cnYMI8bQeF9ODce4riISyT2RSXiIxcwuwQhzCmIuwPWi82ParLfbq1bOF5ypUnPw==;EndpointSuffix=core.windows.net' $containerName1 = 'container1' $containerName2 = 'container2' $Location = Get-Location "Microsoft.Devices" "IotHubs" "WEST US 2" $IotHubName = getAssetName $ResourceGroupName = getAssetName $namespaceName = getAssetName 'eventHub' $eventHubName = getAssetName $authRuleName = getAssetName $endpointName = getAssetName $endpointName1 = getAssetName $endpointName2 = getAssetName $routeName = getAssetName $enrichmentName = getAssetName $enrichmentValue = getAssetName $enrichmentUpdatedValue = getAssetName $endpoints = @($endpointName1,$endpointName2) $Sku = "S1" $EndpointTypeEventHub = [Microsoft.Azure.Commands.Management.IotHub.Models.PSEndpointType] "EventHub" $EndpointTypeAzureStorage = [Microsoft.Azure.Commands.Management.IotHub.Models.PSEndpointType] "AzureStorageContainer" $RoutingSourceTwinChangeEvents = [Microsoft.Azure.Commands.Management.IotHub.Models.PSRoutingSource] "TwinChangeEvents" $RoutingSourceDeviceMessages = [Microsoft.Azure.Commands.Management.IotHub.Models.PSRoutingSource] "DeviceMessages" $resourceGroup = New-AzResourceGroup -Name $ResourceGroupName -Location $Location $iothub = New-AzIotHub -Name $IotHubName -ResourceGroupName $ResourceGroupName -Location $Location -SkuName $Sku -Units 1 $eventHubNamespace = New-AzEventHubNamespace -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -Location $Location Wait-Seconds 15 Assert-True {$eventHubNamespace.ProvisioningState -eq "Succeeded"} $regexMatches = $eventHubNamespace.Id | Select-String -Pattern '^/subscriptions/(.*)/resourceGroups/(.*)/providers/(.*)$' $eventHubSubscriptionId = $regexMatches.Matches.Groups[1].Value $eventHubResourceGroup = $regexMatches.Matches.Groups[2].Value $msgRetentionInDays = 3 $partionCount = 2 $eventHub = New-AzEventHub -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -MessageRetentionInDays $msgRetentionInDays -PartitionCount $partionCount $rights = "Listen","Send" $authRule = New-AzEventHubAuthorizationRule -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -AuthorizationRuleName $authRuleName -Rights $rights $keys = Get-AzEventHubKey -ResourceGroup $ResourceGroupName -NamespaceName $namespaceName -EventHubName $eventHubName -AuthorizationRuleName $authRuleName $ehConnectionString = $keys.PrimaryConnectionString $routingEndpoints = Get-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $routingEndpoints.Count -eq 0} $newRoutingEndpoint = Add-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName -EndpointType $EndpointTypeEventHub -EndpointResourceGroup $eventHubResourceGroup -EndpointSubscriptionId $eventHubSubscriptionId -ConnectionString $ehConnectionString Assert-True { $newRoutingEndpoint.ResourceGroup -eq $eventHubResourceGroup} Assert-True { $newRoutingEndpoint.SubscriptionId -eq $eventHubSubscriptionId} Assert-True { $newRoutingEndpoint.Name -eq $endpointName} $newRoutingEndpoint1 = Add-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName1 -EndpointType $EndpointTypeAzureStorage -EndpointResourceGroup $azureStorageResourceGroupName -EndpointSubscriptionId $azureStorageSubscriptionId -ConnectionString $ascConnectionString -ContainerName $containerName1 -Encoding json Assert-True { $newRoutingEndpoint1.Name -eq $endpointName1} Assert-True { $newRoutingEndpoint1.ResourceGroup -eq $azureStorageResourceGroupName} Assert-True { $newRoutingEndpoint1.SubscriptionId -eq $azureStorageSubscriptionId} Assert-True { $newRoutingEndpoint1.Encoding -eq "json"} $newRoutingEndpoint2 = Add-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName2 -EndpointType $EndpointTypeAzureStorage -EndpointResourceGroup $azureStorageResourceGroupName -EndpointSubscriptionId $azureStorageSubscriptionId -ConnectionString $ascConnectionString -ContainerName $containerName2 Assert-True { $newRoutingEndpoint2.Name -eq $endpointName2} Assert-True { $newRoutingEndpoint2.ResourceGroup -eq $azureStorageResourceGroupName} Assert-True { $newRoutingEndpoint2.SubscriptionId -eq $azureStorageSubscriptionId} Assert-True { $newRoutingEndpoint2.Encoding -eq "avro"} $updatedRoutingEndpoints = Get-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $updatedRoutingEndpoints.Count -eq 3} Assert-True { $updatedRoutingEndpoints[0].Name -eq $endpointName} Assert-True { $updatedRoutingEndpoints[0].EndpointType -eq $EndpointTypeEventHub} Assert-True { $updatedRoutingEndpoints[1].Name -eq $endpointName1} Assert-True { $updatedRoutingEndpoints[1].EndpointType -eq $EndpointTypeAzureStorage} Assert-True { $updatedRoutingEndpoints[2].Name -eq $endpointName2} Assert-True { $updatedRoutingEndpoints[2].EndpointType -eq $EndpointTypeAzureStorage} $enrichments = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $enrichments.Count -eq 0} $newEnrichment = Add-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Value $enrichmentValue -Endpoint $endpointName1 Assert-True { $newEnrichment.Key -eq $enrichmentName} Assert-True { $newEnrichment.Value -eq $enrichmentValue} Assert-True { $newEnrichment.EndpointNames -eq $endpointName1} $enrichments = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $enrichments.Count -eq 1} $enrichment = Get-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName Assert-True { $enrichment.Key -eq $enrichmentName} Assert-True { $enrichment.Value -eq $enrichmentValue} Assert-True { $enrichment.EndpointNames -eq $endpointName1} $updatedEnrichment = Set-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Value $enrichmentUpdatedValue Assert-True { $updatedEnrichment.Key -eq $enrichmentName} Assert-True { $updatedEnrichment.Value -eq $enrichmentUpdatedValue} Assert-True { $updatedEnrichment.EndpointNames -eq $endpointName1} $updatedEnrichment = Set-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Endpoint $endpointName1,$endpointName2 Assert-True { $updatedEnrichment.Key -eq $enrichmentName} Assert-True { $updatedEnrichment.Value -eq $enrichmentUpdatedValue} Assert-True { $updatedEnrichment.EndpointNames.Count -eq 2} Assert-True { $updatedEnrichment.EndpointNames[0] -eq $endpointName1} Assert-True { $updatedEnrichment.EndpointNames[1] -eq $endpointName2} $result = Remove-AzIotHubMessageEnrichment -ResourceGroupName $ResourceGroupName -Name $IotHubName -Key $enrichmentName -Passthru Assert-True { $result } $result = Remove-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName1 -Passthru Assert-True { $result } $result = Remove-AzureRmIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName2 -Passthru Assert-True { $result } $updatedRoutingEndpoints = Get-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $updatedRoutingEndpoints.Count -eq 1} Assert-True { $updatedRoutingEndpoints[0].ResourceGroup -eq $eventHubResourceGroup} Assert-True { $updatedRoutingEndpoints[0].SubscriptionId -eq $eventHubSubscriptionId} Assert-True { $updatedRoutingEndpoints[0].Name -eq $endpointName} $routes = Get-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $routes.Count -eq 0} $newRoute = Add-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Source $RoutingSourceDeviceMessages -EndpointName $endpointName Assert-True { $newRoute.Name -eq $routeName} Assert-True { $newRoute.Source -eq $RoutingSourceDeviceMessages} Assert-True { $newRoute.EndpointNames -eq $endpointName} Assert-False { $newRoute.IsEnabled } $routes = Get-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName Assert-True { $routes.Count -eq 1} Assert-True { $routes[0].Name -eq $routeName} Assert-True { $routes[0].Source -eq $RoutingSourceDeviceMessages} Assert-True { $routes[0].EndpointNames -eq $endpointName} Assert-False { $routes[0].IsEnabled } $updatedRoute = Set-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Source $RoutingSourceTwinChangeEvents -Enabled Assert-True { $updatedRoute.Name -eq $routeName} Assert-True { $updatedRoute.Source -eq $RoutingSourceTwinChangeEvents} Assert-True { $updatedRoute.EndpointNames -eq $endpointName} Assert-True { $updatedRoute.IsEnabled } $testRouteOutput = Test-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -Source $RoutingSourceTwinChangeEvents Assert-True { $testRouteOutput.Count -eq 1} Assert-True { $testRouteOutput[0].Name -eq $routeName} Assert-True { $testRouteOutput[0].Source -eq $RoutingSourceTwinChangeEvents} Assert-True { $testRouteOutput[0].EndpointNames -eq $endpointName} Assert-True { $testRouteOutput[0].IsEnabled } $result = Remove-AzIotHubRoute -ResourceGroupName $ResourceGroupName -Name $IotHubName -RouteName $routeName -Passthru Assert-True { $result } $result = Remove-AzIotHubRoutingEndpoint -ResourceGroupName $ResourceGroupName -Name $IotHubName -EndpointName $endpointName -Passthru Assert-True { $result } Remove-AzIotHub -ResourceGroupName $ResourceGroupName -Name $IotHubName }
combined_dataset/train/non-malicious/3631.ps1
3631.ps1
function Test-CreateServerCommunicationLink { $locationOverride = "North Europe" $serverVersion = "12.0" $rg = Create-ResourceGroupForTest $locationOverride $server1 = Create-ServerForTest $rg $locationOverride $server2 = Create-ServerForTest $rg $locationOverride try { $linkName = Get-ElasticPoolName $ep1 = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName ` -LinkName $linkName -PartnerServer $server2.ServerName Assert-NotNull $ep1 Assert-AreEqual $linkName $ep1.Name Assert-AreEqual $server2.ServerName $ep1.PartnerServer } finally { Remove-ResourceGroupForTest $rg } } function Test-GetServerCommunicationLink { $locationOverride = "North Europe" $serverVersion = "12.0" $rg = Create-ResourceGroupForTest $locationOverride $server1 = Create-ServerForTest $rg $locationOverride $server2 = Create-ServerForTest $rg $locationOverride $linkName = Get-ElasticPoolName $job = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName ` -LinkName $linkName -PartnerServer $server2.ServerName -AsJob $job | Wait-Job $ep1 = $job.Output Assert-NotNull $ep1 Assert-AreEqual $linkName $ep1.Name Assert-AreEqual $server2.ServerName $ep1.PartnerServer try { $gep1 = Get-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName ` -LinkName $ep1.Name Assert-NotNull $gep1 Assert-AreEqual $linkName $gep1.Name Assert-AreEqual $server2.ServerName $gep1.PartnerServer $all = $server1 | Get-AzSqlServerCommunicationLink -LinkName * Assert-AreEqual $all.Count 1 } finally { Remove-ResourceGroupForTest $rg } } function Test-RemoveServerCommunicationLink { $locationOverride = "North Europe" $serverVersion = "12.0" $rg = Create-ResourceGroupForTest $locationOverride $server1 = Create-ServerForTest $rg $locationOverride $server2 = Create-ServerForTest $rg $locationOverride $linkName = Get-ElasticPoolName $ep1 = New-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName ` -LinkName $linkName -PartnerServer $server2.ServerName Assert-NotNull $ep1 try { Remove-AzSqlServerCommunicationLink -ServerName $server1.ServerName -ResourceGroupName $rg.ResourceGroupName -LinkName $ep1.Name -Force $all = $server1 | Get-AzSqlServerCommunicationLink Assert-AreEqual $all.Count 0 } finally { Remove-ResourceGroupForTest $rg } }
combined_dataset/train/non-malicious/sample_65_65.ps1
sample_65_65.ps1
########################################################################## # DELL PROPRIETARY INFORMATION # # This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this # software to you under the terms of a license agreement,nondisclosure agreement or both. # You may not copy, disclose, or use this software except in accordance with those terms. # # Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved. # # DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE, # EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. # DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, # MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. # # # ########################################################################## <# This is a Resource designer script which generates a mof schema for DCPP_POSTBehavior resource in DellBIOSProvider module. #> $category = New-xDscResourceProperty -name Category -Type String -Attribute Key $externalusbport = New-xDscResourceProperty -name ExternalUSBPort -Type String -Attribute Write -ValidateSet @("Enabled", "Disabled") $usb30controller = New-xDscResourceProperty -name USB30Controller -Type String -Attribute Write -ValidateSet @("Enabled", "Disabled") $Password = New-xDscResourceProperty -Name Password -Type string -Attribute Write -Description "Password" $SecurePassword = New-xDscResourceProperty -Name SecurePassword -Type string -Attribute Write -Description "SecurePassword" $PathToKey = New-xDscResourceProperty -Name PathToKey -Type string -Attribute Write $properties = @($category, $externalusbport, $usb30controller,$Password,$SecurePassword,$PathToKey) New-xDscResource -ModuleName DellBIOSProviderX86 -Name DCPP_USBConfiguration -Property $properties -Path 'C:\Program Files\WindowsPowerShell\Modules' -FriendlyName "USBConfiguration" -Force -Verbose # SIG # Begin signature block # MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBQoRVTkP7Li0Mo # A3XwLKFvbbSkIQQpqpA+fyrMwThTNKCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3 # AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx # IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi # BCDB3G7eY7UDo0VlUt/oUwJaEPuXbKIKlF99SqrdfpLaJTANBgkqhkiG9w0BAQEF # AASCAYCdj95ktb4FAnmnLs+J7q7rPvGcB3ymkF/i78FuBcTfe8E/oI/XqDDf7HKZ # Ceg9JV+0vuSwrlYuvJFAWUx9Es5hAheaRInb/V6vMDYRrHxjYU0dtDcAok1mnpxo # 1V+UW/lhATOh7zcAjijlTV94nHcXJkwThxjJOq7jiODmpz19nYKbC9uzDNEZE9A2 # Ye2ifATVxrE+0b+9ErSyuWS66sCtCzagbP0gu/qZu+8uMM9/7OP34BbqH/XQ7riu # bNWsw97As7uG8tWmqj1k53luR05KD3vh+MQr73dZFtpBFpmCQ0mSxJNQ4eoT+snU # 1gLKkXDSPGmR2nXCm6U/JeZaKv6R1Cr3EpC1Huns0FyIju04lBiWwxvaHkkZGbHy # hCRrblXbygdyVhUztsjcsFrcZwTVEW9caEoFE0jW+GHDj/QKzQNX/49jgWT6t3Av # dqUMP7Flmnniq9WpKvUih0mx33qoT8DUH6mPlbJUnwP5BhLOEE2LmdehJs5UCzBF # A4U/b2yhghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4 # MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C # AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgcDpxpxbXAdQV3m2x/7lh # /HrIz7aKR6AW7acwoJL0WTsCCC0b67iOx7tiGA8yMDI0MDQxODA3MzI0OVowAwIB # AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT # Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz # dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO # QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0 # Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j # LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv # b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa # Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0 # LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm # Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc # Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN # CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT # SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV # EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf # e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM # 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I # H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp # OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL # XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB # o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD # VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo # MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF # BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG # A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww # HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ # Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd # ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU # +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql # z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G # w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi # e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6 # yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F # ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE # Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv # cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL # MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu # dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg # zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM # GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG # sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4 # yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI # fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P # 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0 # spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu # 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W # EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6 # l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb # zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J # +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5 # +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH # lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2 # oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84 # CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f # G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD # DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c # 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr # JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h # ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m # 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2 # EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt # IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT # AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT # DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv # cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4 # Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj # C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I # 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb # Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s # F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS # h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo # FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8 # 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad # scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/ # BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue # JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T # AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw # FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF # BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov # L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE # AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG # +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh # MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC # S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI # WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP # EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk # 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII # 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz # 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk # uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK # SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8 # a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF # gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk # +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD # VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp # bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa # BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx # ODA3MzI0OVowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN # AQENME8GCSqGSIb3DQEJBDFCBEASdCZV6YwH//oSawA1LxzHDh1IhziLyuRT3FbI # h/5GyAmbfyTb3jSFlB8RXmvI6ugCy9C5eVX/Ef/ksr7Tj2QgMIHQBgsqhkiG9w0B # CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS # ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw # ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl # BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7 # hfYR9W27bjALBgkqhkiG9w0BAQ0EggIARljdhll8S3Dpta583w8utCRgZbeVzIhm # sz7kEc1YPxr200DlouLl4qG/o7XuUJzxz3qt/bDtt/EY6bNKtKbdOuUou1UL+AXT # gSHvlXnVhmTY+zBDTjiafvZ31tIdtciioGAl5XpD15UiXGzOLf9/HMxCRMpYh+w5 # bVBVcgJGDaZMdjPWWmSHSgzXppamGfyiy5GiLTTPHkwRniUleX/NjbTTAJ5UOg7O # x0fXjrsAKc4izIHgUIq5IDdmv0PZHs3sz+xIO+twdPYL+c+7P3OvTobm6GxA6PEu # 1iJ/HucCj7ObodCXREWSTco45KFaYRlx5pLTwqfpsUlGWu3OTaMqolbk9Dv1VzCx # 4EfBE+euEoS4lxCc0rpJivSpFwJapFEoDegsLNqXDzs2RqeA/E8lIaKrFeTbhs0y # U5vgSKJLyfvLIdcFCs5he5u+/m9Qdf2sS/RSUe9Hl6i2/5eHXeagb4EWiLYWy/D1 # vqwqCNwUYZMJVegKobM5yrep7kZ2dfSfZcVYOD/hNuSz0Xy8klC2sF49AewoVtvy # emv6vK4//YdbM/09DVGH4TK7OCXGfpdfNCp3X7p3fchwAXnRNVcf287ZY0NfG0di # osfu67S4W+de8HpUf3VDAqIiGa8qpiSQDP3Ov1Ppc84ReGnuYEvBtoqeSzvkPxMk # IqGAu2Y1fpk= # SIG # End signature block
combined_dataset/train/non-malicious/2414.ps1
2414.ps1
[CmdletBinding()] param ( [Parameter(Mandatory)] [string]$Name, [Parameter(Mandatory)] [string]$Manufacturer, [Parameter(Mandatory)] [ValidatePattern('[-+]?([0-9]*\.[0-9]+|[0-9]+)')] [string]$SoftwareVersion, [Parameter()] [string]$Owner = 'Adam Bertram', [Parameter()] [string]$SupportContact = 'Adam Bertram', [Parameter(Mandatory)] [ValidateScript({ Test-Path -Path $_ -PathType Container })] [string]$SourceFolderPath, [Parameter(Mandatory)] [string]$InstallationProgram, [Parameter()] [ValidateScript({ Test-Path -Path $_ -PathType Container })] [string]$RootPackageFolderPath = '\\server\dfs\softwarelibrary\software_packages', [Parameter()] [ValidateScript({ Test-Path -Path $_ -PathType 'Leaf' })] [string]$IconLocationFilePath, [Parameter()] [string]$InstallationBehaviorType = 'InstallForSystem', [Parameter()] [string]$InstallationProgramVisibility = 'Hidden', [Parameter()] [string]$MaximumAllowedRunTimeMinutes = '15', [Parameter()] [string]$EstimatedInstallationTimeMinutes = '5', [Parameter()] [string]$RebootBehavior = 'ForceReboot', [Parameter()] [string]$DistributionPointGroup = 'All DPs', [Parameter()] [string]$SiteCode = 'UHP', [Parameter()] [string]$InstallScriptTemplateFilePath = '\\server\dfs\softwarelibrary\software_packages\_Template_Files\install.ps1' ) begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Set-StrictMode -Version Latest try { Write-Verbose 'Ensuring the ConfigurationManager module is available and importing it...' if (!(Test-Path "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1")) { throw 'Configuration Manager module not found. Is the admin console intalled?' } elseif (!(Get-Module 'ConfigurationManager')) { Import-Module "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1" } Write-Verbose 'Performing prereq setup things...' $Location = (Get-Location).Path $PackageFolderName = "$($Manufacturer.Replace(' ','_'))_$($Name.Replace(' ','_'))_$($SoftwareVersion.Replace(' ','_'))" $ContentFolderPath = "$RootPackageFolderPath\$PackageFolderName" } catch { Write-Error $_.Exception.Message } } process { try { Write-Verbose "Creating the content folder '$ContentFolderPath'..." if (!(Test-Path $ContentFolderPath)) { mkdir $ContentFolderPath | Out-Null } else { throw "The folder at '$ContentFolderPath' already exists." } Write-Verbose "Copying files from source folder '$SourceFolderPath' to '$ContentFolderPath'..." Copy-Item -Path "$SourceFolderPath\*" -Destination $ContentFolderPath -Recurse -Force Write-Verbose "Copying the installer template fiel at '$InstallScriptTemplateFilePath' to '$ContentFolderPath'..." Copy-Item -Path $InstallScriptTemplateFilePath -Destination $ContentFolderPath Write-Verbose "Creating the application '$Name'..." $NewCmApplicationParams = @{ 'Name' = $Name; 'Owner' = $Owner; 'SupportContact' = $SupportContact; 'IconLocationFile' = $IconLocationFilePath; 'Publisher' = $Manufacturer; 'SoftwareVersion' = $SoftwareVersion } Set-Location "$($SiteCode):" New-CMApplication @NewCmApplicationParams | Out-Null Write-Verbose 'Creating the deployment type...' $AddCmDeploymentTypeParams = @{ 'ApplicationName' = $ApplicationName; 'ScriptInstaller' = $true; 'ManualSpecifyDeploymentType' = $true; 'DeploymentTypeName' = "Deploy $Name"; 'InstallationProgram' = $InstallationProgram; 'ContentLocation' = $ContentFolderPath; 'InstallationBehaviorType' = $InstallationBehaviorType; 'InstallationProgramVisibility' = $InstallationProgramVisibility; 'MaximumAllowedRunTimeMinutes' = $MaximumAllowedRunTimeMinutes; 'EstimatedInstallationTimeMinutes' = $EstimatedInstallationTimeMinutes; } Add-CMDeploymentType @AddCmDeploymentTypeParams Write-Verbose 'Setting reboot behavior for the deployment type...' $SetCmDeploymentTypeParams = @{ 'RebootBehavior' = $RebootBehavior; 'DeploymentTypeName' = "Deploy $ApplicationName"; 'ApplicationName' = $ApplicationName; 'MsiOrScriptInstaller' = $true; } Set-CMDeploymentType @SetCmDeploymentTypeParams Write-Verbose 'Distributing content...' Start-CMContentDistribution -DistributionPointGroupName $DistributionPointGroup -PackageName $Name Write-Verbose 'Creating the OSD package...' $PackageConversionScriptFilePath = 'C:\Dropbox\Powershell\scripts\complete\Convert-CMApplicationToPackage.ps1' if (Test-Path $PackageConversionScriptFilePath) { & $PackageConversionScriptFilePath -ApplicationName $Name -SkipRequirements -DistributeContent -OsdFriendlyPowershellSyntax } else { Write-Warning "OSD package could not be created because the script '$PackageConversionScriptFilePath' does not exist" } Write-Verbose 'Done.' } catch { Write-Error $_.Exception.Message exit } }
combined_dataset/train/non-malicious/sample_38_12.ps1
sample_38_12.ps1
# # Module manifest for module 'OCI.PSModules.Loggingsearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loggingsearch.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6721daff-25e3-4454-8b3d-3eda7d2b1f62' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loggingsearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingsearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Invoke-OCILoggingsearchSearchLogs' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingsearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Connect-AccessDB_1.ps1
Connect-AccessDB_1.ps1
# Functions for connecting to and working with Access databases # Matt Wilson # May 2009 function Connect-AccessDB ($global:dbFilePath) { # Test to ensure valid path to database file was supplied if (-not (Test-Path $dbFilePath)) { Write-Error "Invalid Access database path specified. Please supply full absolute path to database file!" } # TO-DO: Add check to ensure file is either MDB or ACCDB # Create a new ADO DB connection COM object, which will give us useful methods & properties such as "Execute"! $global:AccessConnection = New-Object -ComObject ADODB.Connection # Actually open the database so we can start working with its contents # Access 00-03 (MDB) format has a different connection string than 2007 if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.mdb$") { Write-Host "Access 2000-2003 format (MDB) detected! Using Microsoft.Jet.OLEDB.4.0." $AccessConnection.Open("Provider = Microsoft.Jet.OLEDB.4.0; Data Source= $dbFilePath") } # Here's the check for if 2007 connection is necessary if ((Split-Path $dbFilePath -Leaf) -match [regex]"\\.accdb$") { Write-Host "Access 2007 format (ACCDB) detected! Using Microsoft.Ace.OLEDB.12.0." $AccessConnection.Open("Provider = Microsoft.Ace.OLEDB.12.0; Persist Security Info = False; Data Source= $dbFilePath") } } function Open-AccessRecordSet ($global:SqlQuery) { # Ensure SQL query isn't null if ($SqlQuery.length -lt 1) { Throw "Please supply a SQL query for the recordset selection!" } # Variables used for the connection itself. Leave alone unless you know what you're doing. $adOpenStatic = 3 $adLockOptimistic = 3 # Create the recordset object using the ADO DB COM object $global:AccessRecordSet = New-Object -ComObject ADODB.Recordset # Finally, go and get some records from the DB! $AccessRecordSet.Open($SqlQuery, $AccessConnection, $adOpenStatic, $adLockOptimistic) } function Get-AccessRecordSetStructure { # TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records # Cycle through the fields in the recordset, but only pull out the properties we care about Write-Output $AccessRecordSet.Fields | Select-Object Name,Attributes,DefinedSize,type } function Convert-AccessRecordSetToPSObject { # TO-DO: Should probably test to ensure valid $accessRecordSet exists & has records # Get an array of field names which we will later use to create custom PoSh object names $fields = Get-AccessRecordSetStructure # Move to the very first record in the RecordSet before cycling through each one $AccessRecordSet.MoveFirst() # Cycle through each RECORD in the set and create that record to an object do { # Create a SINGLE blank object we can use in a minute to add properties/values to $record = New-Object System.Object # For every FIELD in the DB, lookup the CURRENT value of that field and add a new PoSh object property with that name and value foreach ($field in $fields) { $fieldName = $field.Name # This makes working with the name a LOT easier in Write-Host, etc. #Write-Host "Working with field: $fieldName" #Write-Host "Preparing to set value to: $($AccessRecordset.Fields.Item($fieldName).Value)" $record | Add-Member -type NoteProperty -name $fieldName -value $AccessRecordSet.Fields.Item($fieldName).Value } # Output the custom object we just created Write-Output $record # Tell the recordset to advance forward one before doing this again with another object $AccessRecordset.MoveNext() } until ($AccessRecordset.EOF -eq $True) } function Execute-AccessSQLStatement ($query) { $AccessConnection.Execute($query) } function Convert-AccessTypeCode ([string]$typeCode) { # Build some lookup tables for our Access type codes so we can convert values pretty easily $labelLookupHash = @{"AutoNumber"="3"; "Text"="202"; "Memo"="203"; "Date/Time"="7"; "Currency"="6"; "Yes/No"="11"; "OLE Object"="205"; "Byte"="17"; "Integer"="2"; "Long Integer"="3"; "Single"="4"; "Double"="5"} $codeLookupHash = @{"3"="AutoNumber"; "202"="Text"; "203"="Memo"; "7"="Date/Time"; "6"="Currency"; "11"="Yes/No"; "205"="OLE Object"; "17"="Byte"; "2"="Integer"; "3"="Long Integer"; "4"="Single"; "5"="Double"} # Convert a value depending on what type of data was supplied if ($typeCode -match [regex]"^\\d{1,3}$") { $valueFound = $codeLookupHash.$typeCode if ($valueFound) { Write-Output $valueFound } else { Write-Output "Unknown" } } else { $valueFound = $labelLookupHash.$typeCode if ($valueFound) { Write-Output $valueFound } else { Write-Output "Unknown" } } } function Close-AccessRecordSet { $AccessRecordSet.Close() } function Disconnect-AccessDB { $AccessConnection.Close() } # Connect-AccessDB "C:\\fso\\ConfigurationMaintenance.accdb" # Open-AccessRecordSet "SELECT * FROM printers" # $printersDB = Convert-AccessRecordSetToPSObject | Select-Object caption,driverName | Format-Table -AutoSize; $printersDB # Close-AccessRecordSet # Disconnect-AccessDB
combined_dataset/train/non-malicious/2968.ps1
2968.ps1
$nugetBinPath = Join-Path -Path $env:ChocolateyInstall -ChildPath 'bin' $packageBatFileName = Join-Path -Path $nugetBinPath -ChildPath 'psake.bat' $psakeDir = Split-Path -Path $MyInvocation.MyCommand.Definition -Parent $path = Join-Path -Path $psakeDir -ChildPath 'psake/psake.cmd' Write-Host "Adding $packageBatFileName and pointing to $path" "@echo off ""$path"" %*" | Out-File $packageBatFileName -encoding ASCII Write-Host "PSake is now ready. You can type 'psake' from any command line at any path. Get started by typing 'psake /?'"
combined_dataset/train/non-malicious/sample_24_98.ps1
sample_24_98.ps1
$MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent . "$MyPath\mesa_init_msvc.ps1" # we want more secure TLS 1.2 for most things, but it breaks SourceForge # downloads so must be done after Chocolatey use [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 -bor [Net.SecurityProtocolType]::Tls13; Remove-Item -Recurse -Force -ErrorAction SilentlyContinue "deps" | Out-Null $depsInstallPath="C:\mesa-deps" Get-Date Write-Host "Cloning DirectX-Headers" git clone -b v1.611.0 --depth=1 https://github.com/microsoft/DirectX-Headers deps/DirectX-Headers if (!$?) { Write-Host "Failed to clone DirectX-Headers repository" Exit 1 } Write-Host "Building DirectX-Headers" $dxheaders_build = New-Item -ItemType Directory -Path ".\deps\DirectX-Headers" -Name "build" Push-Location -Path $dxheaders_build.FullName meson .. --backend=ninja -Dprefix="$depsInstallPath" --buildtype=release -Db_vscrt=mt && ` ninja -j32 install $buildstatus = $? Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $dxheaders_build if (!$buildstatus) { Write-Host "Failed to compile DirectX-Headers" Exit 1 } Get-Date Write-Host "Cloning zlib" git clone -b v1.2.13 --depth=1 https://github.com/madler/zlib deps/zlib if (!$?) { Write-Host "Failed to clone zlib repository" Exit 1 } Write-Host "Downloading zlib meson build files" Invoke-WebRequest -Uri "https://wrapdb.mesonbuild.com/v2/zlib_1.2.13-1/get_patch" -OutFile deps/zlib.zip Expand-Archive -Path deps/zlib.zip -Destination deps/zlib # Wrap archive puts build files in a version subdir Move-Item deps/zlib/zlib-1.2.13/* deps/zlib $zlib_build = New-Item -ItemType Directory -Path ".\deps\zlib" -Name "build" Push-Location -Path $zlib_build.FullName meson .. --backend=ninja -Dprefix="$depsInstallPath" --default-library=static --buildtype=release -Db_vscrt=mt && ` ninja -j32 install $buildstatus = $? Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $zlib_build if (!$buildstatus) { Write-Host "Failed to compile zlib" Exit 1 } Get-Date Write-Host "Cloning libva" git clone https://github.com/intel/libva.git deps/libva if (!$?) { Write-Host "Failed to clone libva repository" Exit 1 } Push-Location -Path ".\deps\libva" Write-Host "Checking out libva df3c584bb79d1a1e521372d62fa62e8b1c52ce6c" # libva-win32 is released with libva version 2.17 (see https://github.com/intel/libva/releases/tag/2.17.0) git checkout 2.17.0 Pop-Location Write-Host "Building libva" # libva already has a build dir in their repo, use builddir instead $libva_build = New-Item -ItemType Directory -Path ".\deps\libva" -Name "builddir" Push-Location -Path $libva_build.FullName meson .. -Dprefix="$depsInstallPath" ninja -j32 install $buildstatus = $? Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $libva_build if (!$buildstatus) { Write-Host "Failed to compile libva" Exit 1 } Get-Date Write-Host "Cloning LLVM release/15.x" git clone -b release/15.x --depth=1 https://github.com/llvm/llvm-project deps/llvm-project if (!$?) { Write-Host "Failed to clone LLVM repository" Exit 1 } Get-Date Write-Host "Cloning SPIRV-LLVM-Translator" git clone -b llvm_release_150 https://github.com/KhronosGroup/SPIRV-LLVM-Translator deps/llvm-project/llvm/projects/SPIRV-LLVM-Translator if (!$?) { Write-Host "Failed to clone SPIRV-LLVM-Translator repository" Exit 1 } Get-Date # slightly convoluted syntax but avoids the CWD being under the PS filesystem meta-path $llvm_build = New-Item -ItemType Directory -ErrorAction SilentlyContinue -Force -Path ".\deps\llvm-project" -Name "build" Push-Location -Path $llvm_build.FullName Write-Host "Compiling LLVM and Clang" cmake ../llvm ` -GNinja ` -DCMAKE_BUILD_TYPE=Release ` -DLLVM_USE_CRT_RELEASE=MT ` -DCMAKE_PREFIX_PATH="$depsInstallPath" ` -DCMAKE_INSTALL_PREFIX="$depsInstallPath" ` -DLLVM_ENABLE_PROJECTS="clang" ` -DLLVM_TARGETS_TO_BUILD="AMDGPU;X86" ` -DLLVM_OPTIMIZED_TABLEGEN=TRUE ` -DLLVM_ENABLE_ASSERTIONS=TRUE ` -DLLVM_INCLUDE_UTILS=OFF ` -DLLVM_INCLUDE_RUNTIMES=OFF ` -DLLVM_INCLUDE_TESTS=OFF ` -DLLVM_INCLUDE_EXAMPLES=OFF ` -DLLVM_INCLUDE_GO_TESTS=OFF ` -DLLVM_INCLUDE_BENCHMARKS=OFF ` -DLLVM_BUILD_LLVM_C_DYLIB=OFF ` -DLLVM_ENABLE_DIA_SDK=OFF ` -DCLANG_BUILD_TOOLS=ON ` -DLLVM_SPIRV_INCLUDE_TESTS=OFF ` -Wno-dev && ` ninja -j32 install $buildstatus = $? Pop-Location if (!$buildstatus) { Write-Host "Failed to compile LLVM" Exit 1 } Get-Date $libclc_build = New-Item -ItemType Directory -Path ".\deps\llvm-project" -Name "build-libclc" Push-Location -Path $libclc_build.FullName Write-Host "Compiling libclc" # libclc can only be built with Ninja, because CMake's VS backend doesn't know how to compile new language types cmake ../libclc ` -GNinja ` -DCMAKE_BUILD_TYPE=Release ` -DCMAKE_CXX_FLAGS="-m64" ` -DCMAKE_POLICY_DEFAULT_CMP0091=NEW ` -DCMAKE_MSVC_RUNTIME_LIBRARY=MultiThreaded ` -DCMAKE_INSTALL_PREFIX="$depsInstallPath" ` -DLIBCLC_TARGETS_TO_BUILD="spirv-mesa3d-;spirv64-mesa3d-" && ` ninja -j32 install $buildstatus = $? Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $libclc_build if (!$buildstatus) { Write-Host "Failed to compile libclc" Exit 1 } Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $llvm_build Get-Date Write-Host "Cloning SPIRV-Tools" git clone -b "sdk-$env:VULKAN_SDK_VERSION" --depth=1 https://github.com/KhronosGroup/SPIRV-Tools deps/SPIRV-Tools if (!$?) { Write-Host "Failed to clone SPIRV-Tools repository" Exit 1 } git clone -b "sdk-$env:VULKAN_SDK_VERSION" --depth=1 https://github.com/KhronosGroup/SPIRV-Headers deps/SPIRV-Tools/external/SPIRV-Headers if (!$?) { Write-Host "Failed to clone SPIRV-Headers repository" Exit 1 } Write-Host "Building SPIRV-Tools" $spv_build = New-Item -ItemType Directory -Path ".\deps\SPIRV-Tools" -Name "build" Push-Location -Path $spv_build.FullName # SPIRV-Tools doesn't use multi-threaded MSVCRT, but we need it to cmake .. ` -GNinja ` -DCMAKE_BUILD_TYPE=Release ` -DCMAKE_POLICY_DEFAULT_CMP0091=NEW ` -DCMAKE_MSVC_RUNTIME_LIBRARY=MultiThreaded ` -DCMAKE_INSTALL_PREFIX="$depsInstallPath" && ` ninja -j32 install $buildstatus = $? Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $spv_build if (!$buildstatus) { Write-Host "Failed to compile SPIRV-Tools" Exit 1 } function Remove-Symlinks { Get-ChildItem -Force -ErrorAction SilentlyContinue @Args | Where-Object { if($_.Attributes -match "ReparsePoint"){$_.Delete()} } } Remove-Symlinks -Path "deps" -Recurse Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "deps" | Out-Null Get-Date Write-Host "Complete"
combined_dataset/train/non-malicious/sample_4_27.ps1
sample_4_27.ps1
ConvertFrom-StringData @' id_sql_setup_collect_bootstrap_logs=Collecting SQL Setup Bootstrap Logs id_sql_setup_collect_2005_logs=Collecting SQL 2005 Bootstrap Logs id_sql_setup_collect_2008_2008r2_logs=Collecting SQL 2008 and 2008R2 Bootstrap Logs id_sql_setup_collect_2012_logs=Collecting SQL 2012 Bootstrap Logs id_sql_setup_collect_2014_logs=Collecting SQL 2014 Bootstrap Logs id_sql_setup_collect_2016_logs=Collecting SQL 2016 Bootstrap Logs id_sql_setup_collect_2017_logs=Collecting SQL 2017 Bootstrap Logs id_sql_setup_collect_2019_logs=Collecting SQL 2019 Bootstrap Logs id_sql_setup_collect_2022_logs=Collecting SQL 2022 Bootstrap Logs '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBN1HW3g6+o8v5O # 1Co0PA/ROdGGc1/ArhUldiKVkmeYU6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKRU # zyHKG3L1VyICK8zib1/Ki/v6VEkUWkdGkXWN8Y6CMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAhVLVon1nxGGz78tCSriVcUF0JtBUc+1JzreH # 9jRXdbeXvh6jJHa8C9tFJaYtMVkB+Wy93DNklPLAsvNdNcNIcB89exLgiZ8hoFGa # 4CcojXsodwq5Y8wJa8NGnIsl3xBYP/sUOWHwu+7jCmrwgYhfUpGHyZeguuI0o3AL # 0iMAM9BJdBarBB/rIDli1plpaze0sPCYmITcGn7f4uBgXrGRRo8Bxev8pyzZt9P5 # U062tn9G26aPoJX3VkzSxFVulAMruOkbeCC90xG32HIgrZQCNTkG42jecGkAXudU # nqRde+07cxFENBMRdW1PKQWDG8zLygM8ulRPtVCO5brnLGi13qGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCsLibv86XdvvufYENSj2AgXwbvxHXy5zjj # 3ZMWv1BPVwIGZutZ6YISGBMyMDI0MTAyODExNDA0MC43MDNaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX # qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF # IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN # XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6 # cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN # h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69 # l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC # qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt # xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V # 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH # 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+ # nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL # ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i # O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q # +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF # RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d # 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di # rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+ # yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M # k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb # YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l # T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip # L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0 # MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA # AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr # /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3 # qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3 # 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk # wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP # 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgR1FD8ixiRoBKcELe+iVjb4suDyJuefFMjQV8tNAZpB4wgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI # k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad # RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAEW5bt1r+EFXSIQZD9HlMw8vkqGLqv5L # ZoKeCmtJRNY8INT96PQbeQ5H/dgCujsOwxir0kErwTamjt+XlZL56SgRRnjdBHsq # nzD6jzT0sYkEDsaaPGRIpYIm0EBk7g3tOm95Lxzxn3BXaZzzi6RYrgYP6fBNTpNo # Ztl7gUMHyhG2iR1oBfqAQiaKO18b4vH9Fxy4JUK1G8OHVvnOtgZeVXdXb1jdgn7l # SUM2PnPu2YdOhrE0EeVa3MkvKwPWo94baBToME65/naAArK8M2y877n0SPWU9jr5 # Gzv/c4zZ2hDJm7WWUN/bhL+lJh0y3Sw7dnD+FAxmu5FgM0JaMofAJm+SEG+poEQm # 5GS+VyfAltlIlntSWhiaHybuSviAXh0lGuGvotfuCMLkMNhJKc/9DwXF604kCKp8 # XFCvVFUirNKDWHtd5RyNQOHaf9SXPRv4VJCMcCPdEGHiTQrXLVFXuZts8qXiXZkF # DsWGeIRfJc8rz/7eavbhPS+2RT3BU3UF1fFxicI6z1/EDQgIgYiqa+jcq9b//1CG # QjMqni7Oji2jLgirqKw2PppHCaX5roiR8wnwLsIFlKZBkALe1Hlb1q/USdZhbEeE # eX3s4cGuJVP7ixjmaX7aPduinrnv3XefBcugB3+4fGI5Ai7H6NtThJip4JhkL0Zg # r6hL9ynFjhOZ # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_61.ps1
sample_49_61.ps1
# # Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance', 'Enable-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneAssignedSubscription', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList', 'Get-OCITenantmanagercontrolplaneAvailableRegionsList', 'Get-OCITenantmanagercontrolplaneDomain', 'Get-OCITenantmanagercontrolplaneDomainGovernance', 'Get-OCITenantmanagercontrolplaneDomainGovernancesList', 'Get-OCITenantmanagercontrolplaneDomainsList', 'Get-OCITenantmanagercontrolplaneLink', 'Get-OCITenantmanagercontrolplaneLinksList', 'Get-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneOrganization', 'Get-OCITenantmanagercontrolplaneOrganizationsList', 'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList', 'Get-OCITenantmanagercontrolplaneOrganizationTenancy', 'Get-OCITenantmanagercontrolplaneRecipientInvitation', 'Get-OCITenantmanagercontrolplaneRecipientInvitationsList', 'Get-OCITenantmanagercontrolplaneSenderInvitation', 'Get-OCITenantmanagercontrolplaneSenderInvitationsList', 'Get-OCITenantmanagercontrolplaneSubscription', 'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneSubscriptionMapping', 'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList', 'Get-OCITenantmanagercontrolplaneSubscriptionsList', 'Get-OCITenantmanagercontrolplaneWorkRequest', 'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList', 'Get-OCITenantmanagercontrolplaneWorkRequestLogsList', 'Get-OCITenantmanagercontrolplaneWorkRequestsList', 'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer', 'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation', 'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer', 'New-OCITenantmanagercontrolplaneChildTenancy', 'New-OCITenantmanagercontrolplaneDomain', 'New-OCITenantmanagercontrolplaneDomainGovernance', 'New-OCITenantmanagercontrolplaneSenderInvitation', 'New-OCITenantmanagercontrolplaneSubscriptionMapping', 'Receive-OCITenantmanagercontrolplaneRecipientInvitation', 'Remove-OCITenantmanagercontrolplaneDomain', 'Remove-OCITenantmanagercontrolplaneDomainGovernance', 'Remove-OCITenantmanagercontrolplaneGovernance', 'Remove-OCITenantmanagercontrolplaneLink', 'Remove-OCITenantmanagercontrolplaneOrganizationTenancy', 'Remove-OCITenantmanagercontrolplaneSubscriptionMapping', 'Restore-OCITenantmanagercontrolplaneOrganizationTenancy', 'Stop-OCITenantmanagercontrolplaneSenderInvitation', 'Update-OCITenantmanagercontrolplaneDomain', 'Update-OCITenantmanagercontrolplaneDomainGovernance', 'Update-OCITenantmanagercontrolplaneOrganization', 'Update-OCITenantmanagercontrolplaneRecipientInvitation', 'Update-OCITenantmanagercontrolplaneSenderInvitation' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2841.ps1
2841.ps1
function ResolveError { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] $ErrorRecord=$Error[0], [Switch] $Short ) process { if ($_ -eq $null) { $_ = $ErrorRecord } $ex = $_.Exception if (-not $Short) { $error_message = "$($script:nl)ErrorRecord:{0}ErrorRecord.InvocationInfo:{1}Exception:$($script:nl){2}" $formatted_errorRecord = $_ | format-list * -force | out-string $formatted_invocationInfo = $_.InvocationInfo | format-list * -force | out-string $formatted_exception = '' $i = 0 while ($null -ne $ex) { $i++ $formatted_exception += ("$i" * 70) + $script:nl + ($ex | format-list * -force | out-string) + $script:nl $ex = $ex | SelectObjectWithDefault -Name 'InnerException' -Value $null } return $error_message -f $formatted_errorRecord, $formatted_invocationInfo, $formatted_exception } $lastException = @() while ($null -ne $ex) { $lastMessage = $ex | SelectObjectWithDefault -Name 'Message' -Value '' $lastException += ($lastMessage -replace $script:nl, '') if ($ex -is [Data.SqlClient.SqlException]) { $lastException += "(Line [$($ex.LineNumber)] " + "Procedure [$($ex.Procedure)] Class [$($ex.Class)] " + " Number [$($ex.Number)] State [$($ex.State)] )" } $ex = $ex | SelectObjectWithDefault -Name 'InnerException' -Value $null } $shortException = $lastException -join ' --> ' $header = $null $header = (($_.InvocationInfo | SelectObjectWithDefault -Name 'PositionMessage' -Value '') -replace $script:nl, ' '), ($_ | SelectObjectWithDefault -Name 'Message' -Value ''), ($_ | SelectObjectWithDefault -Name 'Exception' -Value '') | Where-Object { -not [String]::IsNullOrEmpty($_) } | Select-Object -First 1 $delimiter = '' if ((-not [String]::IsNullOrEmpty($header)) -and (-not [String]::IsNullOrEmpty($shortException))) { $delimiter = ' [<<==>>] ' } return "$($header)$($delimiter)Exception: $($shortException)" } }
combined_dataset/train/non-malicious/sample_14_77.ps1
sample_14_77.ps1
ConvertFrom-StringData @' id_clustercsvd=Cluster Shared Volume information id_clustercsvdesc=Obtaining information about Cluster Shared Volumes '@ # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA6jMF5R6lNHZ44 # g5qoqJ2Mw40O57aFcdd0fFEsd0lZCqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHIL # /aeO7eNiei1Wz8N36XI+vQ+WYBCTmoPA/yi2LYiuMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAZPH802s0S83nKu+EyXmTrBs0/Sxoi4hvDOJD # lFX8M5bgviWO73hUzEvwY/j7+lsgby1M2WHHpeDfEBMML6cmgIsZ67XebAJIaEfp # M+wCCSF5Id8IR4ACrlQpvbl/iv5IfcDRFVMCEtAEZYgHijtOQPdAiyHGWcvrfyj3 # tpP6he/BSYdnAUVsQU25KFQRFxkd3bo8jF2st4+EHN7cpfCJZ9BuTzAXpnFveVfr # CgiS4zL0OIY8WcWOlzZhf0FZyG2rqGkP4Pqx2zTlyCHfa9lUWukKJYdf/f1Y0nsY # oPJdQNR3kC8YOAdV7k6nrRb0oCQK/VNXohhiPONpUoxO+M+7B6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAqFg9tgSakNB6BgNxH1yLHlbACD6Fm+NDl # +zszDOa+1gIGZxp9zsotGBMyMDI0MTAyODExNDA0My4zOTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB # AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq # YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz # 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo # mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI # YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc # QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x # uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE # 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL # CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ # wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF # kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+ # cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM # jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc # 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15 # j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s # gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA # GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0 # SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B # 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ # n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v # ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5 # aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ # IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0 # 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAi # GA8yMDI0MTAyODA1MDIwN1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqyZlPAgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurP # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQ # Mnw+EyRSLq+zprTP8t/0ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdM # u9b2d8cWo3hrWDMqssZAAGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFji # SAij1Vxwohz3Men9w/M4fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8w # we3Z+xy/ccjeORHi3Um6IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOy # lqGX8SZTVNxQg8uGM0FRAEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDgLAlAM7wwI1OlN8dbKwFG # uutLsS+7rk46QbqEb5FwbjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8 # 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCV # SbXiruUvANYshaHmkS8aAUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIA # ROrQZlCSAGxFY5w8rijYhlkbHs0VO1QG1IEFvAFcPGSOOWZs9QXn+IPt4dV1rB4E # 8vTsvR1jqlpQeW+IuOH+qzOGlxlBqR1/Lm3upNGZlkTrl78RWRGE9kNcyFRMid5/ # Fz7+zAPezNRBjxTvIbedBUJyV2wf0jFMAlXWWqHgEVyxUs2vKKF5vzVmHlTvxFbD # 9JbqBMi6J3w/auiZq0+kdh8/x20JRh3tZqZTZyjg7Bhharh+YS6XmaJppRUIp4qv # xM+/WH+YQtx7Htm59xB1elnbNT2IiGnLT184x4GvwJCR2T9SkolYo0c5vC695ZsP # 4AZ8d3jyq0UwaEhH+tcKQhLo7MyGYFejJIcmvHlGEiyysqS0oaZjmwsIuIwBY/aV # aR518RTLqUesSjkME3HpMQtwZ7w+K3PIt6/8gd3w2b09IaIXpBbuQluUOhqG9zoP # 95W3JbYqMEXxr2iv/eNMoDlQMGpbD/TO/WXN+R3rcHK7TOIie7uLdHYtLSTZs9Ch # 4dAxFYY3hwQ+xjTM0LT4qGpfHT5IO7y+SG5Yj/27KoveO/2bUxvXarlkxZa85YqT # Za72wnIDD+vCHVKJVMg3+Y/EIo16lGixqIGUWyaFa6Xs/A6DynNJRwKs0FOj1qfL # YdwCltk2iz2fLMKKhaFPSqu3ICyfXQ1sRMWkTXwbrVU= # SIG # End signature block
combined_dataset/train/non-malicious/989.ps1
989.ps1
class MigrationLogger { [string]$CurrentCommandPath [string]$OutputFilePath [string]$ScriptName [DateTime]$StartDate MigrationLogger([string] $CurrentCommandPath) { $this.StartDate = Get-Date $this.CurrentCommandPath = $CurrentCommandPath $this.ScriptName = Split-Path $CurrentCommandPath -Leaf $fileName = [string]::Concat("log.", $this.ScriptName, ".", $this.FormatDate($this.StartDate), ".txt") $this.OutputFilePath = $this.ReplaceLastSubstring($CurrentCommandPath, $this.ScriptName, $fileName) } [string] FormatDate($date) { return $date.ToString("yyyyMMdd_HHmmss") } [string] FormatCurrentDate() { $currentDate = Get-Date return $this.FormatDate($currentDate) } [string] ReplaceLastSubstring([string]$str, [string]$substr, [string]$newstr) { $lastIndex = $str.LastIndexOf($substr) $result = $str.Remove($lastIndex,$substr.Length).Insert($lastIndex,$newstr) return $result } [void] LogError([string] $Message) { $logDate = $this.FormatCurrentDate() $logMessage = [string]::Concat($logDate, "[ERROR]-", $Message) $logMessage | Out-File -FilePath $this.OutputFilePath -Append Write-Host $logMessage -ForegroundColor Yellow } [void] LogErrorAndThrow([string] $Message) { $logDate = $this.FormatCurrentDate() $logMessage = [string]::Concat($logDate, "[ERROR]-", $Message) $logMessage | Out-File -FilePath $this.OutputFilePath -Append Write-Error $logMessage } [void] LogTrace([string] $Message) { $logDate = $this.FormatCurrentDate() $logMessage = [string]::Concat($logDate, "[LOG]-", $Message) $logMessage | Out-File -FilePath $this.OutputFilePath -Append Write-Host $logMessage } } Function New-AsrLoggerInstance($CommandPath) { return [MigrationLogger]::new($CommandPath) }
combined_dataset/train/non-malicious/3191.ps1
3191.ps1
Function ConvertTo-FlatObject { [cmdletbinding()] param( [parameter( Mandatory = $True, ValueFromPipeline = $True)] [PSObject[]]$InputObject, [string[]]$Exclude = "", [bool]$ExcludeDefault = $True, [string[]]$Include = $null, [string[]]$Value = $null, [int]$MaxDepth = 10 ) Begin { Function IsIn-Include { param($prop) if(-not $Include) {$True} else { foreach($Inc in $Include) { if($Prop -like $Inc) { $True } } } } Function IsIn-Value { param($val) if(-not $Value) {$True} else { foreach($string in $Value) { if($val -like $string) { $True } } } } Function Get-Exclude { [cmdletbinding()] param($obj) if($ExcludeDefault) { Try { $DefaultTypeProps = @( $obj.gettype().GetProperties() | Select -ExpandProperty Name -ErrorAction Stop ) if($DefaultTypeProps.count -gt 0) { Write-Verbose "Excluding default properties for $($obj.gettype().Fullname):`n$($DefaultTypeProps | Out-String)" } } Catch { Write-Verbose "Failed to extract properties from $($obj.gettype().Fullname): $_" $DefaultTypeProps = @() } } @( $Exclude + $DefaultTypeProps ) | Select -Unique } Function Recurse-Object { [cmdletbinding()] param( $Object, [string[]]$path = '$Object', [psobject]$Output, $depth = 0 ) Write-Verbose "Working in path $Path at depth $depth" Write-Debug "Recurse Object called with PSBoundParameters:`n$($PSBoundParameters | Out-String)" $Depth++ $ExcludeProps = @( Get-Exclude $object ) $Children = $object.psobject.properties | Where {$ExcludeProps -notcontains $_.Name } Write-Debug "Working on properties:`n$($Children | select -ExpandProperty Name | Out-String)" foreach($Child in @($Children)) { $ChildName = $Child.Name $ChildValue = $Child.Value Write-Debug "Working on property $ChildName with value $($ChildValue | Out-String)" if($ChildName -match '[^a-zA-Z0-9_]') { $FriendlyChildName = "'$ChildName'" } else { $FriendlyChildName = $ChildName } if((IsIn-Include $ChildName) -and (IsIn-Value $ChildValue) -and $Depth -le $MaxDepth) { $ThisPath = @( $Path + $FriendlyChildName ) -join "." $Output | Add-Member -MemberType NoteProperty -Name $ThisPath -Value $ChildValue Write-Verbose "Adding member '$ThisPath'" } if($ChildValue -eq $null) { Write-Verbose "Skipping NULL $ChildName" continue } if( ( $ChildValue.GetType() -eq $Object.GetType() -and $ChildValue -is [datetime] ) -or ( $ChildName -eq "SyncRoot" -and -not $ChildValue ) ) { Write-Verbose "Skipping $ChildName with type $($ChildValue.GetType().fullname)" continue } if (($ChildValue.GetType()).basetype.Name -eq "Array") { $IsArray = $true } else { $IsArray = @($ChildValue).count -gt 1 } $count = 0 $CurrentPath = @( $Path + $FriendlyChildName ) -join "." $ExcludeProps = @( Get-Exclude $ChildValue ) $ChildrensChildren = $ChildValue.psobject.properties | Where {$ExcludeProps -notcontains $_.Name } $HashKeys = if($ChildValue.Keys -notlike $null -and $ChildValue.Values) { $ChildValue.Keys } else { $null } Write-Debug "Found children's children $($ChildrensChildren | select -ExpandProperty Name | Out-String)" if( (@($ChildrensChildren).count -ne 0 -or $HashKeys) -and $Depth -lt $MaxDepth ) { if($HashKeys) { Write-Verbose "Working on hashtable $CurrentPath" foreach($key in $HashKeys) { Write-Verbose "Adding value from hashtable $CurrentPath['$key']" $Output | Add-Member -MemberType NoteProperty -name "$CurrentPath['$key']" -value $ChildValue["$key"] $Output = Recurse-Object -Object $ChildValue["$key"] -Path "$CurrentPath['$key']" -Output $Output -depth $depth } } else { if($IsArray) { foreach($item in @($ChildValue)) { Write-Verbose "Recursing through array node '$CurrentPath'" $Output = Recurse-Object -Object $item -Path "$CurrentPath[$count]" -Output $Output -depth $depth $Count++ } } else { Write-Verbose "Recursing through node '$CurrentPath'" $Output = Recurse-Object -Object $ChildValue -Path $CurrentPath -Output $Output -depth $depth } } } } $Output } } Process { Foreach($Object in $InputObject) { Recurse-Object -Object $Object -Output $( New-Object -TypeName PSObject ) } } }
combined_dataset/train/non-malicious/sample_40_83.ps1
sample_40_83.ps1
# # Module manifest for module 'OCI.PSModules.Redis' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Redis.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'bd4757ae-2cb1-4507-acfd-0f3be713db44' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Redis Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Redis.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRedisCluster', 'Get-OCIRedisClustersList', 'Get-OCIRedisWorkRequest', 'Get-OCIRedisWorkRequestErrorsList', 'Get-OCIRedisWorkRequestLogsList', 'Get-OCIRedisWorkRequestsList', 'Move-OCIRedisClusterCompartment', 'New-OCIRedisCluster', 'Remove-OCIRedisCluster', 'Stop-OCIRedisWorkRequest', 'Update-OCIRedisCluster' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Redis' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/running regions in ISE.ps1
running regions in ISE.ps1
function invoke-caretline { invoke-expression $([Regex]::Split($psISE.CurrentOpenedFile.Editor.text,"`r`n" )[$psISE.CurrentOpenedFile.Editor.caretline-1]) } $psISE.CustomMenu.Submenus.Add("Run single line", {invoke-caretline} , 'f7') function invoke-region([int] $num) { $ed = $psISE.CurrentOpenedFile.Editor $lines = [Regex]::Split($ed.text,"`r`n" ) $foundfirst = -1 $foundlast = -1 for($count = 0;$count -le $lines.length-1;$count++) { if ($lines[$count].startswith("#region") -and $lines[$count].contains("@$num")) { $foundfirst = $count;break} } if($foundfirst -gt -1) { for ($count = $foundfirst; $count -le $lines.length-1;$count++) { if ($lines[$count].startswith("#endregion") ) { $foundlast = $count;break} } if ($foundlast -gt -1) { $torun = "" $lines[$foundfirst..$foundlast] | % { $torun+=$_ + "`r`n"} invoke-expression $torun } } } $psISE.CustomMenu.Submenus.Add("run region 1", {invoke-region 1 }, 'ctrl+1') $psISE.CustomMenu.Submenus.Add("run region 2", {invoke-region 2 }, 'ctrl+2') $psISE.CustomMenu.Submenus.Add("run region 3", {invoke-region 3 }, 'ctrl+3') $psISE.CustomMenu.Submenus.Add("run region 4", {invoke-region 4 }, 'ctrl+4') $psISE.CustomMenu.Submenus.Add("run region 5", {invoke-region 5 }, 'ctrl+5')
combined_dataset/train/non-malicious/Clear-XCAttributes.ps1
Clear-XCAttributes.ps1
param( [Parameter(Position=0,ValueFromPipeline=$True)] [ValidateNotNullorEmpty()] $User, [switch]$ClearXCAttributes ) begin{ $Global:LegacyXCUsers = @() # attributes to be nulled according to: # http://blogs.technet.com/b/exchange/archive/2006/10/13/3395089.aspx $XCattributes=@( "adminDisplayName","altRecipient","authOrig","autoReplyMessage","deletedItemFlags","delivContLength","deliverAndRedirect","displayNamePrintable", "dLMemDefault","dLMemRejectPerms","dLMemSubmitPerms","extensionAttribute1","extensionAttribute10","extensionAttribute11","extensionAttribute12", "extensionAttribute13","extensionAttribute14","extensionAttribute15","extensionAttribute2","extensionAttribute3","extensionAttribute4","extensionAttribute5", "extensionAttribute6","extensionAttribute7","extensionAttribute8","extensionAttribute9","folderPathname","garbageCollPeriod","homeMDB","homeMTA", "internetEncoding","legacyExchangeDN","mail","mailNickname","mAPIRecipient","mDBOverHardQuotaLimit","mDBOverQuotaLimit","mDBStorageQuota","mDBUseDefaults", "msExchADCGlobalNames","msExchControllingZone","msExchExpansionServerName","msExchFBURL","msExchHideFromAddressLists","msExchHomeServerName", "msExchMailboxGuid","msExchMailboxSecurityDescriptor","msExchPoliciesExcluded","msExchPoliciesIncluded","msExchRecipLimit","msExchResourceGUID", "protocolSettings","proxyAddresses","publicDelegates","securityProtocol","showInAddressBook","submissionContLength","targetAddress","textEncodedORAddress", "unauthOrig" ) } process{ $Global:LegacyXCUsers += (get-aduser -Identity $User -Properties *) if ($ClearXCAttributes){ write-verbose "all XC attributes will be cleared for $user" set-aduser -Identity $User -Clear $XCattributes } } end{ $Global:LegacyXCUsers }
combined_dataset/train/non-malicious/sample_37_10.ps1
sample_37_10.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# PowerShell Diagnostics Module This module contains a set of wrapper scripts that enable a user to use ETW tracing in Windows PowerShell. #> $script:Logman="$env:windir\system32\logman.exe" $script:wsmanlogfile = "$env:windir\system32\wsmtraces.log" $script:wsmprovfile = "$env:windir\system32\wsmtraceproviders.txt" $script:wsmsession = "wsmlog" $script:pssession = "PSTrace" $script:psprovidername="Microsoft-Windows-PowerShell" $script:wsmprovidername = "Microsoft-Windows-WinRM" $script:oplog = "/Operational" $script:analyticlog="/Analytic" $script:debuglog="/Debug" $script:wevtutil="$env:windir\system32\wevtutil.exe" $script:slparam = "sl" $script:glparam = "gl" function Start-Trace { Param( [Parameter(Mandatory=$true, Position=0)] [string] $SessionName, [Parameter(Position=1)] [ValidateNotNullOrEmpty()] [string] $OutputFilePath, [Parameter(Position=2)] [ValidateNotNullOrEmpty()] [string] $ProviderFilePath, [Parameter()] [Switch] $ETS, [Parameter()] [ValidateSet("bin", "bincirc", "csv", "tsv", "sql")] $Format, [Parameter()] [int] $MinBuffers=0, [Parameter()] [int] $MaxBuffers=256, [Parameter()] [int] $BufferSizeInKB = 0, [Parameter()] [int] $MaxLogFileSizeInMB=0 ) Process { $executestring = " start $SessionName" if ($ETS) { $executestring += " -ets" } if ($null -ne $OutputFilePath) { $executestring += " -o ""$OutputFilePath""" } if ($null -ne $ProviderFilePath) { $executestring += " -pf ""$ProviderFilePath""" } if ($null -ne $Format) { $executestring += " -f $Format" } if ($MinBuffers -ne 0 -or $MaxBuffers -ne 256) { $executestring += " -nb $MinBuffers $MaxBuffers" } if ($BufferSizeInKB -ne 0) { $executestring += " -bs $BufferSizeInKB" } if ($MaxLogFileSizeInMB -ne 0) { $executestring += " -max $MaxLogFileSizeInMB" } & $script:Logman $executestring.Split(" ") } } function Stop-Trace { param( [Parameter(Mandatory=$true, Position=0)] $SessionName, [Parameter()] [switch] $ETS ) Process { if ($ETS) { & $script:Logman update $SessionName -ets & $script:Logman stop $SessionName -ets } else { & $script:Logman update $SessionName & $script:Logman stop $SessionName } } } function Enable-WSManTrace { # winrm "{04c6e16d-b99f-4a3a-9b3e-b8325bbc781e} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii # winrsmgr "{c0a36be8-a515-4cfa-b2b6-2676366efff7} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsExe "{f1cab2c0-8beb-4fa2-90e1-8f17e0acdd5d} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsCmd "{03992646-3dfe-4477-80e3-85936ace7abb} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # IPMIPrv "{651d672b-e11f-41b7-add3-c2f6a4023672} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append #IpmiDrv "{D5C6A3E9-FA9C-434e-9653-165B4FC869E4} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WSManProvHost "{6e1b64d7-d3be-4651-90fb-3583af89d7f1} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # Event Forwarding "{6FCDF39A-EF67-483D-A661-76D715C6B008} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append Start-Trace -SessionName $script:wsmsession -ETS -OutputFilePath $script:wsmanlogfile -Format bincirc -MinBuffers 16 -MaxBuffers 256 -BufferSizeInKB 64 -MaxLogFileSizeInMB 256 -ProviderFilePath $script:wsmprovfile } function Disable-WSManTrace { Stop-Trace $script:wsmsession -ETS } function Enable-PSWSManCombinedTrace { param ( [switch] $DoNotOverwriteExistingTrace ) $provfile = [io.path]::GetTempFilename() $traceFileName = [string][Guid]::NewGuid() if ($DoNotOverwriteExistingTrace) { $fileName = [string][guid]::newguid() $logfile = $PSHOME + "\\Traces\\PSTrace_$fileName.etl" } else { $logfile = $PSHOME + "\\Traces\\PSTrace.etl" } "Microsoft-Windows-PowerShell 0 5" | Out-File $provfile -Encoding ascii "Microsoft-Windows-WinRM 0 5" | Out-File $provfile -Encoding ascii -Append if (!(Test-Path $PSHOME\Traces)) { New-Item -ItemType Directory -Force $PSHOME\Traces | Out-Null } if (Test-Path $logfile) { Remove-Item -Force $logfile | Out-Null } Start-Trace -SessionName $script:pssession -OutputFilePath $logfile -ProviderFilePath $provfile -ETS Remove-Item $provfile -Force -ea 0 } function Disable-PSWSManCombinedTrace { Stop-Trace -SessionName $script:pssession -ETS } function Set-LogProperties { param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true)] [Microsoft.PowerShell.Diagnostics.LogDetails] $LogDetails, [switch] $Force ) Process { if ($LogDetails.AutoBackup -and !$LogDetails.Retention) { throw (New-Object System.InvalidOperationException) } $enabled = $LogDetails.Enabled.ToString() $retention = $LogDetails.Retention.ToString() $autobackup = $LogDetails.AutoBackup.ToString() $maxLogSize = $LogDetails.MaxLogSize.ToString() $osVersion = [Version] (Get-CimInstance Win32_OperatingSystem).Version if (($LogDetails.Type -eq "Analytic") -or ($LogDetails.Type -eq "Debug")) { if ($LogDetails.Enabled) { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } } } } function ConvertTo-Bool([string]$value) { if ($value -ieq "true") { return $true } else { return $false } } function Get-LogProperties { param( [Parameter(Mandatory=$true, ValueFromPipeline=$true, Position=0)] $Name ) Process { $details = & $script:wevtutil $script:glparam $Name $indexes = @(1,2,8,9,10) $value = @() foreach($index in $indexes) { $value += @(($details[$index].SubString($details[$index].IndexOf(":")+1)).Trim()) } $enabled = ConvertTo-Bool $value[0] $retention = ConvertTo-Bool $value[2] $autobackup = ConvertTo-Bool $value[3] New-Object Microsoft.PowerShell.Diagnostics.LogDetails $Name, $enabled, $value[1], $retention, $autobackup, $value[4] } } function Enable-PSTrace { param( [switch] $Force, [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } } } function Disable-PSTrace { param( [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } } } Add-Type @" using System; namespace Microsoft.PowerShell.Diagnostics { public class LogDetails { public string Name { get { return name; } } private string name; public bool Enabled { get { return enabled; } set { enabled = value; } } private bool enabled; public string Type { get { return type; } } private string type; public bool Retention { get { return retention; } set { retention = value; } } private bool retention; public bool AutoBackup { get { return autoBackup; } set { autoBackup = value; } } private bool autoBackup; public int MaxLogSize { get { return maxLogSize; } set { maxLogSize = value; } } private int maxLogSize; public LogDetails(string name, bool enabled, string type, bool retention, bool autoBackup, int maxLogSize) { this.name = name; this.enabled = enabled; this.type = type; this.retention = retention; this.autoBackup = autoBackup; this.maxLogSize = maxLogSize; } } } "@ if (Get-Command logman.exe -Type Application -ErrorAction SilentlyContinue) { Export-ModuleMember Disable-PSTrace, Disable-PSWSManCombinedTrace, Disable-WSManTrace, Enable-PSTrace, Enable-PSWSManCombinedTrace, Enable-WSManTrace, Get-LogProperties, Set-LogProperties, Start-Trace, Stop-Trace } else { # Currently we only support these cmdlets as logman.exe is not available on systems like Nano and IoT Export-ModuleMember Disable-PSTrace, Enable-PSTrace, Get-LogProperties, Set-LogProperties } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzuFp8c8UN6ilP # /hSmUPDtAUbo8uWTs6wUbaR/ZpM1B6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEgd441WP1jGfFhxRg3sMtiU # C5JDLIMXuzkPYRsZdTzgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfrns6dpwB8J5PFqn9EY3w1jyXLch6Hu+cnUuHnMRtURhQGmV6npmTceC # f03h5PrA/RMvd1MxmJHwwus1l0JWyM5qnaAiNjSw+7s0dGX55b4RTfKHI5TRimCz # GX9BJLVHiexkkb7D96jjoFbFa4Z6KZrd5ZGsCq88xYOS0naSWkvQ8i5eQDA7Uevs # IQAv0CDZeklxhozTg5pdYkO3ZRIZJI8DJLqTUTnqo1pFU1GcWxlayIwZKg28x76Q # OdAtue/YvXdiO/6Uj7uvrQgtCXT9bWVWx7Qo3ffP8yMDmBOyGKmYvRU4DiBBywG4 # M6ONybBa2gMS6RqBqvQ3raclfZFdm6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD8Qgy33jQQavSA/SWfEYCZDuBMGqfPhAh2f5fecr4F/gIGZdXka4Ur # GBMyMDI0MDIyNjAzMDQwOC4zMzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGUQ8wIhgPMjAyNDAyMjYwNzUxNDNaGA8yMDI0MDIyNzA3NTE0M1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZRDwIBADAHAgEAAgIEcjAHAgEAAgIRUzAKAgUA # 6YeijwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEXucbh1tCcsJZWNnBcf # 7jkJdUv4YIHByK+BElcS3eGuZnkZq6zVfDAPvRPGYzMhNpGNwYlkloeIzASLudYq # bx7DNKo75D9n6pBRiXv44CFLBS9j7duhNIE5Bnf+5TgaYBQD3x8bUwbhQH0o9chw # h4owHYvXt9yG/XVvbkBkpf+UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgW51EBT0WjUDrMMAxpSj+YB/mABkwlcJ1xQYPmQbWn+gwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIHRiS6x7wpBZr2axMZanzXPRYDxQ+PGoOo0lbMr5jh5X # MA0GCSqGSIb3DQEBCwUABIICAIcXurDQsp4z3mkgu9/7PQ+DOxNKy5uyOfB/iHEn # Se+qjruwxahxunbfK2p6JdPMHerZJ+hyXe6zFpUpA0iJ1JJq+0MdW9tZ5rq2RDJg # G+4LxMuxPJjXq/s6LydtEEktfellP8fDdHGLFmUjYj8lNWDV6lg0xJVIf7UXe/nY # qRg9PCfT8wShGJ8LjudMFUXKmAQXS+U47CfA5qXKwELJNt+PH8zRbvn1ytK93gIQ # YELYzUxeldS5MzipGjC3BBTdxvMBU/4QrJpYPVdv7M64wtWEy/QeWDUcYmTbYUvs # HHzEeU9qp0DuFbrlG5t51X05AgvOz9SepiN8o+CG5h6nZZ96zfC+p4PBNpDKYrwI # Yq2RgwzsBYurP+a7fr25btLSfdle3KCB6/hXemXvssTjfPKUGCCqq9fVsOpdJczf # zqP7kV6yB32/5pqrInkZErW4N483iPQg+LxxF7qhgE/1R/M/IOUQTOEsP2JYSZ8b # J08cAIUoscP0bhlYcMLVqW4YgmMdOfcfAyapz9mAkFUqQxv1wTUny5TRFb2ySbb2 # pWnBmt1qzfMJHSJ0iyt6pl7TkhAZPCbtSl7gk1FnnAgsYiWxWL5/UtVI9cx8olUO # E/FA9stiKB1ZxlSJ5gIWo5Cyj2oIlBWfWmsrgGr8o/dDm6HuqJGlFOI43h0h2l77 # 9mE2 # SIG # End signature block
combined_dataset/train/non-malicious/get-uuid_allHVs_1.ps1
get-uuid_allHVs_1.ps1
#The PowerShell Talk #Building a HyperVisor Independent Script # #This script will take a VM (or host) object from the pipline, #and from that determine if you're connected to XenServer #or VMware, and return the apropriate UUID. Begin { #VMware VM Host (ESX) UUID $VMHost_UUID = @{ Name = "VMHost_UUID" Expression = { $_.Summary.Hardware.Uuid } } #XenServer Host UUID $XenHost_UUID = @{ Name = "XenHost_UUID" Expression = { $_.Uuid } } } Process { #Get the type of object we have $InputTypeName = $_.GetType().Name #Do something with that object #is it VMware? if ( $InputTypeName -eq "VMHostImpl" ) { $output = $_ | Get-View | Select-Object $VMHost_UUID #is it Xen? } elseif ($InputTypeName -eq "Host"){ $output = $_ | Select-Object $XenHost_UUID #Otherwise throw an error } else { Write-Host "`nPlease pass this script either a VMHost or VM object on the pipeline.`n" } $output }
combined_dataset/train/non-malicious/Get-WMIVersions_1.ps1
Get-WMIVersions_1.ps1
#Requires -Version 2 param ( $Credential, $ComputerName ) # The official way to detect .NET versions is to look at their known location on the hard drive as per # this article: http://msdn.microsoft.com/en-us/kb/kb00318785.aspx # thanks to David M (http://twitter.com/makovec) for the WQL $query = "select name from win32_directory where name like 'c:\\\\windows\\\\microsoft.net\\\\framework\\\\v%'" $res = Get-WmiObject -query $query -Credential $Credential -ComputerName $ComputerName | ForEach-Object { Split-Path $_.name -Leaf } | # returns directories Where-Object { $_ -like 'v*' } | # only include those that start with v ForEach-Object { [system.version]( $_ -replace "^v" ) } # remove "v" from the string and convert to version object # Create hashtable with computername and version details $prop = @{ ComputerName = $ComputerName V1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 0 } ) { $true } } V1_1Present = &{ if ( $res | Where-Object { $_.Major -eq 1 -and $_.Minor -eq 1 } ) { $true } } V2Present = &{ if ( $res | Where-Object { $_.Major -eq 2 -and $_.Minor -eq 0 } ) { $true } } V3_5Present = &{ if ( $res | Where-Object { $_.Major -eq 3 -and $_.Minor -eq 5 } ) { $true } } VersionDetails = $res } # Create and output PSobject using hashtable New-Object PSObject -Property $prop
combined_dataset/train/non-malicious/843.ps1
843.ps1
Param( [parameter(Mandatory=$true)] $CsvFilePath ) $ErrorActionPreference = "Stop" $scriptsPath = $PSScriptRoot if ($PSScriptRoot -eq "") { $scriptsPath = "." } . "$scriptsPath\asr_logger.ps1" . "$scriptsPath\asr_common.ps1" . "$scriptsPath\asr_csv_processor.ps1" Function ProcessItemImpl($processor, $csvItem, $reportItem) { $reportItem | Add-Member NoteProperty "TestFailoverJobId" $null $reportItem | Add-Member NoteProperty "TestFailoverState" $null $reportItem | Add-Member NoteProperty "TestFailoverStateDescription" $null $vaultName = $csvItem.VAULT_NAME $sourceAccountName = $csvItem.ACCOUNT_NAME $sourceMachineName = $csvItem.SOURCE_MACHINE_NAME $sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER $targetTestFailoverVNET = $csvItem.TESTFAILOVER_VNET $targetVNETRG = $csvItem.TARGET_VNET_RG $protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer) if ($protectedItem -ne $null) { if ($protectedItem.AllowedOperations.Contains('TestFailover')) { $processor.Logger.LogTrace("Starting TestFailover operation for item '$($sourceMachineName)'") $targetTestFailoverVNETObj = Get-AzureRmVirtualNetwork ` -Name $targetTestFailoverVNET ` -ResourceGroupName $targetVNETRG $testFailoverJob = Start-AzureRmRecoveryServicesAsrTestFailoverJob ` -ReplicationProtectedItem $protectedItem ` -AzureVMNetworkId $targetTestFailoverVNETObj.Id ` -Direction PrimaryToRecovery $reportItem.TestFailoverJobId = $testFailoverJob.ID } else { $processor.Logger.LogTrace("TestFailover operation not allowed for item '$($sourceMachineName)'") $reportItem.TestFailoverState = $protectedItem.TestFailoverState $reportItem.TestFailoverStateDescription = $protectedItem.TestFailoverStateDescription } } } Function ProcessItem($processor, $csvItem, $reportItem) { try { ProcessItemImpl $processor $csvItem $reportItem } catch { $exceptionMessage = $_ | Out-String $processor.Logger.LogError($exceptionMessage) throw } } $logger = New-AsrLoggerInstance -CommandPath $PSCommandPath $asrCommon = New-AsrCommonInstance -Logger $logger $processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem $processor.ProcessFile($CsvFilePath)
combined_dataset/train/non-malicious/sample_49_27.ps1
sample_49_27.ps1
# # Module manifest for module 'OCI.PSModules.Aianomalydetection' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Aianomalydetection.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a3b1179d-3494-46fe-b212-09c2eaebfa09' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Aianomalydetection Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Aianomalydetection.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAianomalydetectionAiPrivateEndpoint', 'Get-OCIAianomalydetectionAiPrivateEndpointsList', 'Get-OCIAianomalydetectionDataAsset', 'Get-OCIAianomalydetectionDataAssetsList', 'Get-OCIAianomalydetectionDetectAnomalyJob', 'Get-OCIAianomalydetectionDetectAnomalyJobsList', 'Get-OCIAianomalydetectionModel', 'Get-OCIAianomalydetectionModelsList', 'Get-OCIAianomalydetectionProject', 'Get-OCIAianomalydetectionProjectsList', 'Get-OCIAianomalydetectionWorkRequest', 'Get-OCIAianomalydetectionWorkRequestErrorsList', 'Get-OCIAianomalydetectionWorkRequestLogsList', 'Get-OCIAianomalydetectionWorkRequestsList', 'Invoke-OCIAianomalydetectionDetectAnomalies', 'Move-OCIAianomalydetectionAiPrivateEndpointCompartment', 'Move-OCIAianomalydetectionDataAssetCompartment', 'Move-OCIAianomalydetectionDetectAnomalyJobCompartment', 'Move-OCIAianomalydetectionModelCompartment', 'Move-OCIAianomalydetectionProjectCompartment', 'New-OCIAianomalydetectionAiPrivateEndpoint', 'New-OCIAianomalydetectionDataAsset', 'New-OCIAianomalydetectionDetectAnomalyJob', 'New-OCIAianomalydetectionModel', 'New-OCIAianomalydetectionProject', 'Remove-OCIAianomalydetectionAiPrivateEndpoint', 'Remove-OCIAianomalydetectionDataAsset', 'Remove-OCIAianomalydetectionDetectAnomalyJob', 'Remove-OCIAianomalydetectionModel', 'Remove-OCIAianomalydetectionProject', 'Stop-OCIAianomalydetectionWorkRequest', 'Update-OCIAianomalydetectionAiPrivateEndpoint', 'Update-OCIAianomalydetectionDataAsset', 'Update-OCIAianomalydetectionDetectAnomalyJob', 'Update-OCIAianomalydetectionModel', 'Update-OCIAianomalydetectionProject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Aianomalydetection' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_2.ps1
Send-HTMLFormattedEmail_2.ps1
################################################## # cmdlets ################################################## #------------------------------------------------- # Send-HTMLFormattedEmail #------------------------------------------------- # Usage: Send-HTMLFormattedEmail -? #------------------------------------------------- function Send-HTMLFormattedEmail { <# .Synopsis Used to send an HTML Formatted Email. .Description Used to send an HTML Formatted Email that is based on an XSLT template. .Parameter To Email address or addresses for whom the message is being sent to. Addresses should be seperated using ;. .Parameter ToDisName Display name for whom the message is being sent to. .Parameter CC Email address if you want CC a recipient. Addresses should be seperated using ;. .Parameter BCC Email address if you want BCC a recipient. Addresses should be seperated using ;. .Parameter From Email address for whom the message comes from. .Parameter FromDisName Display name for whom the message comes from. .Parameter Subject The subject of the email address. .Parameter Content The content of the message (to be inserted into the XSL Template). .Parameter Relay FQDN or IP of the SMTP relay to send the message to. .XSLPath The full path to the XSL template that is to be used. #> param( [Parameter(Mandatory=$True)][String]$To, [Parameter(Mandatory=$True)][String]$ToDisName, [String]$CC, [String]$BCC, [Parameter(Mandatory=$True)][String]$From, [Parameter(Mandatory=$True)][String]$FromDisName, [Parameter(Mandatory=$True)][String]$Subject, [Parameter(Mandatory=$True)][String]$Content, [Parameter(Mandatory=$True)][String]$Relay, [Parameter(Mandatory=$True)][String]$XSLPath ) try { # Load XSL Argument List $XSLArg = New-Object System.Xml.Xsl.XsltArgumentList $XSLArg.Clear() $XSLArg.AddParam("To", $Null, $ToDisName) $XSLArg.AddParam("Content", $Null, $Content) # Load Documents $BaseXMLDoc = New-Object System.Xml.XmlDocument $BaseXMLDoc.LoadXml("<root/>") $XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform $XSLTrans.Load($XSLPath) #Perform XSL Transform $FinalXMLDoc = New-Object System.Xml.XmlDocument $MemStream = New-Object System.IO.MemoryStream $XMLWriter = [System.Xml.XmlWriter]::Create($MemStream) $XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter) $XMLWriter.Flush() $MemStream.Position = 0 # Load the results $FinalXMLDoc.Load($MemStream) $Body = $FinalXMLDoc.Get_OuterXML() # Create Message Object $Message = New-Object System.Net.Mail.MailMessage # Now Populate the Message Object. $Message.Subject = $Subject $Message.Body = $Body $Message.IsBodyHTML = $True # Add From $MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName $Message.From = $MessFrom # Add To $To = $To.Split(";") # Make an array of addresses. $To | foreach {$Message.To.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. # Add CC if ($CC){ $CC = $CC.Split(";") # Make an array of addresses. $CC | foreach {$Message.CC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Add BCC if ($BCC){ $BCC = $BCC.Split(";") # Make an array of addresses. $BCC | foreach {$Message.BCC.Add((New-Object System.Net.Mail.Mailaddress $_.Trim()))} # Add them to the message object. } # Create SMTP Client $Client = New-Object System.Net.Mail.SmtpClient $Relay # Send The Message $Client.Send($Message) } catch { throw $_ } } ################################################## # Main ################################################## Export-ModuleMember Send-HTMLFormattedEmail ### XSLT Template Example <?xml version="1.0"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output media-type="xml" omit-xml-declaration="yes" /> <xsl:param name="To"/> <xsl:param name="Content"/> <xsl:template match="/"> <html> <head> <title>My First Formatted Email</title> </head> <body> <div width="400px"> <p>Dear <xsl:value-of select="$To" />,</p> <p></p> <p><xsl:value-of select="$Content" /></p> <p></p> <p><strong>Please do not respond to this email!</strong><br /> An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p> <p></p> <Address> Many thanks from your:<br /> Really Cool IT Team<br /> </Address> </div> </body> </html> </xsl:template> </xsl:stylesheet>
combined_dataset/train/non-malicious/WinFirewall-Disabled.ps1
WinFirewall-Disabled.ps1
function WinFirewall-Disabled(){ param ( $computer ) c:\\PsTools\\PsExec.exe \\\\"$computer" sc config sharedaccess start= disabled }
combined_dataset/train/non-malicious/3599.ps1
3599.ps1
function Get-AzureRmSecurityPricing-SubscriptionScope { $pricings = Get-AzSecurityPricing Validate-Pricings $pricings } function Get-AzureRmSecurityPricing-SubscriptionLevelResource { $pricings = Get-AzSecurityPricing -Name "VirtualMachines" Validate-Pricings $pricings } function Get-AzureRmSecurityPricing-ResourceId { $pricing = Get-AzSecurityPricing | Select -First 1 $fetchedPricing = Get-AzSecurityPricing -ResourceId $pricing.Id Validate-Pricing $fetchedPricing } function Set-AzureRmSecurityPricing-SubscriptionLevelResource { Set-AzSecurityPricing -Name "VirtualMachines" -PricingTier "Standard" } function Validate-Pricings { param($pricings) Assert-True { $pricings.Count -gt 0 } Foreach($pricing in $pricings) { Validate-Pricing $pricing } } function Validate-Pricing { param($pricing) Assert-NotNull $pricing }
combined_dataset/train/non-malicious/3236.ps1
3236.ps1
class LogMessage { [datetime]$DateTime = (Get-Date).ToUniversalTime() [string]$Class [string]$Method [LogSeverity]$Severity = [LogSeverity]::Normal [LogLevel]$LogLevel = [LogLevel]::Info [string]$Message [object]$Data LogMessage() { } LogMessage([string]$Message) { $this.Message = $Message } LogMessage([string]$Message, [object]$Data) { $this.Message = $Message $this.Data = $Data } LogMessage([LogSeverity]$Severity, [string]$Message) { $this.Severity = $Severity $this.Message = $Message } LogMessage([LogSeverity]$Severity, [string]$Message, [object]$Data) { $this.Severity = $Severity $this.Message = $Message $this.Data = $Data } hidden [string]Compact([string]$Json) { $indent = 0 $compacted = ($Json -Split '\n' | ForEach-Object { if ($_ -match '[\}\]]') { $indent-- } $line = (' ' * $indent * 2) + $_.TrimStart().Replace(': ', ': ') if ($_ -match '[\{\[]') { $indent++ } $line }) -Join "`n" return $compacted } [string]ToJson() { $json = [ordered]@{ DataTime = $this.DateTime.ToString('u') Class = $this.Class Method = $this.Method Severity = $this.Severity.ToString() LogLevel = $this.LogLevel.ToString() Message = $this.Message Data = foreach ($item in $this.Data) { if ($item.GetType().BaseType.ToString() -eq 'System.Management.Automation.Job') { continue } if ($item -is [System.Management.Automation.ErrorRecord]) { [ExceptionFormatter]::Summarize($item) } else { $item } } } | ConvertTo-Json -Depth 10 -Compress return $json } [string]ToString() { return $this.ToJson() } }
combined_dataset/train/non-malicious/sample_67_40.ps1
sample_67_40.ps1
# # Module manifest for module 'OCI.PSModules.Email' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Email.dll' # Version number of this module. ModuleVersion = '90.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f1bd31ba-98e7-4163-b9d9-5016214290ab' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Email Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Email.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEmailConfiguration', 'Get-OCIEmailDkim', 'Get-OCIEmailDkimsList', 'Get-OCIEmailDomain', 'Get-OCIEmailDomainsList', 'Get-OCIEmailReturnPath', 'Get-OCIEmailReturnPathsList', 'Get-OCIEmailSender', 'Get-OCIEmailSendersList', 'Get-OCIEmailSuppression', 'Get-OCIEmailSuppressionsList', 'Get-OCIEmailWorkRequest', 'Get-OCIEmailWorkRequestErrorsList', 'Get-OCIEmailWorkRequestLogsList', 'Get-OCIEmailWorkRequestsList', 'Move-OCIEmailDomainCompartment', 'Move-OCIEmailSenderCompartment', 'New-OCIEmailDkim', 'New-OCIEmailDomain', 'New-OCIEmailReturnPath', 'New-OCIEmailSender', 'New-OCIEmailSuppression', 'Remove-OCIEmailDkim', 'Remove-OCIEmailDomain', 'Remove-OCIEmailReturnPath', 'Remove-OCIEmailSender', 'Remove-OCIEmailSuppression', 'Update-OCIEmailDkim', 'Update-OCIEmailDomain', 'Update-OCIEmailReturnPath', 'Update-OCIEmailSender' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Email' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2190.ps1
2190.ps1
param( [parameter(Mandatory=$true)] $IPRangeOld, [parameter(Mandatory=$true)] $IPRangeNew ) Begin { $ReferenceObject = $IPRangeOld.Split(",") $ReferenceObjectCount = [System.Math]::Round(($ReferenceObject | Measure-Object).Count / 2) $DifferenceObject = $IPRangeNew.Split(",") $DifferenceObjectCount = [System.Math]::Round(($DifferenceObject | Measure-Object).Count / 2) if ($ReferenceObjectCount -ge $DifferenceObjectCount) { $SyncWindow = $ReferenceObjectCount } else { $SyncWindow = $DifferenceObjectCount } } Process { Compare-Object -ReferenceObject $ReferenceObject -DifferenceObject $DifferenceObject -SyncWindow $SyncWindow | ForEach-Object { if ($_.SideIndicator -like "=>") { $Object = New-Object -TypeName PSObject $Object | Add-Member -MemberType NoteProperty -Name Difference -Value ($_.InputObject) $Object | Add-Member -MemberType NoteProperty -Name Origin -Value ($_.SideIndicator) Write-Output $Object } } }
combined_dataset/train/non-malicious/sample_7_38.ps1
sample_7_38.ps1
#************************************************ # DC_RDSRDWeb.ps1 # Version 1.0.1 # Date: 21-01-2012 # Author: Daniel Grund - dgrund@microsoft.com # Description: # This script gets the IIS config # 1.0.0 Beta release # 1.0.1 Release # TODO get windows\web\rdweb dir #************************************************ PARAM( [string] $TargetHost = "localhost", $OutputFileName ) $IISConfig = (C:\WINDOWS\SYSTEM32\INETSRV\APPCMD list config) if ($null -ne $IISConfig) { $savepath = $TargetHost + "_IISConfig.txt" [array]$OutputFileName += $savepath $IISConfig | Out-File $savepath } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD9+PNMwhf5kMaz # ON0qnIh8J95W070RF7L2itRGeWpnAKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHw6 # tntOk1lPhNQIhgUoYfH6CzKvo1vPCW2gQcBubJSKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeBiLxwUfwvm9xS4kx4c1B0IiHtuHX6zqKKTC # tnAp3X5ysglB7HFXtG9XB8fnU1itkIPAADdgm5C81hWUFMl8Vsi6/KEuFAiUQlmO # iCPCrkbybkuANtxs3R1oK2cgrTWPI7CbsnnYV2aSWBTjfLvJpN6uvHatvuzP9fHA # cVI4O5fQXgfJLmZzhF3lGBiMRJU+/R3d/KPFkEGI18WWErUJ/gneNvNXqGZ61Ebm # xWZ99UwT6jrCa0m0jCVVRDt54cK69GOnOpUrZ6fvU3yFVcGSgZpyxqpUMDiEEyMR # t2D5ctAKg6vwgQ0d3bwMvFDF5XcurBrb7jBJJzikpYprhMUewKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAObf0SNhXvlcvDynyKAVha097GqFfnlzX3 # bChIO4FDMwIGZusiCs74GBMyMDI0MTAyODExNDA0NC41MjRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgPhnK8zlpV74QlpVhujWfRv9Vm/R8AkS8oLwnHxgw6lcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAG4Wyjhtnzsyw4+eYkRaTI0tv8wgSZDboX6h # GsoawSosl8e/kTZqfcYNgUeVByOAK6NZblCFGQ94cJLpJAvgtUs+3fQUlFaaleJI # XrPrYarkjQSA/ZGfYZ/zK1KMYTDZH5L4Mg3biXAGPDJHUwzQ97n+fjmhS90A7E1m # qj2s9+sdEGiqq5mckIEqvwLeZfEOYFuqxXoiFRxwBznbI3OGSfds4dM3C4izJGjB # 8gRCCzHuJXoSxiUe4eGVtKy3n1en0UvIbFgua/hbwmYwlI/i6F0Wj8J+uI8geE7t # kHC1PTUgpvTlLejsv7tZwCkVITKpe7PBhs2skUKYt1t3FZTCaZvBY+uWLuUNTe2B # CCz5C7IgmAGr2wMbTIZqgM6KbZq/KO9RXV9PKdVUdmZMVYZle740OAQVCfIrHXbQ # HIqbiq603btotoqvxdsR6zjclxxIAz6vmcFKtZBGzR3vdTmoP2kjpwc7pfQSk/mQ # gm2tS6i8iluRdbbdFyT5ZD1nWOy0OBRwKvTXuuiYmjj3oF329mdXNqUcZ21HompX # iGbb3f8/AUvShL/1PxQNmH9+Po1EyzwDOyW3aANQzsVQoRWamebwuhS/OywlbzAI # etf3DMT8pdOnIgCG8BSdTOdfKeCBxHNUp52yPA06vQcDwbrq0slJH2OLVgEnHd6Z # wCpoeHYz # SIG # End signature block
combined_dataset/train/non-malicious/sample_8_70.ps1
sample_8_70.ps1
########################################################################### # DC_Get-Network # Version 1.0 # Date: 09-26-2012 # Author: mifannin # Description: Creates Autotuning.txt, Firewall.txt, Netsh.txt, Winsock.txt, # Bitsadmin.txt, WPAD & PAC File Collection ########################################################################### Import-LocalizedData -BindingVariable Net -FileName DC_Get_Network -UICulture en-us Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Autotuning $separator = "===========================================================================" function DoCommand ($cmd) { $CommandLineToExecute = "cmd.exe /c $cmd >> $OutputFile" RunCmD -commandToRun $CommandLineToExecute $separator | Out-File ($OutputFile) -append } <# function firewall ($cmd) { Invoke-Expression -Command $cmd | Out-File -Append $outputfile -Encoding ascii } #> #Netsh_Autotuning.txt if ($OSVersion.Major -gt 6) { $OutputFile = $ComputerName + "_Netsh_Autotuning.txt" logStart $Header = "Querying Active State..." #$Header | Out-File $OutputFile $cmd = "netsh interface tcp show global" DoCommand $cmd Add-Content $OutputFile "To view Auto-Tuning settings: netsh interface tcp show global" -Encoding unknown Add-content $Outputfile "To Disable Auto-Tuning: netsh interface tcp set global autotuninglevel=disabled (requires restart)" -Encoding Unknown Add-content $OutputFile "Enable Auto-Tuning: netsh interface tcp set global autotuninglevel=normal (requires restart)" -Encoding Unknown CollectFiles -filesToCollect $OutputFile -fileDescription "Netsh Autotuning" -sectionDescription "Network Configuration" logStop } #Collecting Netstat.txt Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Netstat $OutputFile = $ComputerName + "_Netstat.txt" logstart $CommandLineToExecute = "cmd.exe /c netstat -ano > $OutputFile" RunCmD -commandToRun $CommandLineToExecute -filesToCollect ($OutputFile) -fileDescription "Netstat" -sectionDescription "Network Configuration" logstop #Network.txt Write-DiagProgress -Activity $Net.ID_Network -Status "Collecting ipconfig, srv/wks stats, arp, netbt, netstat" $OutputFile = $ComputerName + "_Network.txt" logstart $Header = "ipconfig /all" DoCommand $Header #net statistics Workstation $Header = "net statistics workstation" DoCommand $Header #arp -a $Header = "arp -a " DoCommand $Header #nbtstat -c $Header = "nbtstat -c" DoCommand $Header $Header = "netstat -r" DoCommand $Header #ipconfig /displaydns $Header = "ipconfig /displaydns" DoCommand $Header CollectFiles -filesToCollect $OutputFile -fileDescription "Network.txt" -sectionDescription "Network Configuration" logstop #Winsock.txt Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_Winsock $ComputerName = $ENV:COMPUTERNAME $OutputFile = $ComputerName + "_Winsock.txt" logstart $Header = "netsh winsock show catalog " DoCommand $Header $Header = "netsh winsock show helper" DoCommand $Header $Header = "netsh winsock show alias" DoCommand $Header $Header = "REG.exe QUERY HKLM\SYSTEM\CurrentControlSet\Services\WinSock /s" DoCommand $Header $Header = "REG QUERY HKLM\SYSTEM\CurrentControlSet\Services\WinSock2 /s" DoCommand $Header CollectFiles -filesToCollect $OutputFile -fileDescription "Winsock.txt" -sectionDescription "Network Configuration" logstop $OutputFile = "" # WPAD and PAC Files #Write-DiagProgress -Activity $Net.ID_Network -Status $Net.ID_PAC #"Start collecting PAC and WPAD Files" | WriteTo-StdOut if ($OSVersion.Major -gt 6) { $source = "$ENV:HOMEDRIVE\Users" "Windows Vista or higher detected" | WriteTo-StdOut "Setting profile path to " + $source | WriteTo-StdOut } else { "Windows XP or 2003 detected" | WriteTo-StdOut $source = "$ENV:HOMEDRIVE\Documents and Settings" "Setting profile path to " + $source | WriteTo-StdOut } <# function get-wpad ($dir) { Get-ChildItem -Recurse -Force $dir -Include *.dat | Where-Object {$_.Name -like "*wpad*"} | ForEach-Object { Get-Content $_.FullName} | ForEach-Object { $OutputFile = $ComputerName + "_WPAD.DAT_" + $fName "Collecting " + $OutputFile | WriteTo-StdOut } CollectFiles -filesToCollect $OutputFile -fileDescription "WPAD File" -sectionDescription "Network Configuration" Get-ChildItem -Recurse -Force $dir -Include *.dat | Where-Object {$_.Name -like "*pac*"} | ForEach-Object { Get-Content $_.FullName} | ForEach-Object { $OutputFile = $ComputerName + "_PACFile_" + $fName "Collecting " + $OutputFile | WriteTo-StdOut } CollectFiles -filesToCollect $OutputFile -fileDescription "PAC File" -sectionDescription "Network Configuration" } #$dir = $ENV:HOMEPATH #$fName = $ENV:USERNAME + ".txt" #get-wpad $dir #$dir = $source + "\NetworkService" #$fName = "NetworkService.txt" #get-wpad $dir #$dir = $source + "\Default User" #$fName = "DefaultUser.txt" #get-wpad $dir #$dir = $source + "\Administrator" #$fName = "Administrator.txt" #get-wpad $dir #$dir = $source + "\LocalService" #$fName = "LocalService.txt" #get-wpad $dir #"Finished collecting PAC and WPAD Files" | WriteTo-StdOut #> # Bitsadmin $AllUsers = $Env:ALLUSERSPROFILE $OutputFile = $ComputerName + "_BitsAdmin.txt" logstart Add-Content $OutputFile "bitsadm.txt" function DoBits ($bitscmd) { #$CommandLineToExecute = "cmd.exe /c bitsadmin.exe $bitscmd >> $OutputFile" #$separator | Out-File -Append $OutputFile #$CommandLineToExecute Invoke-Expression -command $bitscmd | Out-File -Append $outputfile -Encoding ascii #RunCmD -commandToRun $CommandLineToExecute } $bitscmd = "bitsadmin.exe /list /allusers /verbose" DoBits $bitscmd $bitscmd = "bitsadmin.exe /util /GetIEProxy LocalSystem" DoBits $bitscmd $bitscmd = "bitsadmin.exe util /GetIEProxy networkservice" DoBits $bitscmd $bitscmd = "bitsadmin.exe /util /version /verbose" DoBits $bitscmd Get-ChildItem "$AllUsers\Application Data\Microsoft\Network\Downloader\*.*" | Out-File $OutputFile -Append -Encoding ascii #$CommandLineToExecute = "cmd.exe /c dir `"$AllUsers\Application Data\Microsoft\Network\Downloader\*.*`" /X /OD /TC /S /L >> $OutputFile" #DoBits $bitscmd CollectFiles -filesToCollect $OutputFile -fileDescription "BITS Data" -sectionDescription "Network Configuration" logstop # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDa2IABzZ2vZYxL # JS0iNnflk5jYTKP+yLcw9m1sFLuOTKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDnqG8GxCfOevjyZ30aATa2T # 30wxKR3bPfRazotFQ24nMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAm0ZM77Qt2+AkrXALXi1uvVlUpBczcZcduYAZpVdxusDi2MZMsUx9MY3C # ZY0X7AfS4BKB+5hIX72PoePcVVPDBHIzeNhSu5oMEoMvbP8/Fo2+NDgiLUsEPPyi # MclD+P7EPMokBCa2v25+TGMZFXsEAiAvY8dT2yv0wdP15wAe/btHJljM6pX6CCvY # x9C5a/5P+rh7OnFf4bSedfSD+q8Duiwd8ef/MNEsLLPKqagb7lvomdrFefyzhTKt # hu5+3kHs9On83kEY6OvWLs/SO9BkPNFh3+Q/dt/sUafIOaZXWOEUYhcqSQehairT # XRDOBPQuJogSHSY92g8tPqp11936pKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAG3SUD9ehhOmgZ7JZ7CwDQKc5eophjguqkzvDG2zSl/AIGZus6esod # GBMyMDI0MTAyODExNDA0NC45MjNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK # AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch # wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL # Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq # gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu # 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy # dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo # dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgSk1OoJC5KWuj # efUtlc8x+GJ+tNsz9WtGlzndmUphDJgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5 # MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB # CwUABIICABMkyb1npZoOvPic54ZawOnMdRk/G4AQYU5cHI+JWdlNE3mezaRwVU5I # UJgPYXs9uLQlRgIoxOISbZPFmkb7VFt4AutUT2qsfBZm5t4CUUMjd5SZc6dx9hly # dunEKTt6V4ycEUwZKjVw0JoVlqGcKzL+Dv6qV1YjijEXjzOGPmUoVgHxf4yReM/U # Y3rD7tAVRJF9G3SDRqDCQtobZST4cS0/FF03yQh+4NaZsi5OvZ9UJuizTo5Ryn8c # AM+94v05PNUJ+k+nsR8VLKg+bwbGwoL+m35VOT4y4lB5MVkS9I+VB56tGo2IVClj # preLlsJ8FkseiLGh5XDqg4EVCR5OKBsblVOUe5koW1o++tMOC6Gz1nj/rTqRojiQ # ZJIf62vfXS53og5rMgyKMaVTvDXI7A8uHpcxlIdNqm5XhW6DICM7OrabZ+KMtW9S # JpCPXNA5gfJzY/PQ/zqS8OH78E+gLAff786foWgKYjknjMvHt9UuujyPSFhJXkAN # sKuCcljONadxXpaQwHzGmM6p5TYqZUzFOdT2Xy4PiOl71RqX/w3fH54x0gtC+6fW # 2aJQNFA0S7+KqviOMlmhgQsYulfpwUzxMP1681UcB6zw3VgQUwtr/VOm1HjiG2zY # silwGD4A9JrNU+cMjUNRDfhpfii6XooVPHFs+T8zyPXDbW9Z0l0j # SIG # End signature block