full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/923.ps1
923.ps1
$subscriptionId = 'yourSubscriptionId' $resourceGroupName ='yourResourceGroupName' $snapshotName = 'yourSnapshotName' $osDiskName = 'yourOSDiskName' $virtualNetworkName = 'yourVNETName' $virtualMachineName = 'yourVMName' $virtualMachineSize = 'Standard_DS3' Select-AzSubscription -SubscriptionId $SubscriptionId $snapshot = Get-AzSnapshot -ResourceGroupName $resourceGroupName -SnapshotName $snapshotName $diskConfig = New-AzDiskConfig -Location $snapshot.Location -SourceResourceId $snapshot.Id -CreateOption Copy $disk = New-AzDisk -Disk $diskConfig -ResourceGroupName $resourceGroupName -DiskName $osDiskName $VirtualMachine = New-AzVMConfig -VMName $virtualMachineName -VMSize $virtualMachineSize $VirtualMachine = Set-AzVMOSDisk -VM $VirtualMachine -ManagedDiskId $disk.Id -CreateOption Attach -Windows $publicIp = New-AzPublicIpAddress -Name ($VirtualMachineName.ToLower()+'_ip') -ResourceGroupName $resourceGroupName -Location $snapshot.Location -AllocationMethod Dynamic $vnet = Get-AzVirtualNetwork -Name $virtualNetworkName -ResourceGroupName $resourceGroupName $nic = New-AzNetworkInterface -Name ($VirtualMachineName.ToLower()+'_nic') -ResourceGroupName $resourceGroupName -Location $snapshot.Location -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $publicIp.Id $VirtualMachine = Add-AzVMNetworkInterface -VM $VirtualMachine -Id $nic.Id New-AzVM -VM $VirtualMachine -ResourceGroupName $resourceGroupName -Location $snapshot.Location
combined_dataset/train/non-malicious/1193.ps1
1193.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) function Test-ShouldGetMsi { $msi = Get-Msi -Path (Join-Path -Path $PSScriptRoot -ChildPath 'CarbonTestInstaller.msi' -Resolve) } function Test-ShouldAcceptPipelineInput { $msi = Get-ChildItem -Path $PSScriptRoot -Filter *.msi | Get-Msi Assert-NotNull $msi $msi | ForEach-Object { Assert-CarbonMsi $_ } } function Test-ShouldAcceptArrayOfStrings { $path = Join-Path -Path $PSScriptRoot -ChildPath 'CarbonTestInstaller.msi' $msi = Get-Msi -Path @( $path, $path ) Assert-Is $msi ([object[]]) foreach( $item in $msi ) { Assert-CarbonMsi $item } } function Test-ShouldAcceptArrayOfFileInfo { $path = Join-Path -Path $PSScriptRoot -ChildPath 'CarbonTestInstaller.msi' $item = Get-Item -Path $path $msi = Get-Msi -Path @( $item, $item ) Assert-Is $msi ([object[]]) foreach( $item in $msi ) { Assert-CarbonMsi $item } } function Test-ShouldSupportWildcards { $msi = Get-Msi -Path (Join-Path -Path $PSScriptRoot -ChildPath '*.msi') Assert-Is $msi ([object[]]) foreach( $item in $msi ) { Assert-CarbonMsi $item } } function Assert-CarbonMsi { param( $msi ) Assert-NotNull $msi Assert-Is $msi ([Carbon.Msi.MsiInfo]) Assert-Equal 'Carbon' $msi.Manufacturer Assert-Like $msi.ProductName 'Carbon *' Assert-NotNull $msi.ProductCode Assert-NotEqual $msi.ProductCode ([Guid]::Empty) Assert-Equal 1033 $msi.ProductLanguage Assert-Equal '1.0.0' $msi.ProductVersion Assert-NotNull $msi.Properties Assert-GreaterThan $msi.Properties.Count 5 }
combined_dataset/train/non-malicious/Seach-LocalGroupMember.ps1
Seach-LocalGroupMember.ps1
function Seach-LocalGroupMemberDomenNetwork() { param( $Domen, $User ) function Ping ($Name){ $ping = new-object System.Net.NetworkInformation.Ping if ($ping.send($Name).Status -eq "Success") {$True} else {$False} trap {Write-Verbose "Error Ping"; $False; continue} } [string[]]$Info [string[]]$Computers if ($User){$Connection = Get-Credential -Credential $User} $Computers = Get-QADComputer -Service $Domen -OSName '*XP*','*Vista*','*7*' -SizeLimit 0 -ErrorAction SilentlyContinue | Select-Object name -ExpandProperty name Foreach ($Computer in $Computers){ $Alive = Ping $Computer if ($Alive -eq "True"){ if ($Connection) { Trap {Write-Host "Error WMI $Computer";Continue} $GroupName = Get-WmiObject win32_group -ComputerName $Computer -Credential $Connection | Where-Object {$_.SID -eq 'S-1-5-32-544'} | Select-Object name -ExpandProperty name } else { Trap {Write-Host "Error WMI $Computer";Continue} $GroupName = Get-WmiObject win32_group -ComputerName $Computer | Where-Object {$_.SID -eq 'S-1-5-32-544'} | Select-Object name -ExpandProperty name } if ($GroupName){ $Users = ([ADSI]"WinNT://$Computer/$GroupName").psbase.invoke("Members") | % {$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)} $Info += $Users | % {$_ | Select-Object @{e={$Computer};n='Computer'},@{e={$_};n='Login'}} } } } $Info }
combined_dataset/train/non-malicious/ISE-Lines_2.ps1
ISE-Lines_2.ps1
#requires -version 2.0 ## ISE-Lines module v 1.2 ############################################################################################################## ## Provides Line cmdlets for working with ISE ## Duplicate-Line - Duplicates current line ## Conflate-Line - Conflates current and next line ## MoveUp-Line - Moves current line up ## MoveDown-Line - Moves current line down ## Delete-TrailingBlanks - Deletes trailing blanks in the whole script ## ## Usage within ISE or Microsoft.PowershellISE_profile.ps1: ## Import-Module ISE-Lines.psm1 ## ############################################################################################################## ## History: ## 1.2 - Minor alterations to work with PowerShell 2.0 RTM and Documentation updates (Hardwick) ## Include Delete-BlankLines function (author Kriszio I believe) ## 1.1 - Bugfix and remove line continuation character while joining for Conflate-Line function (Kriszio) ## 1.0 - Initial release (Poetter) ############################################################################################################## ## Duplicate-Line ############################################################################################################## ## Duplicates current line ############################################################################################################## function Duplicate-Line { $editor = $psISE.CurrentFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") $line = $text[$caretLine -1] $newText = $text[0..($caretLine -1)] $newText += $line $newText += $text[$caretLine..($text.Count -1)] $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, $caretColumn) } ## Conflate-Line ############################################################################################################## ## Conflates current and next line ## v 1.1 fixed bug on last but one line and remove line continuation character while joining ############################################################################################################## function Conflate-Line { $editor = $psISE.CurrentFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] + $text[$caretLine] -replace ("(``)?`r", "") $newText = @() if ( $caretLine -gt 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $line if ( $caretLine -ne $text.Count - 1) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, $caretColumn) } } ## MoveUp-Line ############################################################################################################## ## Moves current line up ############################################################################################################## function MoveUp-Line { $editor = $psISE.CurrentFile.Editor $caretLine = $editor.CaretLine if ( $caretLine -ne 1 ) { $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") $line = $text[$caretLine -1] $lineBefore = $text[$caretLine -2] $newText = @() if ( $caretLine -gt 2 ) { $newText = $text[0..($caretLine -3)] } $newText += $line $newText += $lineBefore if ( $caretLine -ne $text.Count ) { $newText += $text[$caretLine..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine - 1, $caretColumn) } } ## MoveDown-Line ############################################################################################################## ## Moves current line down ############################################################################################################## function MoveDown-Line { $editor = $psISE.CurrentFile.Editor $caretLine = $editor.CaretLine $caretColumn = $editor.CaretColumn $text = $editor.Text.Split("`n") if ( $caretLine -ne $text.Count ) { $line = $text[$caretLine -1] $lineAfter = $text[$caretLine] $newText = @() if ( $caretLine -ne 1 ) { $newText = $text[0..($caretLine -2)] } $newText += $lineAfter $newText += $line if ( $caretLine -lt $text.Count -1 ) { $newText += $text[($caretLine +1)..($text.Count -1)] } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine +1, $caretColumn) } } ## Delete-TrailingBlanks ############################################################################################################## ## Deletes trailing blanks in the whole script ############################################################################################################## function Delete-TrailingBlanks { $editor = $psISE.CurrentFile.Editor $caretLine = $editor.CaretLine $newText = @() foreach ( $line in $editor.Text.Split("`n") ) { $newText += $line -replace ("\\s+$", "") } $editor.Text = [String]::Join("`n", $newText) $editor.SetCaretPosition($caretLine, 1) } ## Delete-BlankLines ############################################################################################################## ## Deletes blank lines from the selected text ############################################################################################################## function Delete-BlankLines { # Code from the ISECream Archive (http://psisecream.codeplex.com/), originally named Remove-IseEmptyLines # Todo it would be nice to keep the caretposition, but I found no easy way # of course you can split the string into an array of lines $editor = $psISE.CurrentFile.Editor #$caretLine = $editor.CaretLine if ($editor.SelectedText) { Write-Host 'selected' $editor.InsertText(($editor.SelectedText -replace '(?m)\\s*$', '')) } else { $editor.Text = $editor.Text -replace '(?m)\\s*$', '' } $editor.SetCaretPosition(1, 1) } ############################################################################################################## ## Inserts a submenu Lines to ISE's Custum Menu ## Inserts command Duplicate Line to submenu Lines ## Inserts command Conflate Line Selected to submenu Lines ## Inserts command Move Up Line to submenu Lines ## Inserts command Move Down Line to submenu Lines ## Inserts command Delete Trailing Blanks to submenu Lines ## Inserts command Delete Blank Lines to submenu Lines ############################################################################################################## if (-not( $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus | where { $_.DisplayName -eq "Lines" } ) ) { $linesMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.SubMenus.Add("_Lines",$null,$null) $null = $linesMenu.Submenus.Add("Duplicate Line", {Duplicate-Line}, "Ctrl+Alt+D") $null = $linesMenu.Submenus.Add("Conflate Line", {Conflate-Line}, "Ctrl+Alt+J") $null = $linesMenu.Submenus.Add("Move Up Line", {MoveUp-Line}, "Ctrl+Shift+Up") $null = $linesMenu.Submenus.Add("Move Down Line", {MoveDown-Line}, "Ctrl+Shift+Down") $null = $linesMenu.Submenus.Add("Delete Trailing Blanks", {Delete-TrailingBlanks}, "Ctrl+Shift+Del") $null = $linesMenu.Submenus.Add("Delete Blank Lines", {Delete-BlankLines}, "Ctrl+Shift+End") } # If you are using IsePack (http://code.msdn.microsoft.com/PowerShellPack) and IseCream (http://psisecream.codeplex.com/), # you can use this code to add your menu items. The added benefits are that you can specify the order of the menu items and # if the shortcut already exists it will add the menu item without the shortcut instead of failing as the default does. # Add-IseMenu -Name "Lines" @{ # "Duplicate Line" = {Duplicate-Line}| Add-Member NoteProperty order 1 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Alt+D" -PassThru # "Conflate Line" = {Conflate-Line}| Add-Member NoteProperty order 2 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Alt+J" -PassThru # "Move Up Line" = {MoveUp-Line}| Add-Member NoteProperty order 3 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Shift+Up" -PassThru # "Move Down Line" = {MoveDown-Line}| Add-Member NoteProperty order 4 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Shift+Down" -PassThru # "Delete Trailing Blanks" = {Delete-TrailingBlanks}| Add-Member NoteProperty order 5 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Shift+Del" -PassThru # "Delete Blank Lines" = {Delete-BlankLines} | Add-Member NoteProperty order 6 -PassThru | Add-Member NoteProperty ShortcutKey "Ctrl+Shift+End" -PassThru # }
combined_dataset/train/non-malicious/cc9bae29-4515-4111-9dff-aeedeab6249a.ps1
cc9bae29-4515-4111-9dff-aeedeab6249a.ps1
## New-Struct ## Creates a Struct class and emits it into memory ## The Struct includes a constructor which takes the parameters in order... ## ## Usage: ## # Assuming you have a csv file with no header and columns: artist,name,length ## New-Struct Song @{ ## Artist=[string]; ## Name=[string]; ## Length=[TimeSpan]; ## } ## $songs = gc C:\\Scripts\\songlist.csv | % { new-object Song @($_ -split ",") } ## function New-Struct { param([string]$Name,[HashTable]$Properties) switch($Properties.Keys){{$_ -isnot [String]}{throw "Invalid Syntax"}} switch($Properties.Values){{$_ -isnot [type]}{throw "Invalid Syntax"}} # CODE GENERATION MAGIKS! $code = @" using System; public struct $Name { $($Properties.Keys | % { " public {0} {1};`n" -f $Properties[$_],($_.ToUpper()[0] + $_.SubString(1)) }) public $Name ($( [String]::join(',',($Properties.Keys | % { "{0} {1}" -f $Properties[$_],($_.ToLower()) })) )) { $($Properties.Keys | % { " {0} = {1};`n" -f ($_.ToUpper()[0] + $_.SubString(1)),($_.ToLower()) }) } } "@ ## Obtains an ICodeCompiler from a CodeDomProvider class. $provider = New-Object Microsoft.CSharp.CSharpCodeProvider ## Get the location for System.Management.Automation DLL $dllName = [PsObject].Assembly.Location ## Configure the compiler parameters $compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters $assemblies = @("System.dll", $dllName) $compilerParameters.ReferencedAssemblies.AddRange($assemblies) $compilerParameters.IncludeDebugInformation = $true $compilerParameters.GenerateInMemory = $true $compilerResults = $provider.CompileAssemblyFromSource($compilerParameters, $code) if($compilerResults.Errors.Count -gt 0) { $compilerResults.Errors | % { Write-Error ("{0} :`t {1}" -F $_.Line,$_.ErrorText) } } }
combined_dataset/train/non-malicious/sample_35_55.ps1
sample_35_55.ps1
# # Module manifest for module 'OCI.PSModules.Waf' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waf.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0acce48-3280-4a26-9a26-931bf7028140' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waf Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waf.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWafNetworkAddressList', 'Get-OCIWafNetworkAddressListsList', 'Get-OCIWafProtectionCapabilitiesList', 'Get-OCIWafProtectionCapabilityGroupTagsList', 'Get-OCIWafWebAppFirewall', 'Get-OCIWafWebAppFirewallPoliciesList', 'Get-OCIWafWebAppFirewallPolicy', 'Get-OCIWafWebAppFirewallsList', 'Get-OCIWafWorkRequest', 'Get-OCIWafWorkRequestErrorsList', 'Get-OCIWafWorkRequestLogsList', 'Get-OCIWafWorkRequestsList', 'Move-OCIWafNetworkAddressListCompartment', 'Move-OCIWafWebAppFirewallCompartment', 'Move-OCIWafWebAppFirewallPolicyCompartment', 'New-OCIWafNetworkAddressList', 'New-OCIWafWebAppFirewall', 'New-OCIWafWebAppFirewallPolicy', 'Remove-OCIWafNetworkAddressList', 'Remove-OCIWafWebAppFirewall', 'Remove-OCIWafWebAppFirewallPolicy', 'Update-OCIWafNetworkAddressList', 'Update-OCIWafWebAppFirewall', 'Update-OCIWafWebAppFirewallPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waf' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_4_40.ps1
sample_4_40.ps1
# # Module manifest for module 'OCI.PSModules.Datalabelingservice' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datalabelingservice.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '600a044a-632a-42d0-b1ab-94f26e2f3791' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datalabelingservice Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservice.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatalabelingserviceDatasetLabels', 'Get-OCIDatalabelingserviceAnnotationFormatsList', 'Get-OCIDatalabelingserviceDataset', 'Get-OCIDatalabelingserviceDatasetsList', 'Get-OCIDatalabelingserviceWorkRequest', 'Get-OCIDatalabelingserviceWorkRequestErrorsList', 'Get-OCIDatalabelingserviceWorkRequestLogsList', 'Get-OCIDatalabelingserviceWorkRequestsList', 'Import-OCIDatalabelingservicePreAnnotatedData', 'Invoke-OCIDatalabelingserviceSnapshotDataset', 'Move-OCIDatalabelingserviceDatasetCompartment', 'New-OCIDatalabelingserviceDataset', 'New-OCIDatalabelingserviceDatasetRecords', 'Remove-OCIDatalabelingserviceDataset', 'Remove-OCIDatalabelingserviceDatasetLabels', 'Rename-OCIDatalabelingserviceDatasetLabels', 'Update-OCIDatalabelingserviceDataset' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservice' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_26_31.ps1
sample_26_31.ps1
import 'processes' type backlogItem = Epic| AtomicUserStory| TaskBacklog; Backlog: 'backlog' id=ID '{' ( Name |Label |Description |userstories += (Epic| AtomicUserStory| TaskBacklog))* '}' ; Epic : 'epic' id=ID '{' (Name |Description |DefinitionDone |'replace' ':' replace=STRING |DefinitionReady |Label |Learning |'depends' ':' depend=[backlogItem:QualifiedName] (',' depends=[backlogItem:QualifiedName])? |'process' ':' process=[Process:QualifiedName])* '}' ; AtomicUserStory : 'userstory' id=ID '{' (Name |Description |DefinitionDone |DefinitionReady |Learning |Label |'epic' ':' epic=[Epic:QualifiedName] |'depends' ':' depend=[backlogItem:QualifiedName] (',' depends=[backlogItem:QualifiedName])? |'activity' ':' activity=[Activity:QualifiedName] )*'}' ; TaskBacklog: 'task' id=ID '{' (Name |Description |DefinitionDone |DefinitionReady |Learning |Label |'depends' ':' depend=[backlogItem:QualifiedName] (',' depends=[backlogItem:QualifiedName])? |'userstory'':' userstory=[AtomicUserStory:QualifiedName] |'task' ':' task=[Task:QualifiedName])* '}' ;
combined_dataset/train/non-malicious/sample_61_45.ps1
sample_61_45.ps1
# # Module manifest for module 'OCI.PSModules.Mediaservices' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Mediaservices.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c1b780bd-0bdf-4759-a6cb-6edb4ac392d6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Mediaservices Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Mediaservices.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIMediaservicesMediaAssetLock', 'Add-OCIMediaservicesMediaWorkflowConfigurationLock', 'Add-OCIMediaservicesMediaWorkflowJobLock', 'Add-OCIMediaservicesMediaWorkflowLock', 'Add-OCIMediaservicesStreamCdnConfigLock', 'Add-OCIMediaservicesStreamDistributionChannelLock', 'Add-OCIMediaservicesStreamPackagingConfigLock', 'Get-OCIMediaservicesMediaAsset', 'Get-OCIMediaservicesMediaAssetDistributionChannelAttachment', 'Get-OCIMediaservicesMediaAssetDistributionChannelAttachmentsList', 'Get-OCIMediaservicesMediaAssetsList', 'Get-OCIMediaservicesMediaWorkflow', 'Get-OCIMediaservicesMediaWorkflowConfiguration', 'Get-OCIMediaservicesMediaWorkflowConfigurationsList', 'Get-OCIMediaservicesMediaWorkflowJob', 'Get-OCIMediaservicesMediaWorkflowJobsList', 'Get-OCIMediaservicesMediaWorkflowsList', 'Get-OCIMediaservicesMediaWorkflowTaskDeclarationsList', 'Get-OCIMediaservicesStreamCdnConfig', 'Get-OCIMediaservicesStreamCdnConfigsList', 'Get-OCIMediaservicesStreamDistributionChannel', 'Get-OCIMediaservicesStreamDistributionChannelsList', 'Get-OCIMediaservicesStreamPackagingConfig', 'Get-OCIMediaservicesStreamPackagingConfigsList', 'Get-OCIMediaservicesSystemMediaWorkflowsList', 'Invoke-OCIMediaservicesIngestStreamDistributionChannel', 'Move-OCIMediaservicesMediaAssetCompartment', 'Move-OCIMediaservicesMediaWorkflowCompartment', 'Move-OCIMediaservicesMediaWorkflowConfigurationCompartment', 'Move-OCIMediaservicesMediaWorkflowJobCompartment', 'Move-OCIMediaservicesStreamDistributionChannelCompartment', 'New-OCIMediaservicesMediaAsset', 'New-OCIMediaservicesMediaWorkflow', 'New-OCIMediaservicesMediaWorkflowConfiguration', 'New-OCIMediaservicesMediaWorkflowJob', 'New-OCIMediaservicesPlaylist', 'New-OCIMediaservicesSessionToken', 'New-OCIMediaservicesStreamCdnConfig', 'New-OCIMediaservicesStreamDistributionChannel', 'New-OCIMediaservicesStreamPackagingConfig', 'Remove-OCIMediaservicesMediaAsset', 'Remove-OCIMediaservicesMediaAssetDistributionChannelAttachment', 'Remove-OCIMediaservicesMediaAssetLock', 'Remove-OCIMediaservicesMediaWorkflow', 'Remove-OCIMediaservicesMediaWorkflowConfiguration', 'Remove-OCIMediaservicesMediaWorkflowConfigurationLock', 'Remove-OCIMediaservicesMediaWorkflowJob', 'Remove-OCIMediaservicesMediaWorkflowJobLock', 'Remove-OCIMediaservicesMediaWorkflowLock', 'Remove-OCIMediaservicesStreamCdnConfig', 'Remove-OCIMediaservicesStreamCdnConfigLock', 'Remove-OCIMediaservicesStreamDistributionChannel', 'Remove-OCIMediaservicesStreamDistributionChannelLock', 'Remove-OCIMediaservicesStreamPackagingConfig', 'Remove-OCIMediaservicesStreamPackagingConfigLock', 'Update-OCIMediaservicesMediaAsset', 'Update-OCIMediaservicesMediaWorkflow', 'Update-OCIMediaservicesMediaWorkflowConfiguration', 'Update-OCIMediaservicesMediaWorkflowJob', 'Update-OCIMediaservicesStreamCdnConfig', 'Update-OCIMediaservicesStreamDistributionChannel', 'Update-OCIMediaservicesStreamPackagingConfig' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Mediaservices' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_66_12.ps1
sample_66_12.ps1
function Restart-AzFunctionApp { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='RestartByName', SupportsShouldProcess=$true, ConfirmImpact='Medium')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Description('Restarts a function app.')] param( [Parameter(ParameterSetName='RestartByName', Mandatory=$true, HelpMessage='The name of function app.')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Path')] [System.String] [ValidateNotNullOrEmpty()] ${Name}, [Parameter(ParameterSetName='RestartByName', Mandatory=$true)] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Path')] [System.String] [ValidateNotNullOrEmpty()] ${ResourceGroupName}, [Parameter(ParameterSetName='RestartByName', HelpMessage='The Azure subscription ID.')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] [ValidateNotNullOrEmpty()] ${SubscriptionId}, [Parameter(ParameterSetName='ByObjectInput', Mandatory=$true, ValueFromPipeline=$true)] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Models.Api20231201.ISite] [ValidateNotNull()] ${InputObject}, [Parameter(HelpMessage='Returns true when the command succeeds.')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [System.Management.Automation.SwitchParameter] ${PassThru}, [Parameter(HelpMessage='Forces the cmdlet to restart the function app without prompting for confirmation.')] [System.Management.Automation.SwitchParameter] ${Force}, [Parameter(HelpMessage='The credentials, account, tenant, and subscription used for communication with Azure.')] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Azure')] [System.Management.Automation.PSObject] ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Functions.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { RegisterFunctionsTabCompleters # The input object is an ISite. This needs to be transformed into a FunctionsIdentity if ($PsCmdlet.ParameterSetName -eq "ByObjectInput") { if ($PSBoundParameters.ContainsKey("InputObject")) { $PSBoundParameters.Remove("InputObject") | Out-Null } $functionsIdentity = CreateFunctionsIdentity -InputObject $InputObject $PSBoundParameters.Add("InputObject", $functionsIdentity) | Out-Null # Set the name of the function app for the ShouldProcess and ShouldContinue calls $Name = $InputObject.Name } if ($PsCmdlet.ShouldProcess($Name, "Restarting function app")) { if ($Force.IsPresent -or $PsCmdlet.ShouldContinue("Restart function app '$Name'?", "Restarting function app")) { # Remove bound parameters from the dictionary that cannot be process by the intenal cmdlets if ($PSBoundParameters.ContainsKey("Force")) { $PSBoundParameters.Remove("Force") | Out-Null } Az.Functions.internal\Restart-AzFunctionApp @PSBoundParameters } } } } # SIG # Begin signature block # MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDvTX/yrqveCY2f # bNAaEIECO0cZHInU/oowmreihCwD4KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ0wghmZAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBK3HaT8CInW2SWP8CU5qMWF # U+OBpsQfph8KnI44sXc5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAk9Xs57Sy+rHQlzGKuB7D+jPb3opjJTG0riZhC0YiJjcRf1Qa/H6Vueal # YefFv4tLWxJhILM4qNfzn/0xrg4/aBa/jNBK0v+rdHBw5XgHWwcPK9kuzecbzdJW # KsIlsOQF1FB1qFBrcQyQk82ASHduIs6MYdJKutYVkdKtY6hueZASUKSRNSnxzaQw # ECmnDHWYk1BN9/LQDuUgdRkwdX26vZ/DOkWDGj+d+gQZEfb1zMgScf8mVVDp47om # tzllS/cZIQ3DWUXD1lATdcMJbhwUYBmIAFadeDaktPgJj6WzTJYSQZpvVtanWIE6 # EiN+SNMg73lXHU5HaXECTZzP6PU6tKGCFycwghcjBgorBgEEAYI3AwMBMYIXEzCC # Fw8GCSqGSIb3DQEHAqCCFwAwghb8AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFXBgsq # hkiG9w0BCRABBKCCAUYEggFCMIIBPgIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBQMwEOg7gp/+EUcUC34JXnh/eOdUbp8H4LTPRyNleFBwIGZnLOnGpp # GBEyMDI0MDcwNDA4MzA1MC4yWjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB49+9m5ocaIMiAAEAAAHjMA0GCSqG # SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAx # MjE5MDcyOVoXDTI1MDExMDE5MDcyOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046OEQ0MS00QkY3 # LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC+pA1oHkafn8UgVA+jf8rhCaV4 # IMwXjRuSgfDPQGyFnhKJCYDoIZTIPCZqpDbAeFpdTRF0e3C+r5TwrFhizIcqprHE # Lt+v/Idm8ek1ODPHVWRHeleFPpfYKbXvlRfdZDiN+XzqienkAzMEgUOXPRJTxVIo # 0wO81e2OT0WK0uBS/aePeE4nQqQRB+TegDubvMDQP4yjveGZH44Lu7CxfElHa3NR # kTRJNhfdS96cUft9hbLkE2YvIaraxaRDkcW8koIkAT93B+3z5XjdTcp4TEX+k+1w # tS9D0cisvTGekwVq7th3lor5MSLntZy0G/zv59I9kFXeNmX9AK1wf1aueIEPCSL1 # B9HG78ljPD6JoRYuqthe4XuN44a8cr59V4tacBzlbGx9umMQyk1sZdtIX0C3c8+E # VU6PHBUTHUAsZSpEp6HD1qn1f+B+QD0j15NK/AnP3DJr2t4OBL7qReBK20jtFDZw # kb+1A8ZUhosIhpJp8ud5qrQGezS3j4RbcH8aegEyKI5fCV469/m50FlAgwneTmqe # eHxnhmFPCsTqIZs+tOAYE9eHt7EVgAaVvqF2EgshUN0mUN/yzU1W8vRDbLhIdlCE # CllO5b+3Iawaxwg8NIzPlsDo2FEu2MTAIWksjmoaW7nQC70VF6UIRCxaDurTsf+u # oc6oI0kzhGN6buOgRQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLGuDWa+NRW3oWfG # PnqdptmImKkDMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1Ud # HwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr # BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw # MTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgw # DgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC3vpsuqdTTzBFtbe9G # vGNoRsY+rIg0rpRgLOFMZpH88TAInOI9Phkz2x8ZNfd5kNBUT2vXbW0W2ns1dBi5 # BLFFkxhdrT+lrA3Zef5Q+MFEO+gKxTnp3AqSubLxNLDtBcoayR2cTCwjnJb3erwC # DzpGQGIoQR/0V3Mc24pYjgq//98O0RJ7C7jqf+75VyQLBs5iXrAT/9BEasYyrnT1 # rgRs/6nUZSbTpeZ7/TWZMi4oOA+YcvadhHNc2qLYi4h5yfZpbCRHFA4WI/D52JyY # 47Asb/sic2qNmlB4iEMzGxavjNPHPLgRH/rN+2G2UO1wBccHthFSQFMKVo5rSd29 # 80lkzJhVrpxa9mi5Or1XktLtTMhHxL/tGw5Pjd45rAsGy5DPRWg4u6th7VJ98+pO # wJxE3NvHQLy3/4qKlK1WE8Aa20R+F1RRL2iEPou3rA0InFltXQgwPyd8TqAhAlev # OtdY64mo33VYPKNFqfhQoOQgFLbJYDhbomFC4HMZ6s5Jj9oufGRGtK5uC2cphwc7 # CDFNMjJrlZgJGMW3RA4uV6pWSLqT6apg+v3y4w+Lm9EhBLbTqYNJ6dK2vzDQn7/7 # VYSbc+cIIhCCl/rOGpGsC32PtesQweuDZtB6BrPxsvNt7pSJuBsq1HKTWcZ17xOj # mTIyP1dQIEgIPFP4XjFrmU1lVDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkA # AAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRl # IEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVow # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX # 9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1q # UoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8d # q6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byN # pOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2k # rnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4d # Pf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgS # Uei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8 # QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6Cm # gyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF # ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID # AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQU # KqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1 # GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0 # dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0 # bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMA # QTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbL # j+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1p # Y3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz # LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU # tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN # 3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU # 5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5 # KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGy # qVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB6 # 2FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltE # AY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFp # AUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcd # FYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRb # atGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd # VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5k # IE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046OEQ0 # MS00QkY3LUIzQjcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp # Y2WiIwoBATAHBgUrDgMCGgMVAD2Il7vDkUOIbynLhOxitAjoMVp6oIGDMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDq # MGjjMCIYDzIwMjQwNzA0MDgxODQzWhgPMjAyNDA3MDUwODE4NDNaMHQwOgYKKwYB # BAGEWQoEATEsMCowCgIFAOowaOMCAQAwBwIBAAICD08wBwIBAAICE34wCgIFAOox # umMCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh # IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQB4iCZZXhQypP/RNaOa+Dy1 # XToO1EH/GzaR6gxQCbCXEEcPNnckoZMjb7muF3g7vC+ItVVKqOuyIfhMAYrl2tq9 # UswsgA51yCfAFEVLqA8/EenB3hc726ublm/+nj7vQ6+gHrXs67lOGapyYGKAC7gT # T8BInztjJKJ/T4Im173+bzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0 # YW1wIFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMA0GCWCGSAFlAwQCAQUA # oIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIE # ILZ/A+WbRfR1vkm3dQS7Wt9+m4p7j2NnmWYM0Eztk0gXMIH6BgsqhkiG9w0BCRAC # LzGB6jCB5zCB5DCBvQQgM9Qjq+Ww/mT3RIEI1r3CFrgyXEG3YKvDXY9McjLmJiow # gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYw # JAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAePfvZua # HGiDIgABAAAB4zAiBCBUM+TBmWSUlUMhYc1aKxde4p3MPlw+1jDukI3Bj/K2fDAN # BgkqhkiG9w0BAQsFAASCAgCGHgC27iFshldQLCKCpAm8oQTvLxgnANK7SSFvDh0y # EvadU/TrqWl3QUOu7fWmPKSKN0+9DmiDIlGZ3lvv3gOhbDfeuSAk9Z0Dx+Sb/GV2 # tlb6aM0KIAjc2o9aP00xWQdpKKKgqCTBGYdEUGNAKnnTC67qVOnMTgGOqiK0rHPu # usXI5rbSUxIkZx/JGd26rbnrGFRmUefmHwmR9nQ5LOoprhcaARb8/OSnVybsZ/nc # ISU5sAIlMnLIEIeOM+iXlC4TdjeT/Yt7ABRaYOgl8PdRau1LORwLleMTTcW2/b6+ # hNGW2ktkML1t1l3F6NrAlNe7wWk0prKlZJVAM6DwkTlDWwlaVEg+biNnnhWLxu88 # xfLHroU096LV3Jd5+z0i6HWFWWBy4ZVKUuzvxePtrrmVr7j5lPxLxgie4yp9Reqt # qcTKeDAPDUBpxvlVzZr2rEaU7JctvhCi+TOTyXl5CGzkmryGwRvP33x59TwBDpuj # JwKF17WvsmzzX/gSVbEkdj+H0SqkmDFLc8gFDO5EsKM+JT0cky2E+I0gnxcjqBex # at8dXAqwtQ9shMWvkFHTjzcQgZAu6pK2fFvdAg1PyBhIIRY1Ii4EZJ0btbnYOVpM # 2rSrjY/1xPayCYZgGDdwReMbemJFweWMsyQU3LaJ1L6CpAYgIQBDFYEyg2p6jahX # 3Q== # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_99.ps1
sample_1_99.ps1
// ================================================================== // DCIM_SPConsolesConcreteCollection // ================================================================== [dynamic, provider("dcismprovider"), Description( "DCIM_SPConsolesConcreteCollection is a" "trivial derivation of CIM_ConcreteCollection") ] class DCIM_SPConsolesConcreteCollection : CIM_ConcreteCollection { [ Description ("A user-friendly name for the object. This property allows each instance to define a user-friendly name in addition to its key properties, identity data, and description information. Note that the Name property of ManagedSystemElement is also defined as a user-friendly name. But, it is often subclassed to be a Key. It is not reasonable that the same property can convey both identity and a user-friendly name, without inconsistencies. Where Name exists and is not a Key (such as for instances of LogicalDevice), the same information can be present in both the Name and ElementName properties. Note that if there is an associated instance of CIM_EnabledLogicalElementCapabilities, restrictions on this properties may exist as defined in ElementNameMask and MaxElementNameLen properties defined in that class."), Override ("ElementName") ] string ElementName; [ Description ("InstanceID is an optional property that may be used to opaquely and uniquely identify an instance of this class within the scope of the instantiating Namespace. Various subclasses of this class may override this property to make it required, or a key. Such subclasses may also modify the preferred algorithms for ensuring uniqueness that are defined below. To ensure uniqueness within the NameSpace, the value of InstanceID should be constructed using the following \"preferred\" algorithm: <OrgID>:<LocalID> Where <OrgID> and <LocalID> are separated by a colon (:), and where <OrgID> must include a copyrighted, trademarked, or otherwise unique name that is owned by the business entity that is creating or defining the InstanceID or that is a registered ID assigned to the business entity by a recognized global authority. (This requirement is similar to the <Schema Name>_<Class Name> structure of Schema class names.) In addition, to ensure uniqueness, <OrgID> must not contain a colon (:). When using this algorithm, the first colon to appear in InstanceID must appear between <OrgID> and <LocalID>. <LocalID> is chosen by the business entity and should not be reused to identify different underlying (real-world) elements. If not null and the above \"preferred\" algorithm is not used, the defining entity must assure that the resulting InstanceID is not reused across any InstanceIDs produced by this or other providers for the NameSpace of this instance. If not set to null for DMTF-defined instances, the \"preferred\" algorithm must be used with the <OrgID> set to CIM."), Override ("InstanceID") ] string InstanceID; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC04UETT1cGuUnJ */ /* TRtRG0cKiFB6zd3jifHwuSgH1JhsSaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAzyF/xTJXz */ /* HmLuaD65Ko3dhRnN3KpFQxS9jZkHUtOxXTBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYCmwWBsX055iBgyYMFYdiSlY/vhLoCG4GkUoidhN2R2zOxF */ /* 0qth188WheDxgEIweqw2Cs1otwBG34Lhm34JQjHuge+4hUSkJfjwZr1x/jE3CSX7 */ /* TnU0uptj9iJWBkYaHqxxzgwOYsBZ2lsklbN/8XxrT3J+cYOELmyY/3xnuv97WH/r */ /* AtUyPgHlqmVAzrTb4lhBN0LcVaaODndglhM7+BGKGkiVjT5CzV6aQJWjxJO4+fU8 */ /* 8SA6cow6XJrJoKPF99j6jJLTwfx4pDfV0x3g2ufARNp7tJxAA61qAC9eIq4w1Pfx */ /* zuvfLXsFcTYp6Fkci7YYeIxPlKA3+jYUGWlkP9wSQZsB7/YSzgse7OHC92AhLIZX */ /* ah8ydDPFZRVM1gXfM8R945Pa/ORCTZIzKjgMJq3QVHEpgrabFY54wlSfIptTRQYv */ /* zu/wzJWlrYGDPMQhf7YdR1YG49LsdHgxyIImfa4jlJmdzyeerfE3RojWWKczA999 */ /* Gee6zJZ1s14WyprgR7+hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQg57mpJ38U67Ee */ /* Y/iepsIlVV+nC3FPLznplDeAUrf09jwCEA6mPR/SkR+hhVJGeC5S5aMYDzIwMjQw */ /* OTIwMDcwMTM2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMTM2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQgHJpmNQNkXaA2BInnVThTwkwbT5+cbUoASEuB */ /* e6lYUhkwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAI3IzHPKEh4XhjemgQRv+ */ /* EDtl5KJJL8bmqNmFmuty212dRSfnGyiMjDws1XyFJVJLEgpFCquiY2b2YiRqptjo */ /* DHOeH65rvByGzOgPx5Isg58Ks7y4Ca8Kzg+FdvtLcU6mtvvxkw3o0GGRYOSkpMyc */ /* hob7thyAdu5xYWy7hJf3IxbfZmPK6gKJbR3ez0fWaK91nGR2NY3APfpy3GnrMNk+ */ /* oGsmGDw56cgSaUZ+dsQnShTUZMT7b9iWp+PCiVgMU/vr/eYN3XG/lsfZw9x+1kZ2 */ /* mgaDeqirSLQy5wIvB3S2atIsy9lzeGVRGYKMEpiP7gk7gPMnc7BL9i3AqXIBST+g */ /* vKuLaTDmQ21u4GacHSGBY4/eiAArgFW7LjMBrYtEsExzU+3VKtDS+Tv44T0yOI3C */ /* YCSg43vYp/hwXGsmMARpjLqBOEPgVOCdQTl1z65Vf6cJdoE8GYq3T6r7pIBJbqDC */ /* MGlBnMKNJ4hTq1G6poSJQFZZv+xTSUSTbdm3WJSrsRv1gSk4BBXzWXLuAxvjLZyK */ /* KBdCp4d/WYbW/ZnROqRFlLUIyBpPwgNJD1yGHARclAnm62vu8H2oLeJ3ZP2O9GKX */ /* tkUawMu9lXm5CKODHyo4EK4Q3My4HVkn2ZejeTy4gB7DWlbVCMVIZ9yGgrdHZoIH */ /* 2qmUp+tsMbEmjFe0SkPHvAY= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/Invoke-WindowsApi.ps1
Invoke-WindowsApi.ps1
##############################################################################\n##\n## Invoke-WindowsApi\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nInvoke a native Windows API call that takes and returns simple data types.\n\n\n.EXAMPLE\n\n## Prepare the parameter types and parameters for the CreateHardLink function\nPS >$filename = "c:\\temp\\hardlinked.txt"\nPS >$existingFilename = "c:\\temp\\link_target.txt"\nPS >Set-Content $existingFilename "Hard Link target"\nPS >$parameterTypes = [string], [string], [IntPtr]\nPS >$parameters = [string] $filename, [string] $existingFilename,\n [IntPtr]::Zero\n\n## Call the CreateHardLink method in the Kernel32 DLL\nPS >$result = Invoke-WindowsApi "kernel32" ([bool]) "CreateHardLink" `\n $parameterTypes $parameters\nPS >Get-Content C:\\temp\\hardlinked.txt\nHard Link target\n\n#>\n\nparam(\n ## The name of the DLL that contains the Windows API, such as "kernel32"\n [string] $DllName,\n\n ## The return type expected from Windows API\n [Type] $ReturnType,\n\n ## The name of the Windows API\n [string] $MethodName,\n\n ## The types of parameters expected by the Windows API\n [Type[]] $ParameterTypes,\n\n ## Parameter values to pass to the Windows API\n [Object[]] $Parameters\n)\n\nSet-StrictMode -Version Latest\n\n## Begin to build the dynamic assembly\n$domain = [AppDomain]::CurrentDomain\n$name = New-Object Reflection.AssemblyName 'PInvokeAssembly'\n$assembly = $domain.DefineDynamicAssembly($name, 'Run')\n$module = $assembly.DefineDynamicModule('PInvokeModule')\n$type = $module.DefineType('PInvokeType', "Public,BeforeFieldInit")\n\n## Go through all of the parameters passed to us. As we do this,\n## we clone the user's inputs into another array that we will use for\n## the P/Invoke call.\n$inputParameters = @()\n$refParameters = @()\n\nfor($counter = 1; $counter -le $parameterTypes.Length; $counter++)\n{\n ## If an item is a PSReference, then the user\n ## wants an [out] parameter.\n if($parameterTypes[$counter - 1] -eq [Ref])\n {\n ## Remember which parameters are used for [Out] parameters\n $refParameters += $counter\n\n ## On the cloned array, we replace the PSReference type with the\n ## .Net reference type that represents the value of the PSReference,\n ## and the value with the value held by the PSReference.\n $parameterTypes[$counter - 1] =\n $parameters[$counter - 1].Value.GetType().MakeByRefType()\n $inputParameters += $parameters[$counter - 1].Value\n }\n else\n {\n ## Otherwise, just add their actual parameter to the\n ## input array.\n $inputParameters += $parameters[$counter - 1]\n }\n}\n\n## Define the actual P/Invoke method, adding the [Out]\n## attribute for any parameters that were originally [Ref]\n## parameters.\n$method = $type.DefineMethod(\n $methodName, 'Public,HideBySig,Static,PinvokeImpl',\n $returnType, $parameterTypes)\nforeach($refParameter in $refParameters)\n{\n [void] $method.DefineParameter($refParameter, "Out", $null)\n}\n\n## Apply the P/Invoke constructor\n$ctor = [Runtime.InteropServices.DllImportAttribute].GetConstructor([string])\n$attr = New-Object Reflection.Emit.CustomAttributeBuilder $ctor, $dllName\n$method.SetCustomAttribute($attr)\n\n## Create the temporary type, and invoke the method.\n$realType = $type.CreateType()\n\n$realType.InvokeMember(\n $methodName, 'Public,Static,InvokeMethod', $null, $null,$inputParameters)\n\n## Finally, go through all of the reference parameters, and update the\n## values of the PSReference objects that the user passed in.\nforeach($refParameter in $refParameters)\n{\n $parameters[$refParameter - 1].Value = $inputParameters[$refParameter - 1]\n}
combined_dataset/train/non-malicious/1710.ps1
1710.ps1
Function Get-ServiceNowAttachmentDetail { [System.Diagnostics.CodeAnalysis.SuppressMessage('PSAvoidUsingConvertToSecureStringWithPlainText','')] [System.Diagnostics.CodeAnalysis.SuppressMessage('PSAvoidGlobalVars','')] [OutputType([System.Management.Automation.PSCustomObject[]])] [CmdletBinding(DefaultParameterSetName)] Param( [Parameter(Mandatory=$true)] [string]$Number, [Parameter(Mandatory=$true)] [string]$Table, [parameter(Mandatory=$false)] [string[]]$FileName, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$true)] [ValidateNotNullOrEmpty()] [Alias('ServiceNowCredential')] [PSCredential]$Credential, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$true)] [ValidateScript({Test-ServiceNowURL -Url $_})] [ValidateNotNullOrEmpty()] [Alias('Url')] [string]$ServiceNowURL, [Parameter(ParameterSetName='UseConnectionObject', Mandatory=$true)] [ValidateNotNullOrEmpty()] [Hashtable]$Connection ) begin {} process { Try { $getServiceNowTableEntry = @{ Table = $Table MatchExact = @{number = $number} ErrorAction = 'Stop' } Switch ($PSCmdlet.ParameterSetName) { 'SpecifyConnectionFields' { $getServiceNowTableEntry.Add('Credential', $Credential) $getServiceNowTableEntry.Add('ServiceNowURL', $ServiceNowURL) break } 'UseConnectionObject' { $getServiceNowTableEntry.Add('Connection', $Connection) break } Default { If (-not (Test-ServiceNowAuthIsSet)) { Throw "Exception: You must do one of the following to authenticate: `n 1. Call the Set-ServiceNowAuth cmdlet `n 2. Pass in an Azure Automation connection object `n 3. Pass in an endpoint and credential" } } } $TableSysID = Get-ServiceNowTableEntry @getServiceNowTableEntry | Select-Object -Expand sys_id Switch ($PSCmdlet.ParameterSetName) { 'SpecifyConnectionFields' { $ApiUrl = 'https://' + $ServiceNowURL + '/api/now/v1/attachment' break } 'UseConnectionObject' { $SecurePassword = ConvertTo-SecureString $Connection.Password -AsPlainText -Force $Credential = New-Object System.Management.Automation.PSCredential ($Connection.Username, $SecurePassword) $ApiUrl = 'https://' + $Connection.ServiceNowUri + '/api/now/v1/attachment' break } Default { If ((Test-ServiceNowAuthIsSet)) { $Credential = $Global:ServiceNowCredentials $ApiUrl = $Global:ServiceNowRESTURL + '/attachment' } Else { Throw "Exception: You must do one of the following to authenticate: `n 1. Call the Set-ServiceNowAuth cmdlet `n 2. Pass in an Azure Automation connection object `n 3. Pass in an endpoint and credential" } } } $Body = @{'sysparm_limit' = 500; 'table_name' = $Table; 'table_sys_id' = $TableSysID} $Body.sysparm_query = 'ORDERBYfile_name^ORDERBYDESC' $Uri = $ApiUrl $invokeRestMethodSplat = @{ Uri = $Uri Body = $Body Credential = $Credential ContentType = 'application/json' } $Result = (Invoke-RestMethod @invokeRestMethodSplat).Result If ($FileName) { $Result = $Result | Where-Object {$PSItem.file_name -match ($FileName -join '|')} } $Result | Update-ServiceNowDateTimeField } Catch { Write-Error $PSItem } } end {} }
combined_dataset/train/non-malicious/Get-WordOutline_1.ps1
Get-WordOutline_1.ps1
function Get-WordOutline ( $Path, [int]$MaxDepth = 9 ) { if ( $Path -is [System.IO.FileInfo] ) { $Path = $_.FullName } $word = New-Object -comObject word.application $document = $word.documents.open( $path ) $outline = $document.paragraphs | Where-Object { $_.outlineLevel -le $MaxDepth } | ForEach-Object { $n = ($_.outlineLevel - 1) * 2 ' ' * $n + ($_.range.text -replace '\\u000d$') } Write-Output $outline $document.close( [ref]$false ) $word.quit() }
combined_dataset/train/non-malicious/3637.ps1
3637.ps1
function Test-ThreatDetectionUpdatePolicyWithClassicStorage { $testSuffix = getAssetName Create-ThreatDetectionClassicTestEnvironment $testSuffix $params = Get-SqlThreatDetectionTestEnvironmentParameters $testSuffix try { Set-AzSqlDatabaseThreatDetectionSetting -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName -NotificationRecipientsEmails "[email protected]" -EmailAdmins $false -ExcludedDetectionType "Sql_Injection_Vulnerability" -StorageAccountName $params.storageAccount $policy = Get-AzSqlDatabaseThreatDetectionSetting -ResourceGroupName $params.rgname -ServerName $params.serverName -DatabaseName $params.databaseName Assert-AreEqual $policy.ThreatDetectionState "Enabled" Assert-AreEqual $policy.NotificationRecipientsEmails "[email protected]" Assert-AreEqual $policy.StorageAccountName $params.storageAccount Assert-False {$policy.EmailAdmins} Assert-AreEqual $policy.ExcludedDetectionTypes.Count 1 Assert-True {$policy.ExcludedDetectionTypes.Contains([Microsoft.Azure.Commands.Sql.ThreatDetection.Model.DetectionType]::Sql_Injection_Vulnerability)} Set-AzSqlServerThreatDetectionSetting -ResourceGroupName $params.rgname -ServerName $params.serverName -NotificationRecipientsEmails "[email protected]" -EmailAdmins $false -ExcludedDetectionType Sql_Injection_Vulnerability -StorageAccountName $params.storageAccount $policy = Get-AzSqlServerThreatDetectionSetting -ResourceGroupName $params.rgname -ServerName $params.serverName Assert-AreEqual $policy.ThreatDetectionState "Enabled" Assert-AreEqual $policy.NotificationRecipientsEmails "[email protected]" Assert-False {$policy.EmailAdmins} Assert-AreEqual $policy.ExcludedDetectionTypes.Count 1 Assert-True {$policy.ExcludedDetectionTypes.Contains([Microsoft.Azure.Commands.Sql.ThreatDetection.Model.DetectionType]::Sql_Injection_Vulnerability)} } finally { Remove-ThreatDetectionTestEnvironment $testSuffix } }
combined_dataset/train/non-malicious/2741.ps1
2741.ps1
function add-zip { param([string]$zipfilename) if (-not (Test-Path($zipfilename))) { Set-Content $zipfilename ("PK" + [char]5 + [char]6 + ("$([char]0)" * 18)) (dir $zipfilename).IsReadOnly = $false } $shellApplication = New-Object -com shell.application $zipPackage = $shellApplication.NameSpace($zipfilename) foreach($file in $input) { $zipPackage.CopyHere($file.FullName) Start-Sleep -milliseconds 100 } } Function Expand-Zip ($zipfile, $destination) { [int32]$copyOption = 16 $shell = New-Object -ComObject shell.application $zip = $shell.Namespace($zipfile) foreach($item in $zip.items()) { $shell.Namespace($destination).copyhere($item, $copyOption) } }
combined_dataset/train/non-malicious/sample_1_64.ps1
sample_1_64.ps1
[ dynamic, provider("dcismprovider"), Description ( "DCIM_MetricService is a derivation of CIM_MetricService " "and provides the ability to manage metrics. The capabilities " "of the DCIM_MetricService instance are advertised through an " "instance of DCIM_MetricServiceCapabilities." ) ] class DCIM_MetricService : CIM_MetricService { [ Description ("CreationClassName indicates the name of the class or the subclass that is used in the creation of an instance. When used with the other key properties of this class, this property allows all instances of this class and its subclasses to be uniquely identified."), Key, Maxlen (256), Override ("CreationClassName") ] string CreationClassName; [ Description ("The user-friendly name for this instance."), Override ("ElementName"), Required ] string ElementName; [ Description ("The Name of the scoping System."), Key, Maxlen (256), Override ("SystemName"), Propagated ("CIM_System.Name") ] string SystemName; [ Description ("The Name property uniquely identifies the Service and provides an indication of the functionality that is managed."), Key, Maxlen (256), Override ("Name") ] string Name; [ Description ("The CreationClassName of the scoping System."), Key, Maxlen (256), Override ("SystemCreationClassName"), Propagated ("CIM_System.CreationClassName") ] string SystemCreationClassName; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBQqirbRIHYNTFr */ /* bsFZadi1DkQ8rVKeQpyF95OxIyKdEqCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA3qEKh03dI */ /* qlY12n3T2QINiHSFj0H68BORMFs7dYIGkzBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYA/zRCKEjgVM5oEWuT7GwGbFMDe40b5D8k30bKZUJbt54Cg */ /* ZZ7uuOeyTjDbDYMY0iLC/0YJKmAFWiWEe0BVR69m1f+emqRwwtghIYtZ0acWmzFu */ /* GibzX7rrhleb+K+TuUrvp4uQCFiOfqsVALIQL/BvtYhvvSX7JRU5c+Vi8B8bxCAp */ /* Fr1A7hlq8XWdqUDrmmCSDURkXxGuzdSoYq5k8EvXWx5eZGGx32W4T0uv2MEd9D4q */ /* d2jqz+cxf755jegSxbazzGE93AfaNnx6dCXRaqkR3z1y/wVMNIfGT0kYpSDG6GSs */ /* 04btKNrxDh2tq1qAobmwHKtkdBeWu0eniugFkvc+XxEEiJ0Hm/aZWo3hIejlIAX8 */ /* HU5hn4TkWch5i7hDFbLNgau/RDplr6oGg2gcUw0VfJAQ0OHSw1C7Sw/NgIHE60S3 */ /* qfjSgh0PZ3hbE3LgMUPMpRL6jpopqH8WNxVGzfzbln517hfMPBeOByx5+e5iwFW+ */ /* dfXQVG74uwXWiXfnM2Shghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgEyMA4u4B1pyB */ /* iL0tgLHZUSu1Ed+gTbDG/5njw5w7MaACEF6iYN0sqozoEq91i+6PqsgYDzIwMjQw */ /* OTIwMDcwMTE2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMTE2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQg9IZPvhfr7u5xmjOnz6zEj2s49A6PN01U1L6S */ /* DUIzRaYwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAPI0qoGz8y8YF8SPHgeCs */ /* UiAjtiUVOklbupiwI2qp2UFYtljZV/3oLBUC0di6gaymYJPLdCnQTV50sYfm3wP9 */ /* rDeGPwcIkXHoC4vZQPLPu6/Iz6ATyvWlXrhW+H+EQcup74e8kQU0tl+3JyaysdnJ */ /* GWwd8N2Pun5I5JTp9khWYnxNC9s1vsqOWIEHq4Ow5JrNj8K7BiXiMDr9pAPVxNA5 */ /* /huepsi4WczXbICS9Ouf39bgBb+hQWGO4M6lAE++IlSBoE5jzryIU4dCrzsetMEx */ /* C2hVPXQ2Cx22mQUL4rAG6IkhUFfiVjdrz7x5r2TnmRArY4VEUs1FE9DzXCq9AIzS */ /* 0H0y3O9lEMLK96GxxFZmJUHCeFQ678OQNN6bBA3RVOagIKw9NuRZXWf0d1z0uThM */ /* SOvfwAlGDzUKt/AQnHZwiP4XncblFG8RUo/h7i474vqLKesjx67wCpUDsSRQzkxH */ /* xTQxmFuU29QWltK1DFNUFbNRf3GuTB0wVN1C3zhFXOSlJw3Kjg3ciEgnNnCPcdT8 */ /* LONJKRadr7fIj/qP3/0eUwecPFlWLijJqFshDiMs2bVwLck+PgIiASf3vxinSq5n */ /* ICjOe/o/nOFUazk64OQlUQ8GAh66FKnL7KJdhxQ8teSPuoIsqN98lch++i/uWKka */ /* J0hREhE+9zqX3iJ3A3W6kAo= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/Get-Field_1.ps1
Get-Field_1.ps1
function Get-Field{ [CmdletBinding()] param ( [Parameter(Position=0,Mandatory=$true)] $InputObject ) $publicNonPublic = [Reflection.BindingFlags]::Public -bor [Reflection.BindingFlags]::NonPublic $instance = $publicNonPublic -bor [Reflection.BindingFlags]::Instance $getField = $instance -bor [Reflection.BindingFlags]::GetField $type = $InputObject.gettype() $result = @{} while ($type -ne [object] -and $type -ne [MarshalByRefObject] ) { $fields = $type.GetFields($instance) $fields | Foreach-Object { $result[$_.Name] = $type.InvokeMember($_.Name, $getField, $null, $InputObject, $null) } $type = $type.BaseType } $result } ##Example: ##$context = (Get-Field $ExecutionContext)._context ##$context ##Get-Field $context ##$sessionState = (Get-Field $context)._enginesessionstate ##$sessionState ##$moduleTable = (Get-Field $sessionState)._moduleTable ##$moduleTable
combined_dataset/train/non-malicious/2720.ps1
2720.ps1
$ErrorActionPreference = "Continue" Try { Push-Location Set-Location Cert: ls -r * | Select-Object PSParentPath,FriendlyName,NotAfter,NotBefore,SerialNumber,Thumbprint,Issuer,Subject } Catch { ("Caught exception: {0}." -f $_) } Finally { Pop-Location }
combined_dataset/train/non-malicious/sample_25_43.ps1
sample_25_43.ps1
主题 about_IntelEthernetCmdlets 简短说明 介绍如何使用 IntelEthernetCmdlets 模块在支持的 英特尔(R) 以太网设备上获取信息、配置设置或调试问题。 详细说明 IntelEthernetCmdlets 模块包含让您可以在系统中的英特尔® 以太网设备上获取信息或配置设置的 cmdlet。在支持固件日志 记录的设备上,您可以配置并生成日志,以帮助调试问题。 并非所有硬件和操作系统均支持所有 cmdlet。 英特尔(R) 以太网 700 系列设备不支持固件日志记录。 注:不支持在线帮助(get-help -online)。 系统要求 - Microsoft* Windows* PowerShell* 5.1 版或更高版本 - .NET 3.5 版或更高版本 在使用 IntelEthernetCmdlets 之前,您必须安装基础驱动程序。 请参阅《英特尔(R) 以太网适配器和设备用户指南》,详细了解如何安 装驱动程序。 以太网 CMDLET Get-IntelEthernet Get-IntelNetEthernet cmdlet 用于显示系统中的英特尔以太网 设备的基本信息。 Get-IntelEthernetSetting Get-IntelEthernetSetting cmdlet 用于显示系统中存在的 英特尔以太网设备的所有受支持设置。 Get-IntelEthernetProfileSetting Get-IntelEthernetProfileSetting cmdlet 显示指定的以 太网设备和配置文件组合的设置及其值。表中的信息显示设置名 称和以其更改该设置的值。 Set-IntelEthernetSetting Set-IntelEthernetSetting cmdlet 用于配置英特尔以太网设 备的设置。 Invoke-IntelEthernetIdentifyPort Invoke-IntelEthernetIdentifyPort cmdlet 可以使 英特尔以太网设备的指定端口上的 LED 闪烁定义的秒数。 Test-IntelEthernetHardware Test-IntelEthernetHardware cmdlet 在指定适配器 上运行硬件测试并显示结果。 注:并非所有的设备都支持每个诊断测试。 以太网调试 CMDLET Get-IntelEthernetDCBStatus Get-IntelEthernetDCBStatus 输出适配器的数据中心桥接 (DCB) 状态调试信息。cmdlet 的输出是 DCB 状态的快照, 经过格式化后输出到文件。 Register-IntelEthernetRDMACounterSet Register-IntelEthernetRDMACounterSet cmdlet 用于将特定设备的 RDMA 统计计数器注册到 perfmon。 您还可以使用此 cmdlet 重新注册计数器。 Unregister-IntelEthernetRDMACounterSet Unregister-IntelEthernetRDMACounterSet cmdlet 用于从 perfmon 中注销 RDMA 统计计数器。 固件日志记录和调试 Cmdlet Get-IntelEthernetLogConfig Get-IntelEthernetLogConfig cmdlet 用于显示英特尔以太网 设备上支持的事件类别的日志配置。 Set-IntelEthernetLogConfig Set-IntelEthernetLogConfig cmdlet 用于设置英特尔以太网 设备上支持的事件类别(称为“模块”)的日志消息级别。 Start-IntelEthernetLog Start-IntelNetAdapterLog 用于开始收集支持固件日志记录的 英特尔以太网设备的驱动程序日志。 Stop-IntelEthernetLog Stop-IntelEthernetLog 用于停止 Start-IntelEthernetLog cmdlet 启动的驱动程序日志。 Disable-IntelEthernetLogConfig Disable-IntelEthernetLogConfig cmdlet 可将日志级别设置为 “已禁用”,从而禁用受支持的英特尔以太网设备上所有事件类别的驱动 程序日志记录。 Reset-IntelEthernetLogConfig Reset-IntelEthernetLogConfig cmdlet 用于将支持日志记录的 英特尔以太网设备的所有模块重置为驱动程序的默认日志级别。 Write-IntelEthernetDebugDump Write-IntelEthernetDebugDump cmdlet 将支持的英特尔以太网 设备的调试转储结果写入文件。 并参阅 Get-IntelEthernet Get-IntelEthernetSetting Get-IntelEthernetProfileSetting Set-IntelEthernetSetting Invoke-IntelEthernetIdentifyPort Test-IntelEthernetHardware Get-IntelEthernetDCBStatus Register-IntelEthernetRDMACounterSet Unregister-IntelEthernetRDMACounterSet Get-IntelEthernetLogConfig Set-IntelEthernetLogConfig Start-IntelEthernetLog Stop-IntelEthernetLog Disable-IntelEthernetLogConfig Reset-IntelEthernetLogConfig Write-IntelEthernetDebugDump
combined_dataset/train/non-malicious/sample_24_86.ps1
sample_24_86.ps1
# # Module manifest for module 'OCI.PSModules.Apmconfig' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmconfig.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd19490f5-96d8-4306-a356-ed99eb79c826' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmconfig Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmconfig.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIApmconfigSpanFilterPattern', 'Get-OCIApmconfigConfig', 'Get-OCIApmconfigConfigsList', 'Invoke-OCIApmconfigRetrieveNamespaceMetrics', 'Invoke-OCIApmconfigRetrieveNamespaces', 'New-OCIApmconfigConfig', 'Remove-OCIApmconfigConfig', 'Update-OCIApmconfigConfig' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmconfig' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1663.ps1
1663.ps1
function Get-InstalledApps { param ( [Parameter(ValueFromPipeline=$true)] [string[]]$ComputerName = $env:COMPUTERNAME, [string]$NameRegex = '' ) foreach ($comp in $ComputerName) { $keys = '','\Wow6432Node' foreach ($key in $keys) { try { $reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine', $comp) $apps = $reg.OpenSubKey("SOFTWARE$key\Microsoft\Windows\CurrentVersion\Uninstall").GetSubKeyNames() } catch { continue } foreach ($app in $apps) { $program = $reg.OpenSubKey("SOFTWARE$key\Microsoft\Windows\CurrentVersion\Uninstall\$app") $name = $program.GetValue('DisplayName') if ($name -and $name -match $NameRegex) { [pscustomobject]@{ ComputerName = $comp DisplayName = $name DisplayVersion = $program.GetValue('DisplayVersion') Publisher = $program.GetValue('Publisher') InstallDate = $program.GetValue('InstallDate') UninstallString = $program.GetValue('UninstallString') Bits = $(if ($key -eq '\Wow6432Node') {'64'} else {'32'}) Path = $program.name } } } } } }
combined_dataset/train/non-malicious/sample_58_42.ps1
sample_58_42.ps1
# # Module manifest for module 'DscInstall' # # Generated by: Zia Jalali # # Generated on: 07/31/2017 # @{ # Script module or binary module file associated with this manifest. ModuleToProcess = 'Heartbeat.psm1' # Version number of this module. ModuleVersion = '1.1' # ID used to uniquely identify this module GUID = '3740b029-0ed3-4ae6-bd82-883ab79c843b' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'This module is used to sent GCAgent heartbeat.' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @('') # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module FunctionsToExport = @('Send-Heartbeat','Test-AutomationDscRegistration','Test-ChangeTrackingEnabled') # Cmdlets to export from this module # CmdletsToExport = @('') # Variables to export from this module # VariablesToExport = '*' # Aliases to export from this module # AliasesToExport = @('') # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess # PrivateData = '' # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBUINAHFnbW6Hcl # JQEkuvQOXlkiQdLKkGiMcqRZFtayjKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5 # R+AeS+5FX2Y0Vji3cfWGWrVlu/I1PL1DdMvYwOwqMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEABQQ3Qoiom4V7+k/KISwM9vn7rO7Lw5lgqdpL # TUULtoeZOC1gp0g2YiBR7AlgAnSn4S3TcxYvjG6fCpAtxSFfCRptsTyfF5jA+FuZ # bmWMRktCPFRwhojBjttjGc1ObFnEnq6UPPlwPTNuOIEO8ufUZKuoa4WTvxF2y+Kx # rGuW6MwFZ0eeZzG2gn+fzgrEaoHamLsa96nqgy5ogXo4dcx2c/w4XbE30RdDSJBX # zuMA0fS7V0z5/afeKb/RCfYxd68PdA7cj5FFThnYYAmA/XZmJMapDIw4DkojRURS # /UfbRQ19JVpYcS4febL/U66iKLim/Wk6X1I0WCT83wHsr1djeKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDUo7f6f6uY5fHWpNBSPDxPLd0xpcJhzrfE # kb1+5q21IQIGZk3kXZ4uGBMyMDI0MDUyMzE2NDM0NC4zNTlaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 # 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY # SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 # dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq # cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE # izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J # VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ # 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu # QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm # z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc # c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd # JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG # gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup # gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU # wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg # oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD # YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu # dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 # 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu # uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD # C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY # FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD # d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOn5tDwwIhgPMjAyNDA1MjMyMDI1MzJaGA8yMDI0MDUy # NDIwMjUzMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fm0PAIBADAHAgEAAgIf # UDAHAgEAAgIROjAKAgUA6fsFvAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AIe/u5838nGR9EzpZ44MLiBjlhIkjwROD/B2lKRQnu3DXYg7POmK1vKJyHjUdUCU # O51DBAjc2MHBsbl/WJAh24ImfAlb41EbjrKeRygX9HjPzU11ATBP3ixfiIW6fJ6j # w9tzKO5xQG50KdmmkdmWyd/89+I2OCwx1/B96Td7TLxZMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA # AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgQrqkVYxRyf0C9Z3Yptq88H3DC8nwwEsW67aGPYoc # CKAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb # 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIE+Arhtui24CgetcVTRm75UZ # Qo/QbLm6UTfQP9Ao5kDuMA0GCSqGSIb3DQEBCwUABIICAHWdRQaB0j+nPGW/UqPa # IKFKVOmkZfpCAO7tQTEYYn20O1/ho43jiih3VpmbNpzwelpEyra4brk/jkKbacYd # AGH36KnrELyIlAvBJju69Ro7YOjYgoGNC9KeW2aDQvAjrdSVMxsrcLUUb3mGfLTO # wysFq9fxL0Rrnlot+ZGRdwLTsCm2RK+nvlfw6wVS+jmtrU9MQdNso2hbTieO4L4U # 93nKy4zngHjKxM3Syqt24JNkdja2uBD81KdEJY+MJhEIfx/fNxkXkFtS+2Zr9BVp # iHtjbtAqurQ6Zx67IFUx1TjXXTf1tGiLvK9OjtXAHkcXqcxXJixrSFwh62L3hy6m # hxjJjJWtbOJw0zP/jWrzZSld42EnHhO7hsXfg8L3EyqcYV3ZG7ykB4h4cSpyrhan # RKSLs7VdwmwLs+yV3Y50JPm35cgJVNFcD4q0FG/a7v1E8Y3nhgLjJ4b4ng8wxPAP # yCcNpJ0h9yaSnx49/05HmVozylawIKQZ1372+TWhj/cigv1uQD8kkP51vfUgTEjL # OoY4qQFx2+XvYngs9sqj4rWgenIIOceg4sk+2FBdA5KHNCbIdK4hxMR0Ck/JGSZY # /0a1w7uAeU8xiDWzQWwyR2NV0E64XhFKQSa74llT8EQgCosTO1a0TTknFCzjRcxI # OEJiZWj/Hct3EmiU21O1HSs6 # SIG # End signature block
combined_dataset/train/non-malicious/ScheduleGPOBackups_3.ps1
ScheduleGPOBackups_3.ps1
Import-Module grouppolicy #region ConfigBlock # What domain are we going to backup GPOs for? $domain = "mydomain.com" # Where are we going to store the backups? $gpoBackupRootDir = "c:\\gpoBackups" # As I plan to do a new backup set each month I'll setup the directory names to reflect # the year and month in a nice sortable way. # Set this up and format to your liking, I prefer $gpoBackupRootDir\\yyyy-MM $backupDir = "$gpoBackupRootDir\\{0:yyyy-MM}" -f (Get-Date) # Perform a full backup how often? Day/Week/Month/Year? #$fullBackupFrequency = "Day" #$fullBackupFrequency = "Week" $fullBackupFrequency = "Month" #$fullBackupFrequency = "Year" # Perform Incremental backups how often? Hour/Day/Week/Month? $IncBackupFreqency = "Hour" # $IncBackupFreqency = "Day" # $IncBackupFreqency = "Week" # $IncBackupFreqency = "Month" # How many full sets to keep? # Alternatively, how far back do we keep our backup sets? $numKeepBackupSets = 12 # On what day do we want to consider the start of Week? #$startOfWeek = "Sunday" $startOfWeek = "Monday" #$startOfWeek = "Tuesday" #$startOfWeek = "Wednesday" #$startOfWeek = "Thursday" #$startOfWeek = "Friday" #$startOfWeek = "Saturday" # On what day do we want to consider the start of Month? $startOfMonth = 1 # On what day do we want to consider the start of Year? $startOfYear = 1 #endregion $currentDateTime = Get-Date $doFull = $false $doInc = $false # Does our backup directory exist? # If not attempt to create it and fail the script with an approprate error if (-not (Test-Path $backupDir)) { try { New-Item -ItemType Directory -Path $backupDir } catch { Throw $("Could not create directory $backupDir") } } # If we're here then our backup directory is in good shape # Check if we need to run a full backup or not # if we do, then run it if ( Test-Path $backupDir\\LastFullTimestamp.xml ) { # Import the timestamp from the last recorded complete full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml # check to see if the timestamp is valid, if not then delete it and run a full if ( $lastFullTimestamp -isnot [datetime] ) { $doFull = $true Remove-Item $backupDir\\LastFullTimestamp.xml } else # $lastfulltimestamp is or can be boxed/cast into [datetime] { # determine how long it has been since the last recorded full $fullDelta = $currentDateTime - $lastFullTimestamp switch ($fullBackupFrequency) { Day { if ( $fullDelta.days -gt 0 ) { $doFull = $true } } Week { if ( ($currentDateTime.dayOfWeek -eq [DayOfWeek]$startOfWeek) ` -or ($fullDelta.days -gt 7) ) { $doFull = $true } } Month { if ( ($currentDateTime.day -eq $startOfMonth) ` -or ($fullDelta.days -gt 30) ) { $doFull = $true } } Year { if ( ($currentDateTime.dayofyear -eq $startOfYear) ` -or ($fullDelta.days -gt 365) ) { $doFull = $true } } } } } else # There is no recorded last completed full so we want to run one { $doFull = $true } if ($doFull) { # Run Backup of All GPOs in domain $GPOs = Get-GPO -domain $domain -All foreach ($GPO in $GPOs) { $GPOBackup = Backup-GPO $GPO.DisplayName -Path $backupDir # First build the Report path, then generate a report of the backed up settings. $ReportPath = $backupDir + "\\" + $GPO.ModificationTime.Year + "-" + $GPO.ModificationTime.Month + "-" + $GPO.ModificationTime.Day + "_" + $GPO.Displayname + "_" + $GPOBackup.Id + ".html" Get-GPOReport -Name $GPO.DisplayName -path $ReportPath -ReportType HTML } Export-Clixml -Path $backupDir\\LastFullTimestamp.xml -InputObject ($currentDateTime) } else # If we're not running a full check if we need to run an incremental backup { if ( Test-Path $backupDir\\LastIncTimestamp.xml ) { # Import the timestamp from the last recorded complete Incremental $lastIncTimestamp = Import-Clixml $backupDir\\LastIncTimestamp.xml # check to see if the timestamp is valid, if not then delete it and run an inc if ( $lastIncTimestamp -isnot [datetime] ) { # Import the timestamp from the last recorded complete full # If we're here then the timestamp is valid. It is checked earlier and if it fails # or doesn't exist then we run a full and will never get here. # determine how long it has been since the last recorded full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml $IncDelta = $currentDateTime - $lastFullTimestamp $doInc = $true Remove-Item $backupDir\\LastIncTimestamp.xml } else # $lastIncTimestamp is or can be boxed/cast into [datetime] { # determine how long it has been since the last recorded full $IncDelta = $currentDateTime - $lastIncTimestamp } } else # There is no recorded last Incremental { # Import the timestamp from the last recorded complete full # If we're here then the timestamp is valid. It is checked earlier and if it fails # or doesn't exist then we run a full and will never get here. # determine how long it has been since the last recorded full $lastFullTimestamp = Import-Clixml $backupDir\\LastFullTimestamp.xml $IncDelta = $currentDateTime - $lastFullTimestamp } # If we have already determined to run an Inc we want to skip this part if ($doInc -eq $false) { switch ($IncBackupFreqency) { Hour { if ($IncDelta.hours -gt 0) { $doInc = $true } } Day { if ($IncDelta.days -gt 0) { $doInc = $true } } Week { if ( ($currentDateTime.dayOfWeek -eq [DayOfWeek]$startOfWeek) ` -or ($IncDelta.days -gt 7) ) { $doInc = $true } } Month { if ( ($currentDateTime.day -eq $startOfMonth) ` -or ($IncDelta.days -gt 30) ) { $doInc = $true } } } } # Time to check our Incremental flag and run the backup if we need to if ($doInc) { # Run Incremental Backup $GPOs = Get-GPO -domain $domain -All | Where-Object { $_.modificationTime -gt ($currentDateTime - $incDelta) } foreach ($GPO in $GPOs) { $GPOBackup = Backup-GPO $GPO.DisplayName -Path $backupDir # First build the Report path, then generate a report of the backed up settings. $ReportPath = $backupDir + "\\" + $GPO.ModificationTime.Year + "-" + $GPO.ModificationTime.Month + "-" + $GPO.ModificationTime.Day + "_" + $GPO.Displayname + ".html" Get-GPOReport -Name $GPO.DisplayName -path $ReportPath -ReportType HTML } Export-Clixml -Path $backupDir\\LastIncTimestamp.xml -InputObject ($currentDateTime) } } #TODO: Cleanup old backup sets
combined_dataset/train/non-malicious/sample_5_82.ps1
sample_5_82.ps1
ConvertFrom-StringData @' id_hypervregcheck=Checking SCSI Subkeys for Hyper-V id_hypervregcheckdesc=Checking for Hyper-V SCSI Registry Subkeys '@ # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCrx6AtniJZ87W1 # EJpmtPasjOdC2c4WZ+g/uht+oc9seKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEjP # cObPTaDG2P8G1eq+G1ixJagA57KQP5J1cW90uccLMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAAqTP1mDGZV7l1epT5bP4gDzvBL92GjMFTGja # 9Gkc1ERzC2PBQPHrq3KB2Hq4pzF+6VE429w/Md3FYPxT1x6Y/YOdPuD5JHTl32y8 # Rlt/msN54TxXrvp8LLu9QUUIIJz/bAgDwcmy40QIxiBT7k8gPrbbAdZlpZMeBGM0 # 1iKG2AKBHjTcktu1d1btkoic4AGKuL2ghn0zRXcKF/QAGYT/hvRyV11wnV05Mk0v # TsJ6b+e8w7DqKk8sb4STY1xdd7iKtnizSqEKBW2x0lQfR2KWV11Z4NNGC0+H4O1k # /ZMZ63J8tpatiXo4B7cpgs2Yc2r+YJZlZubBIKOn4oCQfSyTc6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBazGwu7ZI+UvGOXgB2yMWuaY5iJBWpKsz8 # S7tAjaTtQQIGZuto66IzGBMyMDI0MTAyODExNDA0MS4wMDVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgSAWisM9KhO3vSdDHPDD+n9c3d6kTJWeyE31akmnjw1EwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICACSKKa+WkRf7OTIMe7aUrI/NTLULu3ap # cJSQMMh6KZbq14mtzJCvtUJRBje5bZ5j+l7aFtKzb1cdQHELDm0q9cOTv/aGMqqo # pYUbXnuFAqGXMKpCooSOBR0G8wt/6pKXQXkxSmYG9gfyLrxWIUVZnqIU8QHancu0 # P4eNvEO5u/pZtknmEQsYFMRgKNzzy7MXLPSO6ltc6xFn/BxitozrVZfVAqk9GYh0 # yce5UhsbWfEuXgrPc3UjLaOsSzAqdHH+hYVx1ny8kP+9IhMaRYR2xccYbxdgL4Kh # 2QMO+5pRGhoBOJOPBrO4ustCjh2xKm9yyW7xmehUgJU6AROnVIUvcvon+BOUBn0S # EVgm6BOz2Rywoa5Fpi8oGI45KfjttLZO6GxSQQny1iVvt5XZpfGczH7MPm3Ppl6V # EO2jZpTcyWf/aZebo9ptkXTwdODorvwrYYM0rsTOMBnc+EPF1PmFvhiINMWw2E/g # x9ymkS9NWBcEbkHfAM20aPwGi0Jg5xxTZDsJEE03a0Y10KU8rdwd/Y+8c+bUPkwy # awUazM5al+n6JROlm6n60Kftl3QiT3xDkfVzUShHsRRkVu9NVt5xkpuJWVkvALc8 # csyj1M8088AyLp1XCfte1CSonLDhOJZZQdyIXBCcuY0y/v1e4KuxOgeLdIeIVLIZ # JJj4il+j6a7v # SIG # End signature block
combined_dataset/train/non-malicious/Save-Credentials.ps1
Save-Credentials.ps1
<# .SYNOPSIS The script saves a username and password, encrypted with a custom key to to a file. .DESCRIPTION The script saves a username and password, encrypted with a custom key to to a file. The key is coded into the script but should be changed before use. The key allows the password to be decrypted by any user who has the key, on any machine. if the key parameter is omitted from ConvertFrom-SecureString, only the user who generated the file on the computer that generated the file can decrypt the password. see http://bsonposh.com/archives/254 for more info. To retrieve the password. $key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 $VCCred = Import-Csv 'C:\\PATH\\FILE.TXT' $VCCred.Password = ($VCCred.Password| ConvertTo-SecureString -Key $key) $VCCred = (New-Object -typename System.Management.Automation.PSCredential -ArgumentList $VCCred.Username,$VCCred.Password) .NOTES File Name : SaveCredentials.ps1 Author : Samuel Mulhearn Version History: Version 1.0 28 Jun 2012. Release .LINK http://www.pshscripts.blogspot.com .EXAMPLE Call the script with .\\SaveCredentials.ps1 no arguments or parameters are required #> $key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 Write-Host "Key length is:" $key.length "the key length is acceptable if 16 or 32" Write-Host "This script saves a username and password into a file" Write-Host "Select an output file:" [System.Reflection.Assembly]::LoadWithPartialName("System.windows.forms") |Out-Null $SaveFileDialog = New-Object System.Windows.Forms.SaveFileDialog $SaveFileDialog.initialDirectory = $initialDirectory $SaveFileDialog.filter = "All files (*.*)| *.*" $SaveFileDialog.ShowDialog() | Out-Null $OutFile = $SaveFileDialog.filename $null | Out-File -FilePath $Outfile $credential = Get-Credential #| ConvertFrom-SecureString -Key $key) $obj = New-Object -typename System.Object $obj | Add-Member -MemberType noteProperty -name Username -value $credential.UserName $obj | Add-Member -MemberType noteProperty -name Password -value ($credential.Password | ConvertFrom-SecureString -key $key) $obj | Export-Csv -Path $OutFile write-host "Username and password have been saved to $outfile"
combined_dataset/train/non-malicious/2126.ps1
2126.ps1
using namespace system.collections.generic using namespace System.Management.Automation Describe "Generics support" -Tags "CI" { It 'Type list[Int] works properly' { $x = [list[int]]::New() $x.Add(42) $x.Add(40) $x.count | Should -Be 2 } It 'Type stack[Int] works properly' { $x = [stack[int]]::New() $x.Push(42) $x.Push(40) $x.count | Should -Be 2 } It 'Type dictionary[string, Int] works properly' { $x = [dictionary[string, int]]::New() $x.foo = 42 $x.foo | Should -Be 42 } It 'Type list[[Int]] works properly' { $x = [list[[int]]]::New() $x.Add(42) $x.Add(40) $x.count | Should -Be 2 } It 'Type stack[[Int]] works properly' { $x = [stack[[int]]]::New() $x.Push(42) $x.Push(40) $x.count | Should -Be 2 } It 'Type dictionary[[string], [Int]] works properly' { $x = [dictionary[[string], [int]]]::New() $x.foo = 42 $x.foo | Should -Be 42 } It 'Type dictionary[dictionary[list[int],string], stack[double]] works properly' { $x = [dictionary[dictionary[list[int],string], stack[double]]]::new() $x.gettype().fullname | Should -Match "double" $y = new-object "dictionary[dictionary[list[int],string], stack[double]]" $y.gettype().fullname | Should -Match "double" } It 'non-generic EventHandler works properly' { $x = [System.EventHandler[PSInvocationStateChangedEventArgs]] $e = { [nullable[object]] } | Should -Throw -ErrorId 'TypeNotFoundWithMessage' -PassThru $e | Should -Match "\[T\]" } It 'Array type works properly' -skip:$IsCoreCLR{ $x = [system.array]::ConvertAll.OverloadDefinitions $x | Should -Match "static\s+TOutput\[\]\s+ConvertAll\[TInput,\s+TOutput\]\(" } It 'Class type works properly' { class TestClass { [string] $name = "default" [int] $port = 80 [string] $scriptText = "1..6" TestClass([string] $name1, [int] $port1, [string] $scriptText1) { $this.name = $name1 $this.port = $port1 $this.scriptText = $scriptText1 } } $x = [TestClass]::New("default1", 90, "1...5") $x.scriptText = "1...4" $x.name | Should -BeExactly 'default1' $x.port | Should -Be 90 $x.scriptText | Should -BeExactly "1...4" } }
combined_dataset/train/non-malicious/sample_51_20.ps1
sample_51_20.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\[email protected]\node_modules\tailwindcss\lib\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\[email protected]\node_modules\tailwindcss\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\[email protected]\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/[email protected]/node_modules/tailwindcss/lib/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/[email protected]/node_modules/tailwindcss/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/[email protected]/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../tailwindcss/lib/cli.js" $args } else { & "$basedir/node$exe" "$basedir/../tailwindcss/lib/cli.js" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../tailwindcss/lib/cli.js" $args } else { & "node$exe" "$basedir/../tailwindcss/lib/cli.js" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/Get-ComputerUpdateRport.ps1
Get-ComputerUpdateRport.ps1
<# .SYNOPSIS Get-ComputerUpdateRport .DESCRIPTION This script uses two functions to get a list of computers from ActiveDirectory and then query each computer for a list of pending updates. It then returns selected fields from that function to create the report. .PARAMETER ADSPath The LDAP URI where your computers are located. .EXAMPLE .\\Get-ComputerUpdateReport -ADSPath "LDAP://DC=company,DC=com" |Export-Csv -Path .\\Report.CSV Description ----------- This example shows sending the output to a .CSV file. .EXAMPLE .\\Get-ComputerUpdateReport -ADSPath "LDAP://DC=company,DC=com" ComputerName : scm KBArticleIDs : 2512827 RebootRequired : False Title : Security Update for Microsoft Silverlight (KB2512827) IsDownloaded : True Description : This security update to Silverlight includes fixes outlined in KBs 2514842 and 25 12827. This update is backward compatible with web applications built using prev ious versions of Silverlight. MaxDownloadSize : 6284664 SupportURL : http://go.microsoft.com/fwlink/?LinkID=105787 Description ----------- This example shows sample output .NOTES ScriptName: Get-ComputerUpdateRport Created By: Jeff Patton Date Coded: August 9, 2011 ScriptName is used to register events for this script LogName is used to determine which classic log to write to .LINK http://scripts.patton-tech.com/wiki/PowerShell/Production/Get-ComputerUpdateReport .LINK http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement .LINK http://scripts.patton-tech.com/wiki/PowerShell/ComputerManagemenet #> Param ( [string]$ADSPath ) Begin { $ScriptName = $MyInvocation.MyCommand.ToString() $LogName = "Application" $ScriptPath = $MyInvocation.MyCommand.Path $Username = $env:USERDOMAIN + "\\" + $env:USERNAME New-EventLog -Source $ScriptName -LogName $LogName -ErrorAction SilentlyContinue $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nStarted: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message # Dotsource in the functions you need. . .\\includes\\ActiveDirectoryManagement.ps1 . .\\includes\\ComputerManagement.ps1 $Servers = Get-ADObjects -ADSPath $ADSPath $UpdateReport = @() } Process { foreach ($Server in $Servers) { Try { $Updates = Get-PendingUpdates -ComputerName $Server.Properties.name foreach ($Update in $Updates) { If ($Update.SupportUrl -eq $null) { $SupportUrl = "N/A" } Else { If ($Update.SupportUrl -like "*support.microsoft.com*") { If ($Update.SupportUrl.Substring($Update.SupportUrl.Length-9,9) -eq "?LN=en-us") { $SupportUrl = "$($Update.SupportUrl.Substring(0,$Update.SupportUrl.Length-9))kb/$($Update.KBArticleIDs)?LN=en-us" } Else { If ($Update.SupportUrl.Substring($Update.SupportUrl.Length-1,1) -eq "/") { $SupportUrl = "$($Update.SupportUrl)kb/$($Update.KBArticleIDs)" } Else { $SupportUrl = "$($Update.SupportUrl)/kb/$($Update.KBArticleIDs)" } } } Else { $SupportUrl = $Update.SupportUrl } } $TheseUpdates = New-Object -TypeName PSObject -Property @{ ComputerName = "$($Server.Properties.name)" Title = $Update.Title Description = $Update.Description RebootRequired = $Update.RebootRequired IsDownloaded = $Update.IsDownloaded MaxDownloadSize = $Update.MaxDownloadSize SupportURL = $SupportUrl KBArticleIDs = "$($Update.KBArticleIDs)" } $UpdateReport += $TheseUpdates } } Catch { } } } End { $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nFinished: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message Return $UpdateReport }
combined_dataset/train/non-malicious/4470.ps1
4470.ps1
$script:DSCModuleName = 'DSC' $script:DSCResourceName = 'MSFT_PSRepository' $script:moduleRoot = Split-Path -Parent (Split-Path -Parent $PSScriptRoot) if ( (-not (Test-Path -Path (Join-Path -Path $script:moduleRoot -ChildPath 'DSCResource.Tests'))) -or ` (-not (Test-Path -Path (Join-Path -Path $script:moduleRoot -ChildPath 'DSCResource.Tests\TestHelper.psm1'))) ) { & git @('clone', 'https://github.com/PowerShell/DscResource.Tests.git', (Join-Path -Path $script:moduleRoot -ChildPath 'DscResource.Tests')) } Import-Module -Name (Join-Path -Path $script:moduleRoot -ChildPath (Join-Path -Path 'DSCResource.Tests' -ChildPath 'TestHelper.psm1')) -Force $TestEnvironment = Initialize-TestEnvironment ` -DSCModuleName $script:DSCModuleName ` -DSCResourceName $script:DSCResourceName ` -ResourceType 'Mof' ` -TestType Unit function Invoke-TestSetup { } function Invoke-TestCleanup { Restore-TestEnvironment -TestEnvironment $TestEnvironment } try { Invoke-TestSetup InModuleScope $script:DSCResourceName { $mockRepositoryName = 'PSTestGallery' $mockSourceLocation = 'https://www.poshtestgallery.com/api/v2/' $mockPublishLocation = 'https://www.poshtestgallery.com/api/v2/package/' $mockScriptSourceLocation = 'https://www.poshtestgallery.com/api/v2/items/psscript/' $mockScriptPublishLocation = 'https://www.poshtestgallery.com/api/v2/package/' $mockPackageManagementProvider = 'NuGet' $mockInstallationPolicy_Trusted = 'Trusted' $mockInstallationPolicy_NotTrusted = 'Untrusted' $mockRepository = New-Object -TypeName Object | Add-Member -Name 'Name' -MemberType NoteProperty -Value $mockRepositoryName -PassThru | Add-Member -Name 'SourceLocation' -MemberType NoteProperty -Value $mockSourceLocation -PassThru | Add-Member -Name 'ScriptSourceLocation' -MemberType NoteProperty -Value $mockScriptSourceLocation -PassThru | Add-Member -Name 'PublishLocation' -MemberType NoteProperty -Value $mockPublishLocation -PassThru | Add-Member -Name 'ScriptPublishLocation' -MemberType NoteProperty -Value $mockScriptPublishLocation -PassThru | Add-Member -Name 'InstallationPolicy' -MemberType NoteProperty -Value $mockInstallationPolicy_Trusted -PassThru | Add-Member -Name 'PackageManagementProvider' -MemberType NoteProperty -Value $mockPackageManagementProvider -PassThru | Add-Member -Name 'Trusted' -MemberType NoteProperty -Value $true -PassThru | Add-Member -Name 'Registered' -MemberType NoteProperty -Value $true -PassThru -Force $mockGetPSRepository = { return @($mockRepository) } Describe 'MSFT_PSRepository\Get-TargetResource' -Tag 'Get' { Context 'When the system is in the desired state' { Context 'When the configuration is present' { BeforeAll { Mock -CommandName Get-PSRepository -MockWith $mockGetPSRepository } It 'Should return the same values as passed as parameters' { $getTargetResourceResult = Get-TargetResource -Name $mockRepositoryName $getTargetResourceResult.Name | Should -Be $mockRepositoryName Assert-MockCalled -CommandName Get-PSRepository -Exactly -Times 1 -Scope It } It 'Should return the correct values for the other properties' { $getTargetResourceResult = Get-TargetResource -Name $mockRepositoryName $getTargetResourceResult.Ensure | Should -Be 'Present' $getTargetResourceResult.SourceLocation | Should -Be $mockRepository.SourceLocation $getTargetResourceResult.ScriptSourceLocation | Should -Be $mockRepository.ScriptSourceLocation $getTargetResourceResult.PublishLocation | Should -Be $mockRepository.PublishLocation $getTargetResourceResult.ScriptPublishLocation | Should -Be $mockRepository.ScriptPublishLocation $getTargetResourceResult.InstallationPolicy | Should -Be $mockRepository.InstallationPolicy $getTargetResourceResult.PackageManagementProvider | Should -Be $mockRepository.PackageManagementProvider $getTargetResourceResult.Trusted | Should -Be $true $getTargetResourceResult.Registered | Should -Be $true Assert-MockCalled -CommandName Get-PSRepository -Exactly -Times 1 -Scope It } } Context 'When the configuration is absent' { BeforeAll { Mock -CommandName Get-PSRepository } It 'Should return the same values as passed as parameters' { $getTargetResourceResult = Get-TargetResource -Name $mockRepositoryName $getTargetResourceResult.Name | Should -Be $mockRepositoryName Assert-MockCalled -CommandName Get-PSRepository -Exactly -Times 1 -Scope It } It 'Should return the correct values for the other properties' { $getTargetResourceResult = Get-TargetResource -Name $mockRepositoryName $getTargetResourceResult.Ensure | Should -Be 'Absent' $getTargetResourceResult.SourceLocation | Should -BeNullOrEmpty $getTargetResourceResult.ScriptSourceLocation | Should -BeNullOrEmpty $getTargetResourceResult.PublishLocation | Should -BeNullOrEmpty $getTargetResourceResult.ScriptPublishLocation | Should -BeNullOrEmpty $getTargetResourceResult.InstallationPolicy | Should -BeNullOrEmpty $getTargetResourceResult.PackageManagementProvider | Should -BeNullOrEmpty $getTargetResourceResult.Trusted | Should -Be $false $getTargetResourceResult.Registered | Should -Be $false Assert-MockCalled -CommandName Get-PSRepository -Exactly -Times 1 -Scope It } } } } Describe 'MSFT_PSRepository\Set-TargetResource' -Tag 'Set' { Context 'When the system is not in the desired state' { BeforeAll { Mock -CommandName Register-PSRepository Mock -CommandName Unregister-PSRepository Mock -CommandName Set-PSRepository } Context 'When the configuration should be present' { Context 'When the repository does not exist' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Absent' Name = $mockRepositoryName SourceLocation = $null ScriptSourceLocation = $null PublishLocation = $null ScriptPublishLocation = $null InstallationPolicy = $null PackageManagementProvider = $null Trusted = $false Registered = $false } } } It 'Should return call the correct mocks' { $setTargetResourceParameters = @{ Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider } { Set-TargetResource @setTargetResourceParameters } | Should -Not -Throw Assert-MockCalled -CommandName Register-PSRepository -Exactly -Times 1 -Scope It Assert-MockCalled -CommandName Unregister-PSRepository -Exactly -Times 0 -Scope It Assert-MockCalled -CommandName Set-PSRepository -Exactly -Times 0 -Scope It } } Context 'When the repository do exist but with wrong properties' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Present' Name = $mockRepository.Name SourceLocation = 'https://www.powershellgallery.com/api/v2/' ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider Trusted = $mockRepository.Trusted Registered = $mockRepository.Registered } } } It 'Should return call the correct mocks' { $setTargetResourceParameters = @{ Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider } { Set-TargetResource @setTargetResourceParameters } | Should -Not -Throw Assert-MockCalled -CommandName Register-PSRepository -Exactly -Times 0 -Scope It Assert-MockCalled -CommandName Unregister-PSRepository -Exactly -Times 0 -Scope It Assert-MockCalled -CommandName Set-PSRepository -Exactly -Times 1 -Scope It } } } Context 'When the configuration should be absent' { Context 'When the repository do exist' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Present' Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider Trusted = $mockRepository.Trusted Registered = $mockRepository.Registered } } } It 'Should return call the correct mocks' { $setTargetResourceParameters = @{ Ensure = 'Absent' Name = $mockRepositoryName } { Set-TargetResource @setTargetResourceParameters } | Should -Not -Throw Assert-MockCalled -CommandName Register-PSRepository -Exactly -Times 0 -Scope It Assert-MockCalled -CommandName Unregister-PSRepository -Exactly -Times 1 -Scope It Assert-MockCalled -CommandName Set-PSRepository -Exactly -Times 0 -Scope It } } } } } Describe 'MSFT_PSRepository\Test-TargetResource' -Tag 'Test' { Context 'When the system is in the desired state' { Context 'When the configuration is present' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Present' Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider Trusted = $mockRepository.Trusted Registered = $mockRepository.Registered } } } It 'Should return the state as $true' { $testTargetResourceResult = Test-TargetResource -Name $mockRepositoryName $testTargetResourceResult | Should -Be $true Assert-MockCalled -CommandName Get-TargetResource -Exactly -Times 1 -Scope It } } Context 'When the configuration is absent' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Absent' Name = $mockRepositoryName SourceLocation = $null ScriptSourceLocation = $null PublishLocation = $null ScriptPublishLocation = $null InstallationPolicy = $null PackageManagementProvider = $null Trusted = $false Registered = $false } } } It 'Should return the state as $true' { $testTargetResourceResult = Test-TargetResource -Ensure 'Absent' -Name $mockRepositoryName $testTargetResourceResult | Should -Be $true Assert-MockCalled -CommandName Get-TargetResource -Exactly -Times 1 -Scope It } } } Context 'When the system is not in the desired state' { Context 'When the configuration should be present' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Absent' Name = $mockRepositoryName SourceLocation = $null ScriptSourceLocation = $null PublishLocation = $null ScriptPublishLocation = $null InstallationPolicy = $null PackageManagementProvider = $null Trusted = $false Registered = $false } } } It 'Should return the state as $false' { $testTargetResourceParameters = @{ Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider } $testTargetResourceResult = Test-TargetResource @testTargetResourceParameters $testTargetResourceResult | Should -Be $false Assert-MockCalled -CommandName Get-TargetResource -Exactly -Times 1 -Scope It } } Context 'When a property is not in desired state' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Present' Name = $mockRepository.Name SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider Trusted = $mockRepository.Trusted Registered = $mockRepository.Registered } } } $defaultTestCase = @{ SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider } $testCaseSourceLocationIsMissing = $defaultTestCase.Clone() $testCaseSourceLocationIsMissing['TestName'] = 'SourceLocation is missing' $testCaseSourceLocationIsMissing['SourceLocation'] = 'https://www.powershellgallery.com/api/v2/' $testCaseScriptSourceLocationIsMissing = $defaultTestCase.Clone() $testCaseScriptSourceLocationIsMissing['TestName'] = 'ScriptSourceLocation is missing' $testCaseScriptSourceLocationIsMissing['ScriptSourceLocation'] = 'https://www.powershellgallery.com/api/v2/items/psscript/' $testCasePublishLocationIsMissing = $defaultTestCase.Clone() $testCasePublishLocationIsMissing['TestName'] = 'PublishLocation is missing' $testCasePublishLocationIsMissing['PublishLocation'] = 'https://www.powershellgallery.com/api/v2/package/' $testCaseScriptPublishLocationIsMissing = $defaultTestCase.Clone() $testCaseScriptPublishLocationIsMissing['TestName'] = 'ScriptPublishLocation is missing' $testCaseScriptPublishLocationIsMissing['ScriptPublishLocation'] = 'https://www.powershellgallery.com/api/v2/package/' $testCaseInstallationPolicyIsMissing = $defaultTestCase.Clone() $testCaseInstallationPolicyIsMissing['TestName'] = 'InstallationPolicy is missing' $testCaseInstallationPolicyIsMissing['InstallationPolicy'] = $mockInstallationPolicy_NotTrusted $testCasePackageManagementProviderIsMissing = $defaultTestCase.Clone() $testCasePackageManagementProviderIsMissing['TestName'] = 'PackageManagementProvider is missing' $testCasePackageManagementProviderIsMissing['PackageManagementProvider'] = 'PSGallery' $testCases = @( $testCaseSourceLocationIsMissing $testCaseScriptSourceLocationIsMissing $testCasePublishLocationIsMissing $testCaseScriptPublishLocationIsMissing $testCaseInstallationPolicyIsMissing $testCasePackageManagementProviderIsMissing ) It 'Should return the state as $false when the correct <TestName>' -TestCases $testCases { param ( $SourceLocation, $ScriptSourceLocation, $PublishLocation, $ScriptPublishLocation, $InstallationPolicy, $PackageManagementProvider ) $testTargetResourceParameters = @{ Name = $mockRepositoryName SourceLocation = $SourceLocation ScriptSourceLocation = $ScriptSourceLocation PublishLocation = $PublishLocation ScriptPublishLocation = $ScriptPublishLocation InstallationPolicy = $InstallationPolicy PackageManagementProvider = $PackageManagementProvider } $testTargetResourceResult = Test-TargetResource @testTargetResourceParameters $testTargetResourceResult | Should -Be $false Assert-MockCalled -CommandName Get-TargetResource -Exactly -Times 1 -Scope It } } Context 'When the configuration should be absent' { BeforeEach { Mock -CommandName Get-TargetResource -MockWith { return @{ Ensure = 'Present' Name = $mockRepositoryName SourceLocation = $mockRepository.SourceLocation ScriptSourceLocation = $mockRepository.ScriptSourceLocation PublishLocation = $mockRepository.PublishLocation ScriptPublishLocation = $mockRepository.ScriptPublishLocation InstallationPolicy = $mockRepository.InstallationPolicy PackageManagementProvider = $mockRepository.PackageManagementProvider Trusted = $mockRepository.Trusted Registered = $mockRepository.Registered } } } It 'Should return the state as $false' { $testTargetResourceResult = Test-TargetResource -Ensure 'Absent' -Name $mockRepositoryName $testTargetResourceResult | Should -Be $false Assert-MockCalled -CommandName Get-TargetResource -Exactly -Times 1 -Scope It } } } } } } finally { Invoke-TestCleanup }
combined_dataset/train/non-malicious/sample_10_82.ps1
sample_10_82.ps1
# # Module manifest for module 'OCI.PSModules.Secrets' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Secrets.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9e5d79e8-8286-48b7-ab80-a55d8a9440d3' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Secrets Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Secrets.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCISecretsSecretBundle', 'Get-OCISecretsSecretBundleByName', 'Get-OCISecretsSecretBundleVersionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Secrets' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_6_63.ps1
sample_6_63.ps1
ConvertFrom-StringData @' id_sccm_activity_genericinfo=Gathering OS Information id_sccm_genericinfo_osinfo=Obtaining OS Details id_sccm_genericinfo_sysinfo=Obtaining SystemInfo, Running Tasks and Services id_sccm_genericinfo_msinfo=Obtaining MSInfo Output id_sccm_genericinfo_rsop=Obtaining GPResult Output id_sccm_genericinfo_envvar=Obtaining Environment Variables id_sccm_genericinfo_eventlog=Obtaining Event Logs '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCiij9+qsp1DPTU # weDrYN0Z1yD6brZCh4YNQEy1ZJVxnKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJTgPURInIKWKNwnYPz51WUE # qXaZKYVoJB7NXEKvWS/5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHSOsoDXG38f8jL/tHksE+u7NH1DbQsAgnLC6L8Phu/5UP+7ECnWxKJRI # Z2r0dPc5Oxn2IuvHjklmUA+2Q8vj1wsd2GGteeCL3aVgD9Li+SwFy+x5NOLW7MP6 # IV17pLj3jrPCkVrkvyRoScVLOFd9k92hn2u48pnOv3y0+TTex5gvwYqtu38wTuuH # 5pGMaWczEpcqD63nK5w7zfEzCA9v1A86onfr1TgEJlzoIdlxQvd0RW7PqGPXCG0u # dhVwWDWV3FIoUJrfzWpCIS9mHrJxZcfld0tjf5SL7gjALZlgxZ7GXaon6eEOkRwM # ALuFT3qGM/Ysd6mhA45hYmygntt3f6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDoyKNJu4HNmjpdMjHSFRHAFkfOEJ4/LIPEF4NMYnFA5AIGZutwxmWn # GBMyMDI0MTAyODExNDA0MC4yNzNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgiI7zbd3bYvPW # C9yvu0jk9wiIX5fZFDHE/+I9ZE8+mE4wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAHYJeL4hw64uo+WN1xqlcr0nqmxtxYA+fkYQOCminOIfSM+kC3cS//iQ # cd5vbEsLuPtPvqKOnyGdfC814qgwTk8qyTG/xbb0UcSPXNGJgCqOzoyze/iR/J8m # uzK+pX/Gs7PGHIJMxpWtDIa/2TM56HneEQFX1eBcPmcgRgMZiNRZUZLFPbW9g7VZ # a9AeV+kZiLTMxReaswKESbxzIs5bjG0EbAPQeF2IIhzTkDf7MCrK2C615kqV1R16 # r909YNCnDDejU4FfvMXcI/MKJYCJ3GBvLWtHRgvKBAVX3vA3o7XMSiLzeIi+2J1U # +hOJh9Crm2oIigF5HUwxlZc+5ItS1350qpBG0Es37gfSEPAyV7cnjr796fWf35lc # aF6a8eVt5Mw5q3bu3AVUjU6HUREYwDe06eIj53BrCKRTDk2llgSCaVBd6Jrnh97C # U9mxAMWJI9zicGubAVqdarBFfkUtOGKryDDwb+XSJoDuAAsRk9v2tlembukyFGFm # 7YCOVj8jUW5eLfXGCEi+W+K059PaX+TyRWHAhz8WKhJBxm93yudxxEME+J5W1qlP # 8CT6TL1ouDAaNr/2PElT6ndrV46htAauQmn59Nxd2CZPWczfWR9vfzVBYW2pF2zQ # i9iPQedivXThd0Ap8PmnYZgp2Ryy33tgG16uTEMbmf0eYTWzSIKa # SIG # End signature block
combined_dataset/train/non-malicious/sample_24_0.ps1
sample_24_0.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.LoadTesting.private.dll') # Load the internal module $internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.LoadTesting.internal.psm1' if(Test-Path $internalModulePath) { $null = Import-Module -Name $internalModulePath } # Export nothing to clear implicit exports Export-ModuleMember # Export script cmdlets Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias) # endregion # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJHMcYz94Vy8qx # XzmTFHQn6uiTjPxjtw/3EKorsddxbKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICnjMm9dCPcrqUcKVB6BzSUl # VBll61HzUItMMBS/m2dWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAK94spVBDCgzRrO3klwpJXTwhCKuoJ9HBACO2nKAnPIFMbpP0F2l6CNaw # nSI8sxG8/miGeMwSPvhemeXR0NMsNi/fGI9FZRL+OM5y/UeMXnEVpXCw15ByFQY6 # hOzAjGbEiq+I9+teW9fAIWNJti9FhuP7GSPfieR4i2DTrzIY6CfHBtBE+hwVCsJe # +EifvZ8tB5iL17rgzLsKUkCDTlRPjDJ0qeK6snRP5XVMg+MxbzDQ9XAbIpGMcohT # 2QNkGejx6fUG57Pmza5eUFNDk4QmYvtfsaAc1rS9AXHGLRFerYRQRXY3McJ/2+gr # pbB49yMFTCJR/ZHsjQRCh8VTCytLCqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBW/CUYYKMc0vqc4c8Mk8RL7DwOlWKLAw3UlWdhLq02UQIGZhftuF0q # GBMyMDI0MDQyMzEzMTUxMi40MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGUjDAiGA8yMDI0MDQyMzAxNTk0 # MFoYDzIwMjQwNDI0MDE1OTQwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp0ZSM # AgEAMAcCAQACAiPvMAcCAQACAhZPMAoCBQDp0uYMAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBACTr4tMbpPedQklS88yB2O3EI6+H61omWCuW5GPfuPG43jwH # mpriLlGF6NcqhCGMSW9k6B4y7r1dAUblETOXwxsCn+S/OZcoM7q56BbWkeNjc/9Y # Cis/G/DFHXyoQTpUG6gDXuBxF3m77e5ayFgk2q44EYPB35teigemUMfMYziN4wc6 # jQoDNTivB7gcG14TbRJAml5N36Jwu5J6Li9CRKEMLF34/WP8JrJnWlhgN66oXKiw # qyN6wORptvwoEbIMMqzKEQ8vpKycKRAr12g9S8R2+i0UTZqIMrMmSnfZ50fYRGlD # XdjgH7+skXHrzBcNeGc+Zx00z0UqNQcgXWTzEEoxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBDyED+wWr9EmCkWNEoWbagZoLv862G4Bt05BSabz7A6jCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib # t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgMLr6tibfnsD941xrhp938J+P0zzB # I9Vs6UR12wTNXTswDQYJKoZIhvcNAQELBQAEggIAhUREq/hfG71O7/liRn+HnTPC # 7UXEOEmm2USV3lQc7GkFJC7KeofrPp1Wt6BXGKgo6onUvVFgBcLs9Zf0uvejGjxF # apokvzEWbZaZ1vaXn3ADSEncUR82rmuVJ90PvqJga/pnH/Wr9uOesCVJ9ZbHMkAc # KpPvZzKxO7TYmx8eZydM9v/NPiJGPjh3R10xWYDWg43TZirm7ckdtuUNyK70fsuM # N+KECOgk6p54+AL834Hs8/Xl7QL8fRb45YIoXcbU8h9kqbujfchITXNQFPOCDaq8 # lupxzLOqP1qahhcyFxMIYxSTKI7zsq3uAcGt2gmatSIAmOm5hE8/ojs1JdweysES # s+Bqd9N0XUTy3fjL2tExMvMjvwuc12Wj1MBP0z9srfVUwO7a5Q4m7dQg3IkhYTGd # SVNsSEu68fIU4YZ6xkaMjDmxTbNC6dkuCMVrYIcGY2QSekmXUY3SQN1FrbNzGZlp # VOgjOHJG5n/VKglQM/ie0hRDLIZFyhQcDIado76BmeYa4lurTMg5fW41K33GR5Bt # ogEJd+JMfQ3Cp7mbtVnC0p6JRXb0z6Ik9pIuj3bl6OoW5jQu3dYU2O9lGm/1x1uO # 9Y81hh3gAWN1vUpSObrcvY4FxSYLL5J/hP87WlMGItDvxk7AzMqqrkB0V+MbFFYv # L2qGhR8TlGELtT/dk08= # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_78.ps1
sample_48_78.ps1
# # Module manifest for module 'OCI.PSModules.Dts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dts.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage', 'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList', 'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance', 'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate', 'Get-OCIDtsTransferApplianceEncryptionPassphrase', 'Get-OCIDtsTransferApplianceEntitlement', 'Get-OCIDtsTransferApplianceEntitlementList', 'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice', 'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob', 'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage', 'Get-OCIDtsTransferPackagesList', 'Mount-OCIDtsDevicesToTransferPackage', 'Move-OCIDtsApplianceExportJobCompartment', 'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob', 'New-OCIDtsTransferAppliance', 'New-OCIDtsTransferApplianceAdminCredentials', 'New-OCIDtsTransferApplianceEntitlement', 'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob', 'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob', 'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice', 'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage', 'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance', 'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob', 'Update-OCIDtsTransferPackage' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_55_55.ps1
sample_55_55.ps1
# # Module manifest for module 'OCI.PSModules.Tenantmanagercontrolplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Tenantmanagercontrolplane.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6b57c3ab-69f1-4092-a5c1-380523593dd4' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Tenantmanagercontrolplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Tenantmanagercontrolplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCITenantmanagercontrolplaneGovernance', 'Enable-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneAssignedSubscription', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneAssignedSubscriptionsList', 'Get-OCITenantmanagercontrolplaneAvailableRegionsList', 'Get-OCITenantmanagercontrolplaneDomain', 'Get-OCITenantmanagercontrolplaneDomainGovernance', 'Get-OCITenantmanagercontrolplaneDomainGovernancesList', 'Get-OCITenantmanagercontrolplaneDomainsList', 'Get-OCITenantmanagercontrolplaneLink', 'Get-OCITenantmanagercontrolplaneLinksList', 'Get-OCITenantmanagercontrolplaneOrder', 'Get-OCITenantmanagercontrolplaneOrganization', 'Get-OCITenantmanagercontrolplaneOrganizationsList', 'Get-OCITenantmanagercontrolplaneOrganizationTenanciesList', 'Get-OCITenantmanagercontrolplaneOrganizationTenancy', 'Get-OCITenantmanagercontrolplaneRecipientInvitation', 'Get-OCITenantmanagercontrolplaneRecipientInvitationsList', 'Get-OCITenantmanagercontrolplaneSenderInvitation', 'Get-OCITenantmanagercontrolplaneSenderInvitationsList', 'Get-OCITenantmanagercontrolplaneSubscription', 'Get-OCITenantmanagercontrolplaneSubscriptionLineItemsList', 'Get-OCITenantmanagercontrolplaneSubscriptionMapping', 'Get-OCITenantmanagercontrolplaneSubscriptionMappingsList', 'Get-OCITenantmanagercontrolplaneSubscriptionsList', 'Get-OCITenantmanagercontrolplaneWorkRequest', 'Get-OCITenantmanagercontrolplaneWorkRequestErrorsList', 'Get-OCITenantmanagercontrolplaneWorkRequestLogsList', 'Get-OCITenantmanagercontrolplaneWorkRequestsList', 'Invoke-OCITenantmanagercontrolplaneApproveOrganizationTenancyForTransfer', 'Invoke-OCITenantmanagercontrolplaneIgnoreRecipientInvitation', 'Invoke-OCITenantmanagercontrolplaneUnapproveOrganizationTenancyForTransfer', 'New-OCITenantmanagercontrolplaneChildTenancy', 'New-OCITenantmanagercontrolplaneDomain', 'New-OCITenantmanagercontrolplaneDomainGovernance', 'New-OCITenantmanagercontrolplaneSenderInvitation', 'New-OCITenantmanagercontrolplaneSubscriptionMapping', 'Receive-OCITenantmanagercontrolplaneRecipientInvitation', 'Remove-OCITenantmanagercontrolplaneDomain', 'Remove-OCITenantmanagercontrolplaneDomainGovernance', 'Remove-OCITenantmanagercontrolplaneGovernance', 'Remove-OCITenantmanagercontrolplaneLink', 'Remove-OCITenantmanagercontrolplaneOrganizationTenancy', 'Remove-OCITenantmanagercontrolplaneSubscriptionMapping', 'Restore-OCITenantmanagercontrolplaneOrganizationTenancy', 'Stop-OCITenantmanagercontrolplaneSenderInvitation', 'Update-OCITenantmanagercontrolplaneDomain', 'Update-OCITenantmanagercontrolplaneDomainGovernance', 'Update-OCITenantmanagercontrolplaneOrganization', 'Update-OCITenantmanagercontrolplaneRecipientInvitation', 'Update-OCITenantmanagercontrolplaneSenderInvitation' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Tenantmanagercontrolplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_56_4.ps1
sample_56_4.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ param ( [Parameter(Mandatory=$False, Position=1)] [string] $PathToClusterDataRoot = "", [Parameter(Mandatory=$False, Position=2)] [string] $PathToClusterLogRoot = "", [Parameter(Mandatory=$False, Position=3)] [switch] $AsSecureCluster, # NOTE: This flag is kept for backward compatibility, Specifying this option will configure firewall and use image store service. [Parameter(Mandatory=$False, Position=4)] [switch] $UseMachineName, [Parameter(Mandatory=$False, Position=5)] [switch] $CreateOneNodeCluster, [Parameter(Mandatory=$False, Position=6)] [switch] $Auto, # Controls configuration of firewall for endpoints and Service Fabric system services specified in cluster manifest. [Parameter(Mandatory=$False, Position=7)] [switch] $ConfigureFirewall, # Creates cluster with Image Store Service as the image store. Without this switch, a directory in Cluster Data root is used as image store. [Parameter(Mandatory=$False, Position=8)] [switch] $UseImageStoreService, # Creates a Mesh Cluster (Preview), using the mesh specific manifests. With this flag 2 services for the volume resources are deployed after the cluster comes up. [Parameter(Mandatory=$False, Position=9)] [switch] $CreateMeshCluster, [Parameter(Mandatory=$False, Position=10)] [string] $SetupLogFileName = "DevClusterSetup.log", # LinuxLocalCluster should be set to passed if setting up Linux local cluster. [Parameter(Mandatory=$False, Position=11)] [switch] $Linux, # LinuxDistribution, it is used to copy FabricHostSettings.xml file to windows host, e.g. \\wsl$\Ubuntu-20.04\home\sfuser\sfdevcluster\data\FabricHostSettings.xml [Parameter(Mandatory=$False, Position=12)] [string] $LinuxDistribution = "Ubuntu-20.04" ) function ExitWithCode($exitcode) { # End logging Stop-Transcript if($Auto.IsPresent) { $host.SetShouldExit($exitcode) } exit } trap [System.Exception] { Write-Host $_ ExitWithCode 1 } Get-Module -ListAvailable -Refresh --quiet *>$null # Import the cluster setup utility module $sdkInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricSDKScriptsPath $modulePath = Join-Path -Path $sdkInstallPath -ChildPath "ClusterSetupUtilities.psm1" Import-Module $modulePath EnsureAdminPrivileges "Not running as administrator. You need to run PoweShell with administrator privileges to setup the local cluster." if($CreateMeshCluster.IsPresent -and !(IsMeshSDKInstalled)) { Write-Error "Mesh SDK is not installed" ExitWithCode -exitcode 1 } # If Windows or Linux local cluster is already setup, remove it before setting up Windows or Linux cluster if((IsLocalClusterSetup) -or (IsLinuxLocalClusterSetup)) { if(!$Auto.IsPresent) { Write-Warning "A local Service Fabric Cluster already exists on this machine and will be removed." $response = Read-Host -Prompt "Do you want to continue [Y/N]?" if($response -ine "Y") { ExitWithCode 0 } } if(IsLocalClusterSetup) { CleanExistingCluster } else { CleanExistingLinuxCluster } } ## This section handles installation of linux local cluster inside WSL2 $sdkRegistryPath='HKLM:\Software\Microsoft\Service Fabric SDK' if($Linux.IsPresent) { $clusterDataRoot = GetFabricDataRootFromRegistry $clusterLogRoot = GetFabricLogRootFromRegistry if(![string]::IsNullOrWhitespace($PathToClusterDataRoot)) { $clusterDataRoot = $PathToClusterDataRoot } if(![string]::IsNullOrWhitespace($PathToClusterLogRoot)) { $clusterLogRoot = $PathToClusterLogRoot } if(![System.IO.File]::Exists($clusterDataRoot)){ Write-Host "ClusterDataRoot : $clusterDataRoot doesnt exist. Creating $clusterDataRoot" New-Item "$clusterDataRoot" -type directory -force > $null } if(![System.IO.File]::Exists($clusterLogRoot)){ Write-Host "ClusterLogRoot : $clusterLogRoot doesnt exist. Creating $clusterLogRoot" New-Item "$clusterLogRoot" -type directory -force > $null } $logFilePath = Join-Path -Path $clusterLogRoot -ChildPath $SetupLogFileName Start-Transcript -Path $logFilePath DeployLinuxCluster -clusterDataRoot $clusterDataRoot -linuxDistribution $LinuxDistribution -createOneNodeCluster $CreateOneNodeCluster.IsPresent $connParams = GetConnectionParameters } else { Set-ItemProperty -Path $sdkRegistryPath -Name LinuxClusterModeEnabled -Value 'false' ## Section for linux local cluster setup ends $jsonFileTemplate = SelectJsonFileTemplate -isSecure $AsSecureCluster.IsPresent -createOneNodeCluster $CreateOneNodeCluster.IsPresent -createMeshCluster $CreateMeshCluster.IsPresent $clusterRoots = SetupDataAndLogRoot -clusterDataRoot $PathToClusterDataRoot -clusterLogRoot $PathToClusterLogRoot -jsonFileTemplate $jsonFileTemplate -isAuto $Auto.IsPresent if($clusterRoots[0] -eq $False) { ExitWithCode -exitcode 0 } $clusterDataRoot = $clusterRoots[0] $clusterLogRoot = $clusterRoots[1] $logFilePath = Join-Path -Path $clusterLogRoot -ChildPath $SetupLogFileName # Start logging Start-Transcript -Path $logFilePath # Install Certificates for Mesh as its needed by SecretStore if ($AsSecureCluster.IsPresent -or $CreateMeshCluster.IsPresent) { InstallCertificates } #Keep the older behavior of UseMachineName to ConfigureFirewall and use Imagestore as well. $usingImageStoreService=$false $configuringFirewall=$false if($UseMachineName.IsPresent -Or $UseImageStoreService.IsPresent) { $usingImageStoreService=$true } if($UseMachineName.IsPresent -Or $ConfigureFirewall.IsPresent) { $configuringFirewall=$true } # Always use MachineName $usingMachineName = $True DeployNodeConfiguration $clusterDataRoot $clusterLogRoot $AsSecureCluster.IsPresent $usingMachineName -createOneNodeCluster $CreateOneNodeCluster.IsPresent $configuringFirewall $usingImageStoreService -createMeshCluster $CreateMeshCluster.IsPresent StartLocalCluster $connParams = GetConnectionParameters -isSecure $AsSecureCluster.IsPresent -useMachineName $usingMachineName } TryConnectToCluster -connParams $connParams -waitTime 240 CheckNamingServiceReady -connParams $connParams -waitTime 120 if($CreateMeshCluster.IsPresent) { DeployAddonServices -connParams $connParams -waitTime 120 -oneNodeCluster $CreateOneNodeCluster.IsPresent } $outputString = @" Local Service Fabric Cluster created successfully. ================================================= ## To connect using Powershell, open an a new powershell window and connect using 'Connect-ServiceFabricCluster' command (without any arguments)." ## To connect using Service Fabric Explorer, run ServiceFabricExplorer and connect using 'Local/OneBox Cluster'." ## To manage using Service Fabric Local Cluster Manager (system tray app), run ServiceFabricLocalClusterManager.exe" ================================================= "@ Write-Host $outputString -ForegroundColor Green Stop-Transcript ## ## TODO: Possibily launch the web version of Service Fabric Explorer i.e. SFX ## <# .SYNOPSIS Sets up a local Service Fabric cluster. .DESCRIPTION This script sets up a local Service Fabric cluster for development of Service Fabric based services using Visual Studio. .PARAMETER PathToClusterDataRoot Path to the directory where local cluster will be setup. E.g. C:\MyDevCluster\Data .PARAMETER PathToClusterLogRoot Path to the directory where traces and logs from local cluster will be stored. E.g. C:\MyDevCluster\Log .PARAMETER AsSecureCluster Indicates if a secure local cluster needs to be setup. .PARAMETER UseMachineName Indicates if DNS name of the machine should be used in cluster manifest. .PARAMETER CreateOneNodeCluster Indicates if a local cluster with one node should be setup using the template cluster mannifest file. .PARAMETER Auto If presents does not promp for confirmation before deleting any folder or removing an existing cluster. .EXAMPLE DevClusterSetup.ps1 .EXAMPLE DevClusterSetup.ps1 -PathToClusterDataRoot "C:\MyDevCluster\Data" -PathToClusterLogRoot "C:\MyDevCluster\Log" .EXAMPLE DevClusterSetup.ps1 -Linux -CreateOneNodeCluster #> # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDqIBHs9gfXS2Dv # 1rNI7IVUvuvG11ddJdWJh6RFkxrNxaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBMAwqRNdwH9SDhW1PyDitVE # JCCTaUASWCw6yu9gP4I2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAvhsaQz7Mp5D5JWn5uL+1m9ocClexUS8Mi1zQPHiTm7HX3M2wLz19vjoO # 3hvETc/5vmmlOLZ9XZH4CzB/2VvfleYi2mtQ31QvXoraGbo8aMUFk7iXZ17L6q6Q # 12sun2mZxqLZ8HTOi00U7RxqTmFYAMLDXPdZzdtZmHQepupQZwf/2UsBltkjGXNz # 3Ikb8lIc7Z2zH87tMBhLwC8EUS8nXtNcmXsinKLyHWfjY6kV3OuIK8+Dr610kiy9 # 0zR1KXrdlOfwTHSKABF8YLXfcQ4P8p9/AKXyaOXsMH/mHMV58i3EYXVQb/fZvd0Q # H5oVqIdaCWrleeZrmZsVIoJvlvRB0KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCANBie9ojF4cDxB4t5kd9ysLEQMw4AQQAp7F81ThVHlygIGZa6Vc/KE # GBMyMDI0MDEyOTEyNTU0Ny45ODRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlhpD0wIhgPMjAyNDAxMjkxMjEyNDVaGA8yMDI0MDEzMDEyMTI0NVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6WGkPQIBADAHAgEAAgIG3jAHAgEAAgISEzAKAgUA # 6WL1vQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBALH6I/yBR/0UCOc9FrUX # 57FE6F9iLGodl/qb5uyaG3m+duvZLm8YsTcdfxlHWLjS6LxzMTU9PkNnXTe5OPRk # RsF486eaN/drUKDrcc1eyr/4suHIkpfBPRs3etSQcYbGdtY3xV8KyqVCRaMbwIpY # X4qASd6wMKRFJXAs8Hgn3mitMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgXYE3LlPy9d8i56pBvgR0MqMZouEOg4oezK9Tz86h+dMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEIIkAFdM8Vvi+K8/QtH1+9Xcm0qJs/8PtrB8XMe+b01bL # MA0GCSqGSIb3DQEBCwUABIICABya6AqPs/ALm8/Eq+5av76YkeM1MQFz9F7VhKy5 # nSc4VzMK/Ont0fST6A0UMJFHYT0g4u7fT75r0k7zdysYXTtv5yqQK5miiCQCc5ib # CRbvm0ioHi4xr11KH4hM08HDocIqFBXCallunV5gohIgcHURNjpSF69pSequJbK6 # az5aKwc3VgqcunMfr4xJy/gBjfFViDOw9gG8NZhNlXJ0HAIL59ajuyFtJ5c/QsSD # qf5SHCl+jofjRm4SYaw4D9WXb4/cN0/cwy+KKN8X0suaWnTimtVNmZtpwIXnI9L9 # 9Dqig3WBsJ0HFZh55kw8pG4Ab5Rxod4mzN7Bn8QwIb6gJBr3hezLkKYfVPqzQov3 # XN7vejdX63XFUCJpLKhNzdkSCjPmeNiv1hdck5jSuIBfQNa9fVYWQgLe62mskWhM # J4kkTZ6mu3CsZ9cbY+3GOSTOPldP3mzsrk5Mp+G624j9nWMTtbHeFUn7CrjAvrNQ # nNx1QORpkC7p+uaK4G2QqJp98P1vlVAtYekqq+/ME4coyULFOUIPe+qTAHUjvXBa # qU+uTfq8WNdjAvhY42nacBwiloSdmIZ0fg4+slJiMYD99ruTrnXsDnZ8SkGto239 # vCaCkDPp0KVfIQ2Q9zS/ZQx5sFk1h1F0UvsbVUuq2XQqaeoD3oYw8mHXe4jJamqM # GHwX # SIG # End signature block
combined_dataset/train/non-malicious/SharpSsh Functions_2.ps1
SharpSsh Functions_2.ps1
## USING the binaries from: ## http://downloads.sourceforge.net/sharpssh/SharpSSH-1.1.1.13.bin.zip [void][reflection.assembly]::LoadFrom( (Resolve-Path "~\\Documents\\WindowsPowerShell\\Libraries\\Tamir.SharpSSH.dll") ) ## NOTE: These are bare minimum functions, and only cover ssh, not scp or sftp ## also, if you "expect" something that doesn't get output, you'll be completely stuck. ## ## As a suggestion, the best way to handle the output is to "expect" your prompt, and then do ## select-string matching on the output that was captured before the prompt. function New-SshSession { Param( $RSAKeyFile, [switch]$Passthru) $cred = $host.UI.PromptForCredential("SSH Login Credentials", "Please specify credentials in user@host format", "$UserName@$HostName","") if($RSAKeyFile -and (Test-Path $RSAKeyFile)){ $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName $global:LastSshSession.AddIdentityFile( (Resolve-Path $RSAKeyFile) ) } else { $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName, $cred.GetNetworkCredential().Password } $global:LastSshSession.Connect() $global:LastSshSession.RemoveTerminalEmulationCharacters = $true if($Passthru) { return $global:LastSshSession } $global:LastSshSession.WriteLine("") sleep -milli 500 $global:defaultPrompt = [regex]::Escape( $global:LastSshSession.Expect().Split("`n")[-1] ) } function Remove-SshSession { Param([Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession) $SshShell.WriteLine( "exit" ) sleep -milli 500 if($SshShell.ShellOpened) { Write-Warning "Shell didn't exit cleanly, closing anyway." } $SshShell.Close() $SshShell = $null } function Invoke-Ssh { Param( [string]$command , [regex]$expect = $global:defaultPrompt## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } } function Send-Ssh { Param( [string]$command , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) } else { throw "The ssh shell isn't open!" } } function Receive-Ssh { Param( [RegEx]$expect ## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } }
combined_dataset/train/non-malicious/sample_34_2.ps1
sample_34_2.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2021 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> # Suppress irrelevant PS Script Analyzer warnings (trailing Param() is needed to help PSSA parse the file) [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] Param() # Functions common to all cmdlets Function ValidateGetAdapterNameParams($AdapterName, $Adapters, [ref]$ErrorMessages) { $AdapterNames = @() if ((-Not $Adapters) -and $AdapterName) { foreach ($n in $AdapterName) { $TmpAdapterNames = @() try { $PhysicalAdapterArray = $script:PnpDevice.Where({ $_.Name -Like $n }) $IntelAdapterArray = $PhysicalAdapterArray.Where({ $_.Manufacturer -eq "Intel" }) if ($IntelAdapterArray) { $TmpAdapterNames = $IntelAdapterArray.Name } elseif ($PhysicalAdapterArray) { # Add non-Intel devices for warning display $TmpAdapterNames = $PhysicalAdapterArray.Name } } catch { # Failed due to Adapters passed to Name parameter $AdapterNames = @() $ErrorMessages.Value += $Messages.InvalidParams break } if (-Not $TmpAdapterNames) { $ErrorMessages.Value += $Messages.AdapterNotFound -f $n continue } $AdapterNames += $TmpAdapterNames } } elseif ((-Not $AdapterName) -and $Adapters) { foreach ($a in $Adapters) { if (CheckPropertyExists $a "CreationClassName") { if ($a.CreationClassName -eq "MSFT_NetAdapter") { $AdapterNames += $a.InterfaceDescription } elseif ($a.CreationClassName -eq "Win32_NetworkAdapter" -or $a.CreationClassName -eq "IANet_PhysicalEthernetAdapter" -or $a.CreationClassName -eq "Win32_PnpEntity") { $AdapterNames += $a.Name } else { $ErrorMessages.Value += $Messages.InvalidObject -f $a.GetType().Name } } elseif ($null -ne $a.PSTypeNames -and $a.PSTypeNames[0] -eq "IntelEthernetAdapter") { $AdapterNames += $a.Name } else { $ErrorMessages.Value += $Messages.InvalidObject -f $a.GetType().Name } } } elseif (-Not ($AdapterName -and $Adapters)) { $AdapterNames = ($script:PnpDevice.Where({ $_.Manufacturer -eq "Intel" })).Name } elseif ($AdapterName -and $Adapters) { $ErrorMessages.Value += $Messages.InvalidParamsAdapterAndName } return $AdapterNames } Function ValidateSetAdapterNameParams($AdapterName, $Adapters, [ref]$ErrorMessages) { $AdapterNames = @() do { if ($AdapterName -and $Adapters) { $ErrorMessages.Value += $Messages.InvalidParamsAdapterAndName break } elseif ($AdapterName) { foreach ($n in $AdapterName) { $TmpAdapterNames = @() try { $PhysicalAdapterArray = $script:PnpDevice.Where({ $_.Name -Like $n }) $IntelAdapterArray = $PhysicalAdapterArray.Where({ $_.Manufacturer -eq "Intel" }) if ($IntelAdapterArray) { $TmpAdapterNames = $IntelAdapterArray.Name } elseif ($PhysicalAdapterArray) { # Add non-Intel devices for warning display $TmpAdapterNames = $PhysicalAdapterArray.Name } } catch { # Failed due to Adapters passed to Name parameter $AdapterNames = @() $ErrorMessages.Value += $Messages.InvalidParams break } if (-Not $TmpAdapterNames) { $ErrorMessages.Value += $Messages.AdapterNotFound -f $n continue } $AdapterNames += $TmpAdapterNames } } elseif ($Adapters) { foreach ($a in $Adapters) { if (CheckPropertyExists $a "CreationClassName") { if ($a.CreationClassName -eq "MSFT_NetAdapter") { $AdapterNames += $a.InterfaceDescription } elseif ($a.CreationClassName -eq "Win32_NetworkAdapter" -or $a.CreationClassName -eq "IANet_PhysicalEthernetAdapter" -or $a.CreationClassName -eq "Win32_PnpEntity") { $AdapterNames += $a.Name } else { $ErrorMessages.Value += $Messages.InvalidObject -f $a.GetType().Name } } elseif ($null -ne $a.PSTypeNames -and $a.PSTypeNames[0] -eq "IntelEthernetAdapter") { $AdapterNames += $a.Name } else { $ErrorMessages.Value += $Messages.InvalidObject -f $a.GetType().Name } } } else { $ErrorMessages.Value += $Messages.InvalidParamsAdapterOrName break } } while ($false) return $AdapterNames } Function ValidatePathParams([ref]$LogPath, $UseDefaultPath, $LogName, [ref]$ErrorMessages) { $Result = $true try { if ($UseDefaultPath) { $DefaultPath = $ENV:LOCALAPPDATA + "\Intel\Wired Networking\" + $LogName if (-not (Test-Path -Path $DefaultPath -ErrorAction Stop)) { New-Item -Path $ENV:LOCALAPPDATA -Name "\Intel\Wired Networking" -ItemType "directory" -ErrorAction SilentlyContinue } $LogPath.Value = $DefaultPath } else { $LogPath.Value = $Path } $PathRoot = GetPSDriveRoot $LogPath.Value if (-Not [string]::IsNullOrEmpty($PathRoot)) { $PathRoot = $PathRoot.TrimEnd("\") $strPathNoQualifier = Split-Path $LogPath.Value -NoQualifier $LogPath.Value = $PathRoot + $strPathNoQualifier } $isPathFile = Test-Path -Path $LogPath.Value -PathType Leaf -ErrorAction Stop if (($isPathFile) -and (-not $Append) -and (-not $Force)) { $ErrorMessages.Value += $Messages.LogmanFileExists -f $AdapterName $Result = $false } elseif (-not $isPathFile) { if (Test-Path -Path $LogPath.Value -ErrorAction Stop) { $ErrorMessages.Value += $Messages.FolderFileNameExits $Result = $false } else { $strAbsolutePath = [IO.Path]::GetFullPath($LogPath.Value) $strParentFolder = Split-Path -Path $strAbsolutePath if (-Not (Test-Path -Path $strParentFolder -ErrorAction Stop)) { $ErrorMessages.Value += $Messages.PathIncorrect $Result = $false } } } } catch { $ErrorMessages.Value += $Messages.PathIncorrect $Result = $false } return $Result } function GetPSDriveRoot($Path) { $strQualifier = Split-Path -Path $Path -Qualifier -ErrorAction SilentlyContinue if (-Not [string]::IsNullOrEmpty($strQualifier)) { $strPSDriveName = $strQualifier.TrimEnd(":") $CurrentPSDrive = Get-PSDrive -Name $strPSDriveName -ErrorAction SilentlyContinue if ($null -ne $CurrentPSDrive) { return $CurrentPSDrive.Root } } return $null } function InvokeCimMethod($ClassName, $InstanceName = "", $MethodName, $params = @{}, $Namespace = "root\wmi") { $query = "Select * from $ClassName" if ($InstanceName) { $query += " where instancename like '$InstanceName'" } Invoke-CimMethod -Query $query -MethodName $MethodName -Arguments $params -Namespace $Namespace -ErrorAction SilentlyContinue } function GetIntelEthernetDevices($AdditionalDriverArray = $null) { $script:PnpDevice = @(Get-PnpDevice | Where-Object { $_.Class -eq "Net" } -ErrorAction SilentlyContinue) if ($script:PnpDevice) { $script:SupportedAdapters = @($script:PnpDevice.Where({ $_.Service -in @('icea', 'scea', 'i40ea', 'i40eb') })) foreach ($AdditionalDriver in $AdditionalDriverArray) { $script:SupportedAdapters += $script:PnpDevice.Where({ $_.Service -like $AdditionalDriver }) } } } function GetSupportedAdaptersByDriver([array]$strSupportedDriverArray) { return $script:SupportedAdapters.Where({ $_.Service -in $strSupportedDriverArray }) } function GetSupportedAdapters($AdapterNames, [ref]$WarningMessages) { $SupportedAdapterNames = @() $AdapterNames = $AdapterNames | Sort-Object foreach ($a in $AdapterNames) { if ($script:SupportedAdapters.Name -Contains $a) { $SupportedAdapterNames += $a } else { $WarningMessages.Value += $Messages.NoCmdletSupport -f $a } } return $SupportedAdapterNames } Function GetOSSpecificDriverName($DriverName) { $WIN10_RS5_BUILD = 17682 $VER_NT_SERVER = 3 $OSVersion = [Environment]::OSVersion.Version $iMajorVersion = $OSVersion.Major $iMinorVersion = $OSVersion.Minor $iBuildNumber = $OSVersion.Build $strOSSpecificDriverName = '' if (10 -eq $iMajorVersion -and 0 -eq $iMinorVersion) { if ($VER_NT_SERVER -eq ((Get-CimInstance Win32_OperatingSystem -ErrorAction SilentlyContinue).ProductType)) { $bIsWin2016ServerAndHigher = $true } } if ($bIsWin2016ServerAndHigher) { if (IsWin2022ServerOrLater) { $strOSSpecificDriverName = $DriverName } elseif ($iBuildNumber -ge $WIN10_RS5_BUILD) { $strOSSpecificDriverName = $DriverName + "68" } else { $strOSSpecificDriverName = $DriverName + "65" } } return $strOSSpecificDriverName } function GetDriverInfParentFolder($strDriverName, $Verb) { $strDriverStorePathArray = Get-WindowsDriver -Online -ErrorAction SilentlyContinue | Select-Object OriginalFileName if ($null -eq $strDriverStorePathArray) { switch ($Verb) { Start {$script:ErrorMessagesStart += $Messages.NoCmdletSupport -f $AdapterName; break} Register { $script:ErrorMessagesRegister += $Messages.RegisterCountersFailure -f $a Write-Verbose "LASTEXITCODE: $LASTEXITCODE" break } } } # The system keeps a history of installed drivers, Get the latest installed driver inf path $strPathToInf = Get-ChildItem -Path $strDriverStorePathArray.OriginalFileName.Where({ $_ -like "*$strDriverName*" }) | Sort-Object -Descending -Property "CreationTime" | Select-Object -First 1 [System.IO.Path]::GetDirectoryName($strPathToInf) } function CheckDeviceError($AdapterName) { $SupportedAdapter = $script:SupportedAdapters.Where({ $_.FriendlyName -eq $AdapterName }) if ($SupportedAdapter) { # if the device is not 'working properly' if ([Int32]$SupportedAdapter.ConfigManagerErrorCode -ne 0) { $PreErrorActionPreference = $global:ErrorActionPreference $global:ErrorActionPreference = 'SilentlyContinue' # Workaround due to ProblemDescription being empty by default - change current path Push-Location -Path (Get-Module -Name PnPDevice).ModuleBase $StatusMsg = $AdapterName + ": " + $SupportedAdapter.ProblemDescription # Reset path Pop-Location $global:ErrorActionPreference = $PreErrorActionPreference $StatusMsg } } } function ValidateSingleAdapter([array]$PipelineInput, [array]$AdapterName, [ref]$ErrorMessages) { $Result = $false do { if ($PipelineInput.Count -gt 1) { $ErrorMessages.Value += $Messages.InvalidParams break } if ($AdapterName.Count -gt 1) { $ErrorMessages.Value += $Messages.InvalidParams break } $Result = $true } while ($false) return $Result } function IsWin2022ServerOrLater() { $WIN2022_BUILD = 20298 $OSVersion = [Environment]::OSVersion.Version $iMajorVersion = $OSVersion.Major $iBuildNumber = $OSVersion.Build if (($iMajorVersion -eq 10) -and ($iBuildNumber -ge $WIN2022_BUILD) -and -not (IsOperatingSystemClientBased)) { return $true } return $false } function IsOperatingSystemClientBased() { $VER_NT_WORKSTATION = 1 return ($VER_NT_WORKSTATION -eq ((Get-CimInstance Win32_OperatingSystem -ErrorAction SilentlyContinue).ProductType)) } function CheckPropertyExists($TestObject, $strPropertyName) { $bReturnValue = $true try { return (($TestObject | Get-Member -MemberType "Property" -ErrorAction Stop).Name -contains $strPropertyName) } catch { $bReturnValue = $false } return $bReturnValue } function GetAdapterSettings($AdapterName, $DisplayName, $RegistryKeyword) { $AdapterSettings = @() $SettingsRet = @() if ([string]::IsNullOrEmpty($DisplayName) -and [string]::IsNullOrEmpty($RegistryKeyword)) { $AdapterSettings = GetAllAdapterSettings $AdapterName $SettingsRet += InitializeProfileSetting $AdapterName } else { # Need to handle Profile differently, this is an EthernetCmdlets created setting if ($DisplayName -eq 'Profile' -or $RegistryKeyword -eq 'PerformanceProfile') { $SettingsRet += InitializeProfileSetting $AdapterName # Remove Profile from passed in array to avoid GatherSettingEnumOutput (InitializeProfileSetting handles it uniquely) if ($null -ne $DisplayName) { $DisplayName = $DisplayName -ne 'Profile' } if ($null -ne $RegistryKeyword) { $RegistryKeyword = $RegistryKeyword -ne 'PerformanceProfile' } } $AdapterSettings = GetSettings $AdapterName $DisplayName $RegistryKeyword } foreach ($Setting in $AdapterSettings) { switch ([int]($Setting.DisplayParameterType)) { {$_ -in [int][DisplayParameterType]::int, [int][DisplayParameterType]::long, [int][DisplayParameterType]::word, [int][DisplayParameterType]::dword} { $SettingsRet += GatherSettingIntOutput $a $Setting; break } {$_ -in [int][DisplayParameterType]::enum, [int][DisplayParameterType]::edit} {$SettingsRet += GatherSettingEnumOutput $a $Setting; break} default {$SettingsRet += GatherSettingEnumOutput $a $Setting; break} } } return $SettingsRet } function GetAllAdapterSettings($AdapterName) { return $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName}) } function GetSettings($AdapterName, $DisplayName, $RegistryKeyword) { $SettingArray = @() if (-not [string]::IsNullOrEmpty($DisplayName)) { foreach ($TmpDisplayName in $DisplayName) { if ($DisplayName -eq 'Profile') { continue } $TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.DisplayName -like $TmpDisplayName}) if (-not $TmpSetting) { $script:WarningMessagesGet += $Messages.InvalidSetting -f $AdapterName, $TmpDisplayName } else { $SettingArray += $TmpSetting } } } if (-not [string]::IsNullOrEmpty($RegistryKeyword)) { foreach ($TmpRegistryKeyword in $RegistryKeyword) { if ($RegistryKeyword -eq 'PerformanceProfile') { continue } $TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -like $TmpRegistryKeyword}) if (-not $TmpSetting) { $script:WarningMessagesGet += $Messages.InvalidSetting -f $AdapterName, $TmpRegistryKeyword } else { $SettingArray += $TmpSetting } } } return $SettingArray } function GatherSettingEnumOutput($AdapterName, $Setting) { $SettingMiniHelp = GetSettingMinihelp($Setting.RegistryKeyword) # Assemble it all together in PSCustomObject return [PsCustomObject] @{ PSTypeName = 'IntelEthernetSettingEnum' Caption = $Setting.RegistryKeyword CurrentValue = $Setting.RegistryValue DefaultValue = $Setting.DefaultRegistryValue Description = $Setting.DisplayName DescriptionMap = $Setting.ValidDisplayValues DisplayName = $Setting.DisplayName DisplayValue = $Setting.DisplayValue Minihelp = $SettingMiniHelp Name = $AdapterName ParentId = $Setting.InstanceID.split(':')[0] PossibleValues = $Setting.ValidRegistryValues RegistryKeyword = $Setting.RegistryKeyword RegistryValue = $Setting.RegistryValue } } function GatherSettingIntOutput($AdapterName, $Setting) { $SettingMiniHelp = GetSettingMinihelp($Setting.RegistryKeyword) # Assemble it all together in PSCustomObject return [PsCustomObject] @{ PSTypeName = 'IntelEthernetSettingInt' Base = $Setting.NumericParameterBaseValue Caption = $Setting.RegistryKeyword CurrentValue = $Setting.RegistryValue DefaultValue = $Setting.DefaultRegistryValue Description = $Setting.DisplayName DisplayName = $Setting.DisplayName DisplayValue = $Setting.DisplayValue Minihelp = $SettingMiniHelp Name = $AdapterName ParentId = $Setting.InstanceID.split(':')[0] RegistryKeyword = $Setting.RegistryKeyword RegistryValue = $Setting.RegistryValue Min = $Setting.NumericParameterMinValue Max = $Setting.NumericParameterMaxValue Step = $Setting.NumericParameterStepValue } } function GetSettingMinihelp($RegistryKeyword) { $SettingMiniHelp = $MiniHelp.$($RegistryKeyword) if ([string]::IsNullOrEmpty($SettingMiniHelp)) { $SettingMiniHelp = $Messages.MiniHelpNotFound } return $SettingMiniHelp } function InitializeProfileSetting($AdapterName) { # for our supported adapters, by default its safe to add: Standard Server, Web Server, and Low Latency # PossibleValues and DescriptionMap for Profile $ProfileValuesMap = @{ '2' = $Messages.StandardServer; '3' = $Messages.WebServer; '6' = $Messages.LowLatency } $DefaultValue = '2' $IntelDCBInstalled = $false $HyperVInstalled = $false $IntelDCB = Get-Service | Where-Object {$_.Name -eq "IntelDCB"} if ($null -ne $IntelDCB) { $IntelDCBInstalled = $true } # ID 20 represents Hyper-V $HyperV = Get-CimInstance -Namespace "root\cimv2" -ClassName "Win32_ServerFeature" | Where-Object {$_.ID -eq '20'} if ($null -ne $HyperV) { $HyperVInstalled = $true } if ($IntelDCBInstalled) { $ProfileValuesMap.Add('4', $Messages.StorageServer) $DefaultValue = '4' } if ($HyperVInstalled) { $ProfileValuesMap.Add('5', $Messages.VirtServer) $DefaultValue = '5' } if ($IntelDCBInstalled -and $HyperVInstalled) { $ProfileValuesMap.Add('7', $Messages.StorageVirt) $DefaultValue = '7' } $CurrentProfile = GetCurrentProfileValue $AdapterName $CurrentProfileRegistryValue = $null $CurrentProfileDisplayValue = $null if ($null -ne $CurrentProfile) { $CurrentProfileRegistryValue = $CurrentProfile.RegistryValue $CurrentProfileDisplayValue = $CurrentProfile.DisplayValue if ($CurrentProfileRegistryValue -eq 1) { $ProfileValuesMap.Add($CurrentProfileRegistryValue, $CurrentProfileDisplayValue) } } $ProfileValuesMap = $ProfileValuesMap.GetEnumerator() | Sort-Object -Property Name $SettingMiniHelp = GetSettingMinihelp("PerformanceProfile") $ParentId = $script:MSNetAdvProperty.Where({ $_.InterfaceDescription -eq $AdapterName}).InstanceID.split(':')[0] # Assemble it all together in PSCustomObject return [PsCustomObject] @{ PSTypeName = 'IntelEthernetSettingEnum' Caption = 'PerformanceProfile' CurrentValue = $CurrentProfile.RegistryValue DefaultValue = $DefaultValue Description = $Messages.Profile DescriptionMap = $ProfileValuesMap.Value DisplayName = $Messages.Profile DisplayValue = $CurrentProfileDisplayValue Minihelp = $SettingMiniHelp Name = $AdapterName ParentId = $ParentId PossibleValues = $ProfileValuesMap.GetEnumerator().Name RegistryKeyword = 'PerformanceProfile' RegistryValue = $CurrentProfileRegistryValue } } function GetCurrentProfileValue($AdapterName) { $AdapterRegKey = GetAdapterPropertiesFromRegistry $AdapterName if ($null -ne $AdapterRegKey.PerformanceProfile) { $ProfileRegValue = $AdapterRegKey.PerformanceProfile # Profile is already custom settings or in case one of the associated Profile settings got changed if ($ProfileRegValue -eq '1' -or ($false -eq (IsProfileStillApplied $ProfileRegValue $AdapterName))) { $ProfileRegValue = '1' $ProfileDisplayVal = $Messages.CustomSettings } else { $ProfileDisplayVal = $PROFILE_VALUE_TO_NAME[$ProfileRegValue] } return [PsCustomObject] @{ # return the key from the hashtable DisplayValue = $ProfileDisplayVal RegistryValue = $ProfileRegValue } } } function IsProfileStillApplied($RegistryValue, $AdapterName) { $TmpProfileName = $PROFILE_VALUE_TO_NAME[$RegistryValue] if ($null -ne $TmpProfileName) { $DriverFamily = $script:SupportedAdapters.Where({ $_.Name -eq $AdapterName }).Service $tmp = GetProfileSettingsFromXml $TmpProfileName $DriverFamily foreach ($ProfileSetting in $tmp.GetEnumerator()) { $TmpSetting = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -eq $ProfileSetting.Key}) if ($TmpSetting.RegistryValue -ne $ProfileSetting.Value) { return $false } } } return $true } function GetProfileSettingsFromXml() { Param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $ProfileToSet, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [ValidateSet("i40ea", "i40eb", "icea", "scea")] [string] $AdapterFamily ) $Profile_to_XmlProfile = @{ "Standard Server" = "standard" "Web Server" = "web" "Storage Server" = "storage" "Virtualization Server (Hyper-V*)" = "hyperv" "Low Latency" = "lowlatency" "Storage + Virtualization" = "storagevirtualization" } $OSBuild = [Environment]::OSVersion.Version.Build # Each Key treated as a range of Build Numbers (14393 to 16299 is NDIS v6.60) $OSBuild_to_NDIS = [ordered]@{ 14393 = "ndis660" 16299 = "ndis680" } $Adapter_to_ProfileString = @{ i40ea = "40gig" i40eb = "40gig" icea = "E8XX" scea = "E8XX" } $Adapter_to_ProfileDeviceString = @{ i40ea = "X710" i40eb = "X722" } [xml]$Xml = Get-Content -Path $PSScriptRoot\PerformanceProfiles.xml # validate XML against XSD before using it: try { $Xml.Schemas.Add('', "$PSScriptRoot\PerformanceProfiles.xsd") | Out-Null $Xml.Validate($null) } catch [System.Xml.Schema.XmlSchemaValidationException] { $script:ErrorMessagesProfile += $Messages.ProfileXmlError return } $PerfProfiles = $Xml.SelectNodes("//ProfileList/Profile") # Convert cmdlet parameters to strings from xml $AdapterFamilyProfile = $Adapter_to_ProfileString[$AdapterFamily] foreach ($CurrentBuildNumber in $OSBuild_to_NDIS.Keys) { if ($OSBuild -gt $CurrentBuildNumber) { $NDISVersion = $OSBuild_to_NDIS.$CurrentBuildNumber } } $ProfileName = $Profile_to_XmlProfile[$ProfileToSet] # Construct profile names # Top-level, eg 40gig_standard $TopLevelProfile = $AdapterFamilyProfile + "_" + $ProfileName Write-Verbose $TopLevelProfile # + NDIS version, eg 40gig_standard.ndis660 $NdisProfile = $AdapterFamilyProfile + "_" + $ProfileName + "." + $NDISVersion Write-Verbose $NdisProfile # + device name, eg 40gig_standard.ndis660.X722 # adding '*' at the end so it matches .no_npar too $DeviceProfile = $AdapterFamilyProfile + "_" + $ProfileName + "." + $NDISVersion + "." + $Adapter_to_ProfileDeviceString[$AdapterFamily] + "*" Write-Verbose $DeviceProfile $TopLevelProfile = $PerfProfiles | Where-Object { $_.Id -like $TopLevelProfile } $NdisProfile = $PerfProfiles | Where-Object { $_.Id -like $NdisProfile } $DeviceProfile = $PerfProfiles | Where-Object { $_.Id -like $DeviceProfile } # assemble it all together - from generic to detailed profile # ie DeviceProfile settings should take precedence over those from TopLevelProfile $Profiles = @($TopLevelProfile, $NdisProfile, $DeviceProfile) $RetVal = @{} foreach ($Profile in $Profiles) { foreach($Setting in $Profile.Setting) { $RetVal[$Setting.id] = $Setting.'#text' } } return $RetVal } function GetAdapterPropertiesFromRegistry($AdapterName) { # Individual Adapter GUID - (Get-NetAdapter -InterfaceDescription $AdapterName | Where-Object {$_.InterfaceDescription -eq $AdapterName}).InterfaceGuid $AdapterInstanceID = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).InterfaceGuid $972Key = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\*" -ErrorAction SilentlyContinue $AdapterRegKey = $972Key.Where({$_.NetCfgInstanceId -eq $AdapterInstanceID}) return $AdapterRegKey } function SetAdapterPropertyInRegistry($AdapterName, $Property, $Value) { $AdapterRegKey = GetAdapterPropertiesFromRegistry $AdapterName Set-ItemProperty -Path $AdapterRegKey.PSPath -Name $Property $Value -ErrorAction SilentlyContinue } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDHTpMmFSI/lkdn # F+7QxBBCxdWOoc/RHC+hwO4bd7j5dKCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIIYx4OJmKyxsQNhE+SWixA3T # LRfWCdCGk9pwrrWytT2fMA0GCSqGSIb3DQEBAQUABIIBgJu1q85C7NufIGOFouF5 # G4G7kR8jbBwvo4x64f51SkC076frjeI8yTAL/BICq6WANG9A8UHo/aqhzmNt6VV3 # r8An7J/LnFy5LmYumIn4OpSGMfGmWoJfzW0xvOzx1D64zGpDycfqkdF5H2hgnunN # gEBpTA7QCOESn0NMeTkJT0/dprSLgPpCc5e/EU2vDTG2V0Jzl2DsAdxz32oXPPf1 # ks8Mk1ahgm7tla9safDZgmfoSxS0ZEFXr7wx5uVgyc2xXtGG26x7zAQj6eswoAma # zHC1znlSKq9EKw7/T6/7pgQjtnn2pmROomnZI55S9X2nxTqgDeK75FGWkoATa2tS # /dCg9q/BIxigw/JGdVhUZyFXdFDNsFpGuVodSbCNx2w1w8NtJLXwNDJYSnBNrTSz # zjSTTfaFq2us/sMutbXZv00TaxTIV9DGV+HTiGXWwre5i4dWz6POIijZGSRUoE4v # KdtupSAWzdCiLoM7nNOvBkMRJXoGW7uRh568pMSfbJcUsKGCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIFcGg3xTeZiYaLnGAa13++rrGl+ZQkA7XnZ0SsjDx3CA # AhUAibrNXexA23SDH/8eUiWsDMlRKVIYDzIwMjQwMzE4MTgyMzQxWqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDMxODE4MjM0MVowPwYJKoZIhvcNAQkEMTIEMGmyELnkA2OsrA+Ff7AR # MdpJjbj1xrhuyGy0CMTJGJLOlIuhv9f7jTY9LTP3LFR9LjCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgBJct3ANObYMad0DJ6hX2xnBpuAycyyzhkqvwDhJXQGKqQByMcLqX5pg5Ul # WhLlyoKNs/wuyIUNMwTuAFyRGh5YYYvtljpHgNgh7gXhHoGGpbvo5Ji8HiWrb3Tr # 8EQPS4IWmLjuetb0suwFjqUoR7TDFBVR+Rxpnm5Q7lktjszuWG0ghG6WghkWu7it # uJfzW23OoUOL+TWAVNMYXi4g91K3aA7jtQUcVVoDbwM8rYKFhCQ/MIYJMQJdIaj4 # KPQeB2jx3iUPhnF8QlAdbh79282ptT335lP6V1c/LjM3Y4jnrVEZqmgy1YGZMGmP # JIPvN8KUzavaTHuykmz6xv2+Jgx9c9YfefV1+70k26fpQXIPcQSd3A0MzJSyiL1X # ptw9eFie0c4cwi1BqYfDX40NwxN1XF7B/X1IXE4yTr/UZxmjE71EbO/lFyFCGMql # SO6Kua3Yjx2p0F2XPKeP5l2VvzVuApnpc+3VEbzup8b/FdTI7/trQEm3mIJ4vWlL # ZvXDeOK0xWxFgGv6uT3ImJOTdXYnndx+kibIqxhmuINW7rM5MpmQS4k2OTlqzV6g # W1a9ZBldqDfKWC7TlGAiTbk3ELNVR0MKb5UpiizB6rtB4h4yIgOc7edAJB3iyBAs # UqZKpqlYLZCc+9LFPnEpBPB5x+hEAYdNUH+1qcNHVq7eT0nmKg== # SIG # End signature block
combined_dataset/train/non-malicious/Get-SophosScanTime.ps1
Get-SophosScanTime.ps1
####################### <# .SYNOPSIS Gets the Scan time information for Sophos .DESCRIPTION The Get-SophosScanTime function gets the Sophos weekly scan time information. .EXAMPLE Get-SophosScanTime "Z002" This command gets information for computername Z002. .EXAMPLE Get-Content ./servers.txt | Get-SophosScanTime This command gets information for a list of servers stored in servers.txt. .EXAMPLE Get-SophosScanTime (get-content ./servers.txt) This command gets information for a list of servers stored in servers.txt. .NOTES Version History v1.0 - Chad Miller - Initial release #> function Get-SophosScanTime { [CmdletBinding()] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullorEmpty()] [string[]]$ComputerName ) BEGIN {} PROCESS { foreach ($computer in $computername) { Get-WMIObject -ComputerName $computer -Query "SELECT * FROM CIM_DataFile WHERE Drive ='C:' AND Path='\\\\ProgramData\\\\Sophos\\\\Sophos Anti-Virus\\\\Logs\\\\' AND FileName LIKE 'Week%' AND Extension='txt'" | Select CSName,@{n="StartTime";e={($_.ConvertToDateTime($_.creationdate)).ToString("f")}},@{n="EndTime";e={($_.ConvertToDateTime($_.lastmodified)).ToString("f")}}, @{n="RunDuration";e={(($_.ConvertToDateTime($_.lastmodified)).Subtract(($_.ConvertToDateTime($_.creationdate)))).ToString()}} } } END {} }
combined_dataset/train/non-malicious/sample_30_7.ps1
sample_30_7.ps1
# # Module manifest for module 'OCI.PSModules.Datacatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Datacatalog.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'f0444859-1d26-4a2d-8bcd-5551939e4f94' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Datacatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datacatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatacatalogCatalogLock', 'Add-OCIDatacatalogCatalogPrivateEndpointLock', 'Add-OCIDatacatalogDataSelectorPatterns', 'Add-OCIDatacatalogMetastoreLock', 'Confirm-OCIDatacatalogConnection', 'Confirm-OCIDatacatalogPattern', 'DisMount-OCIDatacatalogCatalogPrivateEndpoint', 'Export-OCIDatacatalogGlossary', 'Get-OCIDatacatalogAggregatedPhysicalEntitiesList', 'Get-OCIDatacatalogAttribute', 'Get-OCIDatacatalogAttributesList', 'Get-OCIDatacatalogAttributeTag', 'Get-OCIDatacatalogAttributeTagsList', 'Get-OCIDatacatalogCatalog', 'Get-OCIDatacatalogCatalogPrivateEndpoint', 'Get-OCIDatacatalogCatalogPrivateEndpointsList', 'Get-OCIDatacatalogCatalogsList', 'Get-OCIDatacatalogConnection', 'Get-OCIDatacatalogConnectionsList', 'Get-OCIDatacatalogCustomPropertiesList', 'Get-OCIDatacatalogCustomProperty', 'Get-OCIDatacatalogDataAsset', 'Get-OCIDatacatalogDataAssetsList', 'Get-OCIDatacatalogDataAssetTag', 'Get-OCIDatacatalogDataAssetTagsList', 'Get-OCIDatacatalogDerivedLogicalEntitiesList', 'Get-OCIDatacatalogEntitiesList', 'Get-OCIDatacatalogEntity', 'Get-OCIDatacatalogEntityTag', 'Get-OCIDatacatalogEntityTagsList', 'Get-OCIDatacatalogFolder', 'Get-OCIDatacatalogFoldersList', 'Get-OCIDatacatalogFolderTag', 'Get-OCIDatacatalogFolderTagsList', 'Get-OCIDatacatalogGlossariesList', 'Get-OCIDatacatalogGlossary', 'Get-OCIDatacatalogJob', 'Get-OCIDatacatalogJobDefinition', 'Get-OCIDatacatalogJobDefinitionsList', 'Get-OCIDatacatalogJobExecution', 'Get-OCIDatacatalogJobExecutionsList', 'Get-OCIDatacatalogJobLog', 'Get-OCIDatacatalogJobLogsList', 'Get-OCIDatacatalogJobMetrics', 'Get-OCIDatacatalogJobMetricsList', 'Get-OCIDatacatalogJobsList', 'Get-OCIDatacatalogMetastore', 'Get-OCIDatacatalogMetastoresList', 'Get-OCIDatacatalogNamespace', 'Get-OCIDatacatalogNamespacesList', 'Get-OCIDatacatalogPattern', 'Get-OCIDatacatalogPatternsList', 'Get-OCIDatacatalogRulesList', 'Get-OCIDatacatalogTagsList', 'Get-OCIDatacatalogTerm', 'Get-OCIDatacatalogTermRelationship', 'Get-OCIDatacatalogTermRelationshipsList', 'Get-OCIDatacatalogTermsList', 'Get-OCIDatacatalogType', 'Get-OCIDatacatalogTypesList', 'Get-OCIDatacatalogWorkRequest', 'Get-OCIDatacatalogWorkRequestErrorsList', 'Get-OCIDatacatalogWorkRequestLogsList', 'Get-OCIDatacatalogWorkRequestsList', 'Import-OCIDatacatalogConnection', 'Import-OCIDatacatalogDataAsset', 'Import-OCIDatacatalogGlossary', 'Invoke-OCIDatacatalogAssociateCustomProperty', 'Invoke-OCIDatacatalogAsynchronousExportDataAsset', 'Invoke-OCIDatacatalogAsynchronousExportGlossary', 'Invoke-OCIDatacatalogDisassociateCustomProperty', 'Invoke-OCIDatacatalogExpandTreeForGlossary', 'Invoke-OCIDatacatalogFetchEntityLineage', 'Invoke-OCIDatacatalogObjectStats', 'Invoke-OCIDatacatalogParseConnection', 'Invoke-OCIDatacatalogProcessRecommendation', 'Invoke-OCIDatacatalogRecommendations', 'Invoke-OCIDatacatalogSearchCriteria', 'Invoke-OCIDatacatalogSuggestMatches', 'Invoke-OCIDatacatalogSynchronousExportDataAsset', 'Invoke-OCIDatacatalogTestConnection', 'Invoke-OCIDatacatalogUsers', 'Mount-OCIDatacatalogCatalogPrivateEndpoint', 'Move-OCIDatacatalogCatalogCompartment', 'Move-OCIDatacatalogCatalogPrivateEndpointCompartment', 'Move-OCIDatacatalogMetastoreCompartment', 'New-OCIDatacatalogAttribute', 'New-OCIDatacatalogAttributeTag', 'New-OCIDatacatalogCatalog', 'New-OCIDatacatalogCatalogPrivateEndpoint', 'New-OCIDatacatalogConnection', 'New-OCIDatacatalogCustomProperty', 'New-OCIDatacatalogDataAsset', 'New-OCIDatacatalogDataAssetTag', 'New-OCIDatacatalogEntity', 'New-OCIDatacatalogEntityTag', 'New-OCIDatacatalogFolder', 'New-OCIDatacatalogFolderTag', 'New-OCIDatacatalogGlossary', 'New-OCIDatacatalogJob', 'New-OCIDatacatalogJobDefinition', 'New-OCIDatacatalogJobExecution', 'New-OCIDatacatalogMetastore', 'New-OCIDatacatalogNamespace', 'New-OCIDatacatalogPattern', 'New-OCIDatacatalogTerm', 'New-OCIDatacatalogTermRelationship', 'Remove-OCIDatacatalogAttribute', 'Remove-OCIDatacatalogAttributeTag', 'Remove-OCIDatacatalogCatalog', 'Remove-OCIDatacatalogCatalogLock', 'Remove-OCIDatacatalogCatalogPrivateEndpoint', 'Remove-OCIDatacatalogCatalogPrivateEndpointLock', 'Remove-OCIDatacatalogConnection', 'Remove-OCIDatacatalogCustomProperty', 'Remove-OCIDatacatalogDataAsset', 'Remove-OCIDatacatalogDataAssetTag', 'Remove-OCIDatacatalogDataSelectorPatterns', 'Remove-OCIDatacatalogEntity', 'Remove-OCIDatacatalogEntityTag', 'Remove-OCIDatacatalogFolder', 'Remove-OCIDatacatalogFolderTag', 'Remove-OCIDatacatalogGlossary', 'Remove-OCIDatacatalogJob', 'Remove-OCIDatacatalogJobDefinition', 'Remove-OCIDatacatalogMetastore', 'Remove-OCIDatacatalogMetastoreLock', 'Remove-OCIDatacatalogNamespace', 'Remove-OCIDatacatalogPattern', 'Remove-OCIDatacatalogTerm', 'Remove-OCIDatacatalogTermRelationship', 'Update-OCIDatacatalogAttribute', 'Update-OCIDatacatalogCatalog', 'Update-OCIDatacatalogCatalogPrivateEndpoint', 'Update-OCIDatacatalogConnection', 'Update-OCIDatacatalogCustomProperty', 'Update-OCIDatacatalogDataAsset', 'Update-OCIDatacatalogEntity', 'Update-OCIDatacatalogFolder', 'Update-OCIDatacatalogGlossary', 'Update-OCIDatacatalogJob', 'Update-OCIDatacatalogJobDefinition', 'Update-OCIDatacatalogMetastore', 'Update-OCIDatacatalogNamespace', 'Update-OCIDatacatalogPattern', 'Update-OCIDatacatalogTerm', 'Update-OCIDatacatalogTermRelationship', 'Write-OCIDatacatalogCredentials' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datacatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_14_31.ps1
sample_14_31.ps1
# # Module manifest for module 'OCI.PSModules.Cloudmigrations' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudmigrations.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b42be880-f45d-4128-a505-71c63f0f1b48' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudmigrations Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudmigrations.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCICloudmigrationsMigrationPlan', 'Get-OCICloudmigrationsAvailableShapesList', 'Get-OCICloudmigrationsMigration', 'Get-OCICloudmigrationsMigrationAsset', 'Get-OCICloudmigrationsMigrationAssetsList', 'Get-OCICloudmigrationsMigrationPlan', 'Get-OCICloudmigrationsMigrationPlansList', 'Get-OCICloudmigrationsMigrationsList', 'Get-OCICloudmigrationsReplicationProgress', 'Get-OCICloudmigrationsReplicationSchedule', 'Get-OCICloudmigrationsReplicationSchedulesList', 'Get-OCICloudmigrationsTargetAsset', 'Get-OCICloudmigrationsTargetAssetsList', 'Get-OCICloudmigrationsWorkRequest', 'Get-OCICloudmigrationsWorkRequestErrorsList', 'Get-OCICloudmigrationsWorkRequestLogsList', 'Get-OCICloudmigrationsWorkRequestsList', 'Import-OCICloudmigrationsMigrationPlan', 'Invoke-OCICloudmigrationsExecuteMigrationPlan', 'Invoke-OCICloudmigrationsRefreshMigration', 'Invoke-OCICloudmigrationsRefreshMigrationAsset', 'Invoke-OCICloudmigrationsRefreshMigrationPlan', 'Move-OCICloudmigrationsMigrationCompartment', 'Move-OCICloudmigrationsMigrationPlanCompartment', 'Move-OCICloudmigrationsReplicationScheduleCompartment', 'New-OCICloudmigrationsMigration', 'New-OCICloudmigrationsMigrationAsset', 'New-OCICloudmigrationsMigrationPlan', 'New-OCICloudmigrationsReplicationSchedule', 'New-OCICloudmigrationsTargetAsset', 'Remove-OCICloudmigrationsMigration', 'Remove-OCICloudmigrationsMigrationAsset', 'Remove-OCICloudmigrationsMigrationPlan', 'Remove-OCICloudmigrationsReplicationSchedule', 'Remove-OCICloudmigrationsTargetAsset', 'Start-OCICloudmigrationsAssetReplication', 'Start-OCICloudmigrationsMigrationReplication', 'Stop-OCICloudmigrationsWorkRequest', 'Update-OCICloudmigrationsMigration', 'Update-OCICloudmigrationsMigrationAsset', 'Update-OCICloudmigrationsMigrationPlan', 'Update-OCICloudmigrationsReplicationSchedule', 'Update-OCICloudmigrationsTargetAsset' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudmigrations' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_26_97.ps1
sample_26_97.ps1
# Copyright (C) Intel Corporation, 2021 All Rights Reserved. function Invoke-GenerateCSR { <# .Synopsis Generates a certificate signing request based on a key from the key store. .Description This cmdlet generates a certificate signing request based on a key from the key store. .Notes AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Invoke-GenerateCSR -ComputerName 192.168.168.10 -Username admin -Password Admin!98 -SigningAlgorithm SHA1-RSA -NullSignedRequestPath "newreq1.pem" Certificate Signing Request generated successfully! #> [CmdletBinding()] Param ( [Parameter(Mandatory = $true, position = 0,HelpMessage = "Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory = $false, position = 1,HelpMessage = "Digest User")] [string] $Username, [Parameter(Mandatory = $false, position = 2,HelpMessage = "Digest Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=3, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=5, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory = $true, position = 7,HelpMessage = "Valid Signing Algotirhms are: SHA1-RSA, and SHA256-RSA")][ValidateSet("SHA1-RSA", "SHA256-RSA")] [string] $SigningAlgorithm, [Parameter(Mandatory = $false, position = 8,HelpMessage = "Path to a null signed certificate request file")] [string] $NullSignedRequestPath ) PROCESS { function GetNullRequestBlob { $readFile = [System.IO.File]::OpenText($NullSignedRequestPath ) # These are the certificate request opening and closing tags we use for this PS script, user can add more types $BEGIN = "-----BEGIN CERTIFICATE REQUEST-----" $END = "-----END CERTIFICATE REQUEST-----" [bool]$read = $false While(!$readFile.EndOfStream) { $line = $readFile.ReadLine() IF($line -match $BEGIN) { $read = $true $requestBlob = $null While($read -and !$readFile.EndOfStream) { $line = $readFile.ReadLine() IF($line -notmatch $END) { $requestBlob += $line } ELSE { $read = $false } } } } $readFile.Close() if($read -or !$requestBlob) # Incorrect or missing closing tag { throw "Incorrect file content`n" return } return $requestBlob } $Results = @() $Results += "`n" try { # Create a connection object $wsmanConnectionObject = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $wsmanConnectionObject.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $wsmanConnectionObject.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $wsmanConnectionObject.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port -ne "16993") { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $wsmanConnectionObject.Options.SetClientCertificateByCertificateName($CertificateName) } ForEach ($Comp in $ComputerName) { # Attempt Connection with Client $wsmanConnectionObject.SetHost($Comp, $Port) if( -not $wsmanConnectionObject) { $Results += "Cannot connenct `n" } # Get Null signed request content $nullSigningRequest = GetNullRequestBlob # Defining Signing Algorithm switch($SigningAlgorithm) { "SHA1-RSA" { $SigningAlgorithmProperty = "0" break } "SHA256-RSA" { $SigningAlgorithmProperty = "1" break } } $success = $false $PublicPrivateKeyPairRef_Enum = $wsmanConnectionObject.NewReference("AMT_PublicPrivateKeyPair").Enumerate() foreach ($KeyPairInstance in $PublicPrivateKeyPairRef_Enum) { # Generate CSR using GeneratePKCS10RequestEx method $publicKeyManagementServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyManagementService WHERE Name='Intel(r) AMT Public Key Management Service'") $inputObject = $publicKeyManagementServiceRef.CreateMethodInput("GeneratePKCS10RequestEx") $inputObject.SetProperty("KeyPair", $KeyPairInstance.Object.ToReference("InstanceID")) $inputObject.SetProperty("SigningAlgorithm", $SigningAlgorithmProperty) $inputObject.SetProperty("NullSignedCertificateRequest", $nullSigningRequest) $outputObject = $publicKeyManagementServiceRef.InvokeMethod($inputObject) $returnValue = $outputObject.GetProperty("ReturnValue") if($returnValue -like "0") { # The signed certificate request is needed later on in the flow. # Please note that this signed certificate request data is sensitive and should be kept secret, so pay attention to properly protect it in your implementation. # $signedCertificateRequest = $outputObject.GetProperty("SignedCertificateRequest") $Results += "Certificate Signing Request generated successfully! `n" $success = $true break } } if(-not $success) { $Results += "Generate CSR - Failed." $Results += "ErrorCode: " $returnValue if($returnValue -like "36") { $Results += "Reason: Invalid Parameter." } } } } catch { $Results += "Exception Thrown:" $Results += $_.Exception.Message } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoMjnIiooSNT27 # dOboiajG9MWRwsmECmLJ5yXCWZg22aCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgVCf0g3oLuRq7+i0t # TpW1mlFlMFurqDPP3juudSnYRJIwDQYJKoZIhvcNAQEBBQAEggGAXRqVh1sNOzM3 # T+0ol3xHc2aCku7rxKMKctSsrzgVPMGa0pip6uddujtGM60qYDlsKMq1hvZTOrec # UuZ5dN7h9wEsbImh2Z08E71fQGCclwbloKBQ+oatPw3SwvtD2MvpFRT7xAqnUgcQ # JDovJVQoFYhNwFw5hm7CncYvbwZ5/DXRYYd3KNTNRZ5aEJizDVi0LU17pZXxKT1L # lYFHhtT/9H7Zixirtndj7G0r+zzugpdEBrmB31gNtm4WKp7Uj+2u2x8n81Y3vVx/ # uMuQ8No2TQobPiXM3UMxmXLSphhDgBnsXgixGx8I6kedSrJILun0igF4uAsTkmX+ # VKVLwPkcF77SHsZcgGyX6tybS3vfvSvhYsNZFAicTn/NU8v24mj7sK9Gsb8UqMEs # +SdPS84pRRH10AP7GBrBP5GzClVIcmyY6eX7SeEJ+mQJYj9wqf91pFnLuFOOnbWT # jxHOWkokZvunIDxelHlBc8AP3qiolX8hs9vH/q8dIqyvo+nSJRH4oYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIB9m/e4aH4ByGS9j2w139rUKvJBMulfA3qc8 # wTWBGX71AhQjzpBAM74TIuHwcRsU0EggaW006hgPMjAyMTA3MTkxNjMwNDlaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjEwNzE5MTYzMDQ5WjA/BgkqhkiG9w0BCQQxMgQwr8ylLzhpeJpr # NGqDSQTZWBEzxj/bTCXwnwAWTvBtBCo2b/ILbROqKV/thTK6Sj6zMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICAHwh2uEE7/KcO+Ykmuxw7PJGA4Ki0H0duKMIisLAcbVxl/KUxyX9 # i+uY/NfCYXhcyTeZLkwWQQlcfcwfzmDwQFbJNkN54FlQsGTemkI8++y3cLx86/eS # nfzRWE3q2XaAcP2y4QMR/NoU1ycngmMmxqDbigLiYe4SrmlGZOgScSRskIIqR3C1 # SpkGPwrIt1yKz6x0VUJRsAk2RgS8zQCnyWC1ykUCUTj48dOLvSV2cfXYf+Ag2Hcj # NKsQisTdE4Y8slcyvOiauhjWDL7NrpCX8vNES7Z4ShdvMQRyIa+EXIGBnbSaJWcw # cAJ3n0WvWioSXY+vRyDkXVbePbQ5rDFFxKRDyK62eqFGzB0V8hyvW+ga0/cEuDtV # S5DIJgMlk3M3VcZSkcbMY9Hl4Dwfox91nEWDusPxvXaJCJq6izNQS3KSXpWR6mNN # 9N3xAm8/fmqwt5zBR+leYGhjpdmNRhYjU6RmFI09A+pVftv/UdMNuKefm6PDqig1 # hqjdFTrdUuVNNssBWPPM8D+pTQmrzpfSIww1PQwHi8IrRZjvQSPBl08iK13H48rh # mNPpYrFNE/knXGVoUepZpyYwy3x/R/Jzg2FkKpdZCN8nC6RVAj9UZIc2cDyI3V5O # RPnGCxjQd3peJJgwNwP1U44X84RgP/zyb/1hhlSnMjlE5thBSzOi8659 # SIG # End signature block
combined_dataset/train/non-malicious/sample_13_45.ps1
sample_13_45.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create Windows virtual desktop registration info. .Description Create Windows virtual desktop registration info. #> function New-AzWvdRegistrationInfo { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Models.Api20230905.IRegistrationInfo')] [CmdletBinding(PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials}, [Parameter(Mandatory, HelpMessage='Subscription Id')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] ${SubscriptionId}, [Parameter(Mandatory, HelpMessage='Resource Group Name')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [System.String] ${ResourceGroupName}, [Parameter(Mandatory, HelpMessage='Host Pool Name')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [System.String] ${HostPoolName}, [Parameter(Mandatory, HelpMessage='Expiration Time')] [System.String] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] ${ExpirationTime} ) process { $saveExpirationTime = $PSBoundParameters["ExpirationTime"] $null = $PSBoundParameters.Remove("ExpirationTime") $hostpool = Az.DesktopVirtualization\Get-AzWvdHostPool @PSBoundParameters $hostpool = Az.DesktopVirtualization\New-AzWvdHostPool @PSBoundParameters ` -Location $hostpool.Location ` -HostPoolType $hostpool.HostPoolType ` -LoadBalancerType $hostpool.LoadBalancerType ` -RegistrationTokenOperation "Update" ` -ExpirationTime $saveExpirationTime ` -Description $hostpool.Description ` -FriendlyName $hostpool.FriendlyName ` -MaxSessionLimit $hostpool.MaxSessionLimit ` -VMTemplate $hostpool.VMTemplate ` -CustomRdpProperty $hostpool.CustomRdpProperty ` -Ring $hostpool.Ring ` -ValidationEnvironment:$hostpool.ValidationEnvironment ` -PreferredAppGroupType $hostpool.PreferredAppGroupType New-Object -TypeName 'Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Models.Api20230905.RegistrationInfo' ` -Property @{ ` ExpirationTime = $hostpool.RegistrationInfoExpirationTime; ` RegistrationTokenOperation = $hostpool.RegistrationInfoRegistrationTokenOperation; ` Token = $hostpool.RegistrationInfoToken} } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDpn8LGSr8gxQyj # 3qOJmGgkQ1EJ41HH096xwAuXZgBUA6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEoEdqUgKxSxdOvluBVwyWxt # BsI0IMTSji5BEBEG2uSWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEATpqRQv2oJdX1cIIh1FQFqCxhpXK++DBhtTOP7i8VOZY0jhGezobPCK2d # mqp5jFRD/Y9Tetlyf2xF5jmW0kiqIWuWiJyEthGP7qw8SOSJDPZX/I7jsqmT4vwJ # bjipfxmOF3ZoEif+nOrKJuit+z3Rcp/JmgVEoII1XEKTXbz37aTcP1u5l9ASkNIt # Iv7usER9ZlVrFBK3clpSbg49XcIBP25Q4Xe6RasN2u0Rh1EUZGV1d1M7r1w0w22g # NXH0I/U2ei1e9bCF2FHCmfGU9XFrq4odFQTxV5BLpRwvyNF3QMLDEtZJDDDlGmzE # 1r6Lgbm9Xh9k/aYBnJXp5GEWVlwuA6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA/K/DnetrNKzKU3OhsWTMY5k6fKrkJhhND5Zq6AkeL3AIGZiAsyEEh # GBMyMDI0MDQyMzEzMTUyMy4zMzJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA # 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031 # XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP # CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa # SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg4nz2lrjVQQNF1A/HzNavsp6bFGllSFKPLpb6rTgeXRUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN # NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg # jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z # MA0GCSqGSIb3DQEBCwUABIICAGJkx6HUr7qCtGUW2rA7wDUSnDk0X1xWJeebHl0l # gWCfgnDNkI4/PLDQ3erp4XHPhFv+lM444aqHuxGEr88hFpRViL5WWqiJmSYJ76wa # flzc0PMblYlSgy9u6mLHbB7qJAY5hFm32eqUcQOR677kYxZYBJ7IGLSkvSBUrQwd # AbleQILnBIEAiMT1DMgEH2nJl/eWAjpi7/VanIb5aiDMNCSZWUf03UwtgjR0omks # uEYJf6dqC0kmzsii2A0OA57883O3QYdgI/nuFGFxdOTu+E+UPbKqydGqr1D1mBWf # 9j8ClddQjbeEQNPcRiBQQRbgJGMakx1zCkOgdd6DJ0F/kuw0KCx7L+Z+Oil+PXdr # FVPOoeUDIDWMYdgKYGwmJXeQBknv9EwL0D52BPPJYjXR1C/+ylUIFi6ZRw5pAam5 # d/Uf+5F20LjlUaeqjfHY9Fzfvs+h6ehKVUotFHLdskZENYMAc04Q7hY3qaTYBh/4 # 77z9t2NCK9yZx/eD0qDcXUyNqoHKXzK09LqV6DtNfGZXwTFYiDLBLK7WC0X+GjCP # UlGyFripZ2xtg18bkVSCNF/bsZo21+bM16Zu6R3Eq3kndZQMqN3D+cGc6FIXnTBg # CaDtTLx284gEiE+Oz+OhNO8azzl5LHjupbL94oC+2NHA2dLhq8OdhANKeqJOg/g9 # uy1V # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_93.ps1
sample_49_93.ps1
BrugerhåndbogfKomponentnavne og -FunktionerfNyttige FunktionerfKonfigurationsmenufFejlfindingfVedligeholdelsefOvervågning og kontrolfInstallation og forbindelserBetjeningsvejledning Brug af softwaren på medfølgende cd-rom med Epson Projector SoftwaresBetjeningsvejledning for EasyMP Network ProjectionsBetjeningsvejledning for EasyMP Multi PC ProjectionSikkerhedsinstruktionerDenne vejledning forklarer, hvordan projektoren anvendes på sikker vis.Læs disse noter omhyggeligt, inden du bruger projektoren.Support- og servicevejledningDenne vejledning forklarer support- og serviceoplysninger forprojektoren.sKontaktliste vedrørende din Epson projektorEasyMP MonitorEasyMP Monitor er et softwareprogram, der gør det muligt at styre flereEpson-projektorer centralt fra en computer gennem et netværk. Du kandownloade EasyMP Monitor og dens driftshåndbog fra det følgendewebsted.http://www.epson.com/Vælg sprogSymboler Anvendt i Denne VejledningOrdlisteLagring af denne vejledning på en computerOpen Source Software License
combined_dataset/train/non-malicious/sample_18_32.ps1
sample_18_32.ps1
# DO NOT COPY THIS MANIFEST VERBATIM. THIS IS JUST A SAMPLE. # GENERATE YOUR MANIFEST USING THE New-ModuleManifest COMMAND TO # GUARANTEE YOU GET A UNIQUE GUID FOR YOUR MODULE. @{ # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = @('Import', 'File') # A URL to the license for this module. LicenseUri = 'https://github.com/___/license' # A URL to the main website for this project. ProjectUri = 'https://github.com/___/' # A URL to an icon representing this module. IconUri = 'https://github.com/___/icon.png' # ReleaseNotes of this module - our ReleaseNotes are in # the file ReleaseNotes.md # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # Script module or binary module file associated with this manifest. RootModule = 'SampleModule.psm1' # Version number of this module. ModuleVersion = '1.0.0' # ID used to uniquely identify this module GUID = '3ff4d4b6-ade9-46f3-a4f2-2ad6f5508388' # Author of this module Author = '<name>' # Company or vendor of this module CompanyName = 'Unknown' # Copyright statement for this module Copyright = '(c) 2021 <name>.' # Description of the functionality provided by this module Description = 'Some description. This is required by the PowerShell Gallery' # Minimum version of the Windows PowerShell engine required by this module # PowerShellVersion = '' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module - explicitly list each function that should be # exported. This improves performance of PowerShell when discovering the commands in # module. FunctionsToExport = @('New-File','Import-FileNoWildcard','Import-FileWildcard') # Cmdlets to export from this module # CmdletsToExport = '*' # Variables to export from this module # VariablesToExport = '*' # Aliases to export from this module # AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIr4wYJKoZIhvcNAQcCoIIr1DCCK9ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDUGuwxXFFu7zy5 # 5QNGL48Z0cbGhzIwxTSx+fYRvWIiz6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZyzCCGccCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEFy945g/ACNoab5mGG05IkFzVwWllem # 3CFUnPHeoXsOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # QF2D85zZtKkhR2ipB5f7Xen5lyttEhFC97BCCO31Lk58yYLtBbdLZk4g37jsF1ya # oYfyIbR5BoJSuYfvBkag2alDguEjJmWABa9oqNVgRrWIhjxPT7q79tapGnSQSavm # JkHUnJSkZJ1dtkcowoThlnuuRnwzR7+Hk7rnJ8PoMG2SaLv2SI8ekxMUA1+Sps2e # IGQHwoTDVAIL6Ig0EfX/eMhBYCvZtBAB0lKqbsNFtWbqkRch2r06GBvFVj0mAw+N # JvYcD42UM9mvCKlht6MISt7j0CrDgP3u4JttDXa8mo1WvS7rKVnibcixAz4Ogj9t # njX+EfbWYAhkNYUodp/xraGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCCF3sGCSqG # SIb3DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsqhkiG9w0B # CRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCA7BKjBGvkdGfSBwUe0vofAoz2WBhe5ciZUiApSUl8qYQIGZfLh38qRGBIyMDI0 # MDQwMzIyNTgxNi44M1owBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w # ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1RTAtRDk0 # NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEeowggcg # MIIFCKADAgECAhMzAAAB7OArpILQkVKAAAEAAAHsMA0GCSqGSIb3DQEBCwUAMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUzOFoXDTI1 # MDMwNTE4NDUzOFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV # BAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBALBH9G4JNuDFRZWb9V26Xba7B0RmbQigAWzqgivf1Ur8i0/zRyf7 # xOa0/ruJpsHgOYAon0Yfp0kaEQ8mlji9MpFI7CtE3FUgqg895QXd/hXIcRyj+7VB # Rp2XAPXfY25kLFueHoyLaUsbukO+zNmowbtLcwKLZuTae+0Yp14Agv4fvuAvivTV # NJZvuuwTYlvU/83pj9bUKoOLX8hvf/NGpZe3jPG90gZw+NLhkrJAQXdIRkCrhciO # LKjA8dqo1tnF1/aRY79qN19NTzm33fgJcCKdvSj65D0q1oo0tVVw1/lClLh/r8yx # c68gW4JgxF0oOOma+jAB4v7WPbtsLEIGkNAetaR8/Nmn9f5u30LsTmE8/odVGioF # hHu7WBR/kYSr7mvUcDSNqOfRDo699hyQTQd06/opZr6wCYkbs8O9Nlp7vuGibPHo # g+qCBWk1m4KTv1J9Wacq70XnxQCdTnxOoMcTMaxCcxRAqy1LfOOfpJTQ0sQU0J62 # W5oqSpYNFUsRZu7fb0gSHe2pc9d/LpGH/AJvB71IIkiiq0F7EGs/JBgDZdrPV8r3 # KxOzHSQD1XUnBVXjghr1z4zC0BHqyop0CBGj9uz9e7yC5rwsN7opbK73vh72YZbt # k7ydqsMWsBPURcYcO57KBIq+/YrvAHyUCAwYmPvcJC+v6OqhbDHpd3J5AgMBAAGj # ggFJMIIBRTAdBgNVHQ4EFgQU9FrQR2T+K/XCFhCxXxSAR/hMhYYwHwYDVR0jBBgw # FoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1T # dGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF # BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNy # b3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/ # BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJ # KoZIhvcNAQELBQADggIBAJK8xKQxKu+OUM9qDwBFvQ4WsBC1IswOk3RRjcWO8+HA # YoOuuLGae4x+OuZWNGrW7wiGQO8YX9t99sVOv4gCcNJ6DxMH3N8b/jJuSe6imSVt # 4aNu3swvGl+GiUIRHIRzbQ8xkonP1K/N+47WfnGuss4vybSea/mQFy/7LUBcnlBw # uJyaF7Yinf8PrsR3qg+pAjTeYONhpLU1CEE227nvA8pdnUSg1OgGTxsDrzf3DXX1 # v5r1ZOioiyR1Eag/nGMMi/6ZzS8EeFkaQlW98iGbgCnzOm0LvFUCXLSN46/l1QYw # JiBmO+hOaB3jluoDC6d2Y+Ua6vt6V5Zh50tB/uzcvn6p9pj/ESH/26jXtKcz+AdV # IYDO+et4aE6sHYu10qhVJ7kttimKFdy0N7vqJi0v6aHFc8SnN1rdsmWE9M5Dco4R # kClUREGjnKW1aM8JaVfHIKmXmOP2djSd93TvVt6aei7wDetRmt2Aohq62wftIc6I # 55tkao277rba8m1rd4BiwIBrEBwH0GIk+Vrtdp32qtNh1PjlWUJhO0FJjihVGx51 # IAO/32O/+JggAbLVsLK25rSj9Cq/16sqbNAJNUxdoNzbkNMtwwYmtG5rcrTGK922 # egF7HNUmvrJeoz4FrbCEhVG8ZyuIGQpfQUkV5buvb1df6TR7gOcbqIEcpCN5zpU3 # MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsF # ADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UE # AxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcN # MjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn # tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3 # lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFE # yHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+ # jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4x # yDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBc # TyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9 # pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ # 8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pn # ol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYG # NRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cI # FRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE # AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E # 7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwr # BgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUF # BwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYG # A1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3Js # L3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcB # AQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kv # Y2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUA # A4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2 # P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J # 6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfak # Vqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/AL # aoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtP # u4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5H # LcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEua # bvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvB # QUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb # /wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETR # kPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00wggI1AgEB # MIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL # Ex5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAI4c+2BV3P0R # bSI80v8FeomipUx/oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTAwDQYJKoZIhvcNAQELBQACBQDpt7s+MCIYDzIwMjQwNDAzMTEyNTUwWhgPMjAy # NDA0MDQxMTI1NTBaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOm3uz4CAQAwBwIB # AAICAIUwBwIBAAICE/AwCgIFAOm5DL4CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYK # KwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsF # AAOCAQEAY4QaDZo3fHJREQubD4v4ZfynYYtYjXmyfbovnNnVEIxi+usQ/NsiQFOP # U0vTIW9pctlvrxt3Xv3KVF1EHj0l0aoWrQmVeUOl27On5b1pfg6xlyKaq+df9pW/ # y+nBHRuTBCIXfpaXDdNdvDZpl2/8qdFj8I4qRqgrFDEL2uCQ3DkwsDH4Yl8kVjGU # zDFGP6NCSjHlYhqvbND562/2s+MGtSYLZ4NpjuBzyrz7c39pWT9sT+Potalfl3nM # lKOZktMI+8cVqQXvkM/s0FcMrq7dFCDHCq9xAF0/dJenDQ/vZpbk0QjcQBt2OItx # pWL6pwJv+YdxUSwT8hBZ9tGJPMuyWDGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHsMA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIPK71WTLBDvN+xrtfC7QwrgbA1IYBjiVCEd8NeFtvkrsMIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQgJwnm9Wp9N8iHHbVAEFsrKj/FyJAhdqgxZQt6 # MATVCoMwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AezgK6SC0JFSgAABAAAB7DAiBCArPeRKt44u6LUQ2DMdX3McO6lFhjYot6mACliv # JE8ISTANBgkqhkiG9w0BAQsFAASCAgBM0BCk6HbN10wzI7CbhyubPEfwBZBIrFNV # zYXPvIdCgd54zNxqYzVApaTlYIf81la+7ZL+aI7lXaYpqSijDP5eTZ7JGVXlzjJo # +lFXS/9Jiw1e8MBuH74dDzOgxrHBqXU4h0aqpS1ZovyCzOzyxnd5IBfI6Yblv6Gy # EkO0VlhWwOwtVzam/eG5sLLMWbGe2RP26x4uBw/NYY31PoXag+Gb4vCsLNTVvnzZ # 9+MqCH4dvLznlch5VAGK7+8+SIpgouTYu7/am6BUPEWglTEqPHCaRzhFy5t4/GHX # rJ+27kRu33vBfRxcpxGoqFr6mDmJAD+VUTozcrAk3xHWHnP04RSiUnKsNgS4rcj7 # pKG9JPTQxx2XdqXBHdAXYwV0eM+LQXBwtfgdMM9oRCtKLNTZjx+MK/aqRgP2lq7m # 3Irl9AMVC1LP04t08iQ2Y6eZn2C3Tz/oSxnFE8qHxX0AznE/ZEBHjB1Nf5YE66fE # OhmQdXtWWCycuw/XcORkpJE+akfBX6N9hLu5tJUpUjh25cNKBMpQ8a/0p1BAQ+BO # crBj6xQmOt9Nhgj1TKYYctdQMOPys+I+9zDsZ81sc3xx2D7FrXQYWPd/PKoV4es6 # 0r+KXI1zQZ+VmnaE3x14w+mrTtM5e88i4KItxHDvpPFQB8N00v+JnChrGj94vee3 # GOkfUDi72g== # SIG # End signature block
combined_dataset/train/non-malicious/sample_58_55.ps1
sample_58_55.ps1
# # Module manifest for module 'OCI.PSModules.Ocicontrolcenter' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList', 'Get-OCIOcicontrolcenterNamespacesList', 'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Copy__Paste__Clear.ps1
Copy__Paste__Clear.ps1
using System; using System.Text; using System.Threading; using System.Reflection; using System.Runtime.InteropServices; [assembly: AssemblyVersion("2.0.0.0")] namespace Clip { internal static class WinAPI { [DllImport("kernel32.dll")] internal static extern IntPtr GetConsoleWindow(); [DllImport("kernel32.dll")] internal static extern IntPtr GlobalAlloc(uint uFlags, UIntPtr dwBytes); [DllImport("kernel32.dll")] internal static extern IntPtr GlobalLock(IntPtr hMem); [DllImport("kernel32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool GlobalUnlock(IntPtr hMem); [DllImport("kernel32.dll", BestFitMapping = false, ThrowOnUnmappableChar = true)] internal static extern IntPtr lstrcpy(IntPtr lpString1, string lpString2); [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool CloseClipboard(); [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool EmptyClipboard(); [DllImport("user32.dll")] internal static extern IntPtr GetOpenClipboardWindow(); [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool OpenClipboard(IntPtr hWndNewOwner); [DllImport("user32.dll")] internal static extern IntPtr SendMessage(IntPtr hWnd, uint Msg, IntPtr wParam, IntPtr lParam); [DllImport("user32.dll")] internal static extern IntPtr SetClipboardData(uint uFormat, IntPtr hMem); internal static void CopyToClipboard(string text) { IntPtr mem = GlobalAlloc((uint)0x0042, (UIntPtr)(text.Length + 1)); //GHND = 0x0042; IntPtr lck = GlobalLock(mem); lstrcpy(lck, text); GlobalUnlock(mem); OpenClipboard(GetOpenClipboardWindow()); EmptyClipboard(); SetClipboardData((uint)1, mem); //CF_TEXT = 1; CloseClipboard(); } internal static void PasteFromClipboard() { IntPtr hndl = GetConsoleWindow(); SendMessage(hndl, 0x0111, (IntPtr)0xfff1, IntPtr.Zero); //WM_COMMAND = 0x0111, 0xfff1 is console pointer } internal static void ClearClipboardData() { OpenClipboard(GetOpenClipboardWindow()); EmptyClipboard(); CloseClipboard(); } } internal sealed class Program { static void Main() { StringBuilder sb = new StringBuilder(); for (int i = 0; i < 10; i++) sb.Append("test, "); //copy to clipboard test WinAPI.CopyToClipboard(sb.ToString()); Thread.Sleep(1500); //paste to console text test WinAPI.PasteFromClipboard(); Thread.Sleep(1500); //clear clipboard test WinAPI.ClearClipboardData(); } } }
combined_dataset/train/non-malicious/sample_53_76.ps1
sample_53_76.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function Get-Token { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [CmdletBinding()] [OutputType([System.Management.Automation.Language.Token])] [System.Diagnostics.CodeAnalysis.SuppressMessage('PSUseOutputTypeCorrectly', '', Justification='Issue #676')] param( [Parameter(Position=0, ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateNotNullOrEmpty()] [System.Management.Automation.Language.IScriptExtent] $Extent ) process { if (-not $Extent) { if (-not $PSCmdlet.MyInvocation.ExpectingInput) { # yield $psEditor.GetEditorContext().CurrentFile.Tokens } return } $tokens = $psEditor.GetEditorContext().CurrentFile.Tokens $predicate = [Func[System.Management.Automation.Language.Token, bool]]{ param($Token) ($Token.Extent.StartOffset -ge $Extent.StartOffset -and $Token.Extent.EndOffset -le $Extent.EndOffset) } if ($tokens){ $result = [Linq.Enumerable]::Where($tokens, $predicate) } # yield $result } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfuAfG/hU4RO9B # UVfTCRsmVgUL/ABJBK+2LkmTOQ7mSqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBStM8e0q5MrDqK9JIwOygit # ifKRypsL42aBgwLjoBnOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAP34+aGsMXGaysJQ35qx/+/GyJWI+LKq5scPmtvBXrXMZMb63O8cvjzgA # H9k3xnSazeWv04DprhAQGyA5bt4O7dYYzQPwkbBwhOeyV5PnYluF8C08LfFstwJJ # 4tAnd4iGjXKrOeukt4F0SAO1VhUzEeSY4Nv+dakQvadzu5DtoBkTEKwc7xzQx6n5 # QO/MrRVjtOLOwwCT8/isV69P10VFAE6vqIVsLA122GteRPsIcuLuW+3RF0HRHYd0 # SgtFd63W6sNd91u4VciteU4sAc+WT2+zQSBDd04OQQpofCNIO8mdAlVrBuImAJfg # 2/L5+qSyuWrTkduY9NNpCNwtsitGtaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDoFjzagx+5UK9DmRwR+DhhOgrmzxUZpNS9QIcYMd2LuAIGZjK+s5GG # GBMyMDI0MDUwMzIzMzAxOC44NzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QABAAAB5zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWMv9/HRUC5kdiEF89YBP6/ # Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWOGRaLcaVbGTfcmI1vMRJ1 # tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE8RlrauwK/e+nWnwMt060 # akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh3yrMa89uBfaeHQZEHGQq # dskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZjUzWHg9bf1mqZ0cIiAWC0 # EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr/84T9/xK5r82ulvRp2A8 # /ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OIGSF9a+DfXl1LpQPNKR79 # 2scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoPkk5asfxrrJbCsJePHSOE # blpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68UM+MskLPld1eqdOOMK7S # bbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqfitgubdRCmYr9CVsNOuW+ # wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74BQcfrxjvk1L8jvtN7mul # IwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4dpEf/Zlrh1K73o9YMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1cC6nsfie5Jtp09o6b6ARC # pvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk6ycokdQr3815pEOaYWTn # HvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gNnz0Ol6v7u/qEjz48zXZ6 # ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5FdbV45ghGTKgSr5ECAOn # LD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikunbUTJfNfBDLL7Gv+sTmRi # DZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6+FkI0QQNvuPpWsDU8sR+ # uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaELBJ9a+YOjE5pmSarW5sGb # n7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGjZqkFusKaUW72yMj/yxTe # GEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1lehP0xaO+oBV1XfvaCur/B # 5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Umr8K6Auo+Jlj8IeFS6lSv # KhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K546k0sZrxdZPgpmz7O8w9 # gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCz # cgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6d/gFjAiGA8yMDI0MDUwMzIyMTM0 # MloYDzIwMjQwNTA0MjIxMzQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp3+AW # AgEAMAoCAQACAgrjAgH/MAcCAQACAhNFMAoCBQDp4TGWAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAAF03Cnibip31GxFz5/BH0p2xcSNO7N4OIAXaRo1Ba/+ # nnOyLrfnEPEbyIZUzjeIHAij+wTQ0xZJS0buIvbyFbuAcOOx2gDTz2zDb53QSKUN # IhU9CRP0ZYMPOy1zC9IFI4Im6dy73xri8tmUGHQh7PXg3fLWKUyQjiQysc2EqgCV # KspkYoY7e4U08XNDnCowHCwojxkWN/1oZe551TVJVNmiPBV2bUcEMMGNNTsEFwBc # WJHo9MQoCgmy1yn0qzPnimV3tG/Kqaw2mkieB+T8RRWGNz8DeKZDqZDVTD2T8WVG # JelfgTTca5sU+m3axp+ke9eyulZo+64EtlqderccynQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecujy+TC08b6QABAAAB # 5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCEHspgfZuU6K9KhGMVNAP4iAezhssfcvODgwKlfh/M # mzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12aob9DeDFXM9UFHeE # X74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgqlaTCWOaa+AAu/C0Mo9z8XcL # sbQmklFVAz7qc+93mXMwDQYJKoZIhvcNAQELBQAEggIAp3h6DR2+3o6JP9/45IXj # ytanNjczMXwy45pqRP1zAp91S6uoJp2aNJxGQ+1m1/We7ptnUWnpDOctjLvKnRq4 # fsbiUC7p+KD4szCcGVPS9GePHfUChjIF76jXmWNFFU7HR/K1wVwZPnTaNIBqAsK0 # nsKqk1TjdVjeiUq19VvrTfoIKxxvm/tnMkvyLUhAA0xJqkxmUC5JRRhqYwsrZnZ0 # cC6eMzB5F+sqgUUtFERMu3OY+uA5ZZHFicY04E99P/z7S4UrafUbPmbwTROK4hp4 # OTAyEg8UTkiSd1PXjfkuo9ETVDmb9URAAHjvqm8uo8yp7COBR5Y0XipjyRNBPhO/ # GG/MiSNZvkWkXWLP9/riC0qVN/+yKXlAugPItPXTCeY+MkrgEdyb1a596d0eVVtN # 6+MDuH3RBNhDlUBcFJWf4l0RHQIPPWZye4gJXYFMhKPnT05t+0L6wP1h1G2l7mtF # rpdlpIv84QcdM8j3rrkT3m5QWsU60AEnh8O+U0gcL++phe35YVfiJMaDyySCKjtG # AlvYZBur1zZTu5+gw7MEd6wHwNLoTl3sVCF58DuIreZimSjD1jmWKRFHWHC1FKOW # fZWgzhwjeiK+Tl2ap9JjFCVllPb4SCVJO2NMOrUvEVlwUdY3l6jVtn8y2i02k8jt # InaD4XHX9FjwC3JSRm2wK8M= # SIG # End signature block
combined_dataset/train/non-malicious/sample_56_53.ps1
sample_56_53.ps1
# # Module manifest for module 'OCI.PSModules.Psql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Psql.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Psql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList', 'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList', 'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem', 'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration', 'Get-OCIPsqlDefaultConfigurationsList', 'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList', 'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList', 'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList', 'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem', 'Move-OCIPsqlBackupCompartment', 'Move-OCIPsqlConfigurationCompartment', 'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup', 'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem', 'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration', 'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword', 'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem', 'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration', 'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-TheVillageChurchPod.ps1
Get-TheVillageChurchPod.ps1
function Get-TheVillageChurchPodCast { <# .SYNOPSIS Gets The Village Church sermon podcasts. .DESCRIPTION The Get-TheVillageChurchPodcast function returns objects of all the available sermon podcasts from The Village Church. The objects can be filtered by speaker, series, title, or date and optionally downloaded to a specified folder. .PARAMETER Speaker Specifies the name of the podcast speaker. The wildcard '*' is allowed. .PARAMETER Series Specifies the series of the podcast. The wildcard '*' is allowed. .PARAMETER Title Specifies the title of the podcast. The wildcard '*' is allowed. .PARAMETER Date Specifies the date or date range of the podcast(s). .PARAMETER DownloadPath Specifies the download folder path to save the podcast files. .EXAMPLE Get-TheVillageChurchPodcast Gets all the available sermon podcasts from The Village Church. .EXAMPLE Get-TheVillageChurchPodcast -Speaker MattChandler -Series Habakkuk Gets all the sermon podcasts where Matt Chandler is the speaker and the series is Habakkuk. .EXAMPLE Get-TheVillageChurchPodcast -Speaker MattChandler -Date 1/1/2003,3/31/2003 Gets all the sermon podcasts where Matt Chandler is the speaker and the podcasts are in the date ranage 1/1/2003 - 3/31/2003. .EXAMPLE Get-TheVillageChurchPodcast -Speaker MattChandler -Date 1/1/2003,3/31/2003 -DownloadPath C:\\temp\\TheVillage Gets all the sermon podcasts where Matt Chandler is the speaker and the podcasts are in the date ranage 1/1/2003 - 3/31/2003 and downloads the podcast files to the folder path C:\\temp\\TheVillage. .INPUTS System.String .OUTPUTS PSObject .NOTES Name: Get-TheVillageChurchPodCast Author: Rich Kusak Created: 2011-06-14 LastEdit: 2011-09-12 11:07 Version: 1.2.0.0 .LINK http://fm.thevillagechurch.net/sermons .LINK about_regular_expressions #> [CmdletBinding()] param ( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [string]$Speaker = '*', [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [string]$Series = '*', [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [string]$Title = '*', [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateCount(1,2)] [datetime[]]$Date = ([datetime]::MinValue,[datetime]::MaxValue), [Parameter(ValueFromPipelineByPropertyName=$true)] [ValidateScript({ if ($_) { if (Test-Path $_ -IsValid) {$true} else { throw "The download path '$_' is not valid." } } else {$true} })] [string]$DownloadPath ) begin { $sermonsUri = 'http://fm.thevillagechurch.net/sermons' $studiesSeminarsUri = 'http://fm.thevillagechurch.net/studies-seminars' $resourceFilesAudioUri = 'http://fm.thevillagechurch.net/resource_files/audio/' $partRegex = "href='/resource_files/audio/(?<file>(?<date>\\d{8}).*_(?<speaker>\\w+)_(?<series>\\w+)Pt(?<part>\\d+)-(?<title>\\w+)\\.mp3)'" $noPartRegex = "href='/resource_files/audio/(?<file>(?<date>\\d{8}).*_(?<speaker>\\w+)_(?<series>\\w+)-(?<title>\\w+)\\.mp3)'" $webClient = New-Object System.Net.WebClient if ([System.Net.WebProxy]::GetDefaultProxy().Address) { $webClient.UseDefaultCredentials = $true $webClient.Proxy.Credentials = $webClient.Credentials } } # begin process { try { Write-Debug "Performing operation 'DownloadString' on target '$sermonsUri'." $reference = $webClient.DownloadString($sermonsUri) $pages = [regex]::Matches($reference, 'page=(\\d+)&') | ForEach {$_.Groups[1].Value} | Sort -Unique $pages | ForEach -Begin {$sermons = @()} -Process { $sermonsPageUri = "http://fm.thevillagechurch.net/sermons?type=sermons&page=$_&match=any&kw=&topic=&sb=date&sd=desc" Write-Debug "Performing operation 'DownloadString' on target '$sermonsPageUri'." $sermons += $webClient.DownloadString($sermonsPageUri) } } catch { return Write-Error $_ } $obj = foreach ($line in $sermons -split '(?m)\\s*$') { if ($line -match $partRegex) { New-Object PSObject -Property @{ 'File' = $matches['file'] 'Date' = "{0:####-##-##}" -f [int]$matches['date'] 'Speaker' = $matches['speaker'] 'Series' = $matches['series'] 'Part' = "{0:d2}" -f [int]$matches['part'] 'Title' = $matches['title'] } } elseif ($line -match $noPartRegex) { New-Object PSObject -Property @{ 'File' = $matches['file'] 'Date' = "{0:####-##-##}" -f [int]$matches['date'] 'Speaker' = $matches['speaker'] 'Series' = $matches['series'] 'Part' = '00' 'Title' = $matches['title'] } } } # foreach ($line in $sermons -split '(?m)\\s*$') if ($PSBoundParameters['Date']) { switch ($Date.Length) { 1 {$Date += $Date ; break} 2 { if ($Date[0] -gt $Date[1]) { [array]::Reverse($Date) } } } # switch } # if ($PSBoundParameters['Date']) if ($DownloadPath) { try { if (-not (Test-Path $DownloadPath -PathType Container)) { New-Item $DownloadPath -ItemType Directory -Force -ErrorAction Stop | Out-Null } } catch { return Write-Error $_ } [PSObject[]]$filter = $obj | Where { $_.Speaker -like $Speaker -and $_.Series -like $Series -and ([datetime]$_.Date -ge $Date[0]) -and ([datetime]$_.Date -le $Date[1]) } $count = $filter.Length $i = 0 foreach ($podcast in $filter) { $fullPath = Join-Path $DownloadPath $podcast.File if (Test-Path $fullPath) { Write-Warning "File '$fullPath' already exists." continue } try { Write-Debug "Performing operation 'DownloadFile' on target '$($podcast.File)'." Write-Progress -Activity 'Downloading PodCast' -Status $podcast.File -PercentComplete $(($i/$count)*100 ; $i++) -CurrentOperation "$i of $count" $webClient.DownloadFile($resourceFilesAudioUri + $podcast.File, $fullPath) } catch { Write-Error $_ continue } } # foreach ($podcast in $filter) Write-Progress -Activity 'Downloading PodCast' -Status 'Complete' -PercentComplete 100 Sleep -Seconds 1 } else { $obj | Where { $_.Speaker -like $Speaker -and $_.Series -like $Series -and $_.Title -like $Title -and ([datetime]$_.Date -ge $Date[0]) -and ([datetime]$_.Date -le $Date[1]) } | Select Date, Speaker, Series, Part, Title | Sort Date } } # process } # function Get-TheVillageChurchPodCast {
combined_dataset/train/non-malicious/2986.ps1
2986.ps1
function BeforeEach { [CmdletBinding()] param ( [Parameter(Mandatory = $true, Position = 1)] [Scriptblock] $Scriptblock ) Assert-DescribeInProgress -CommandName BeforeEach } function AfterEach { [CmdletBinding()] param ( [Parameter(Mandatory = $true, Position = 1)] [Scriptblock] $Scriptblock ) Assert-DescribeInProgress -CommandName AfterEach } function BeforeAll { [CmdletBinding()] param ( [Parameter(Mandatory = $true, Position = 1)] [Scriptblock] $Scriptblock ) Assert-DescribeInProgress -CommandName BeforeAll } function AfterAll { [CmdletBinding()] param ( [Parameter(Mandatory = $true, Position = 1)] [Scriptblock] $Scriptblock ) Assert-DescribeInProgress -CommandName AfterAll } function Invoke-TestCaseSetupBlocks { Invoke-Blocks -ScriptBlock $pester.GetTestCaseSetupBlocks() } function Invoke-TestCaseTeardownBlocks { Invoke-Blocks -ScriptBlock $pester.GetTestCaseTeardownBlocks() } function Invoke-TestGroupSetupBlocks { Invoke-Blocks -ScriptBlock $pester.GetCurrentTestGroupSetupBlocks() } function Invoke-TestGroupTeardownBlocks { Invoke-Blocks -ScriptBlock $pester.GetCurrentTestGroupTeardownBlocks() } function Invoke-Blocks { param ([scriptblock[]] $ScriptBlock) foreach ($block in $ScriptBlock) { if ($null -eq $block) { continue } $null = . $block } } function Add-SetupAndTeardown { param ( [scriptblock] $ScriptBlock ) if ($PSVersionTable.PSVersion.Major -le 2) { Add-SetupAndTeardownV2 -ScriptBlock $ScriptBlock } else { Add-SetupAndTeardownV3 -ScriptBlock $ScriptBlock } } function Add-SetupAndTeardownV3 { param ( [scriptblock] $ScriptBlock ) $pattern = '^(?:Before|After)(?:Each|All)$' $predicate = { param ([System.Management.Automation.Language.Ast] $Ast) $Ast -is [System.Management.Automation.Language.CommandAst] -and $Ast.CommandElements[0].ToString() -match $pattern -and $Ast.CommandElements[-1] -is [System.Management.Automation.Language.ScriptBlockExpressionAst] } $searchNestedBlocks = $false $calls = $ScriptBlock.Ast.FindAll($predicate, $searchNestedBlocks) foreach ($call in $calls) { $iPmdProviderType = [scriptblock].Assembly.GetType('System.Management.Automation.Language.IParameterMetadataProvider') $flags = [System.Reflection.BindingFlags]'Instance, NonPublic' $constructor = [scriptblock].GetConstructor($flags, $null, [Type[]]@($iPmdProviderType, [bool]), $null) $block = $constructor.Invoke(@($call.CommandElements[-1].ScriptBlock, $false)) Set-ScriptBlockScope -ScriptBlock $block -SessionState $pester.SessionState $commandName = $call.CommandElements[0].ToString() Add-SetupOrTeardownScriptBlock -CommandName $commandName -ScriptBlock $block } } function Add-SetupAndTeardownV2 { param ( [scriptblock] $ScriptBlock ) $codeText = $ScriptBlock.ToString() $tokens = @(ParseCodeIntoTokens -CodeText $codeText) for ($i = 0; $i -lt $tokens.Count; $i++) { $token = $tokens[$i] $type = $token.Type if ($type -eq [System.Management.Automation.PSTokenType]::Command -and (IsSetupOrTeardownCommand -CommandName $token.Content)) { $openBraceIndex, $closeBraceIndex = Get-BraceIndicesForCommand -Tokens $tokens -CommandIndex $i $block = Get-ScriptBlockFromTokens -Tokens $Tokens -OpenBraceIndex $openBraceIndex -CloseBraceIndex $closeBraceIndex -CodeText $codeText Add-SetupOrTeardownScriptBlock -CommandName $token.Content -ScriptBlock $block $i = $closeBraceIndex } elseif ($type -eq [System.Management.Automation.PSTokenType]::GroupStart) { $i = Get-GroupCloseTokenIndex -Tokens $tokens -GroupStartTokenIndex $i } } } function ParseCodeIntoTokens { param ([string] $CodeText) $parseErrors = $null $tokens = [System.Management.Automation.PSParser]::Tokenize($CodeText, [ref] $parseErrors) if ($parseErrors.Count -gt 0) { $currentScope = $pester.CurrentTestGroup.Hint if (-not $currentScope) { $currentScope = 'test group' } throw "The current $currentScope block contains syntax errors." } return $tokens } function IsSetupOrTeardownCommand { param ([string] $CommandName) return (IsSetupCommand -CommandName $CommandName) -or (IsTeardownCommand -CommandName $CommandName) } function IsSetupCommand { param ([string] $CommandName) return $CommandName -eq 'BeforeEach' -or $CommandName -eq 'BeforeAll' } function IsTeardownCommand { param ([string] $CommandName) return $CommandName -eq 'AfterEach' -or $CommandName -eq 'AfterAll' } function IsTestGroupCommand { param ([string] $CommandName) return $CommandName -eq 'BeforeAll' -or $CommandName -eq 'AfterAll' } function Get-BraceIndicesForCommand { param ( [System.Management.Automation.PSToken[]] $Tokens, [int] $CommandIndex ) $openingGroupTokenIndex = Get-GroupStartTokenForCommand -Tokens $Tokens -CommandIndex $CommandIndex $closingGroupTokenIndex = Get-GroupCloseTokenIndex -Tokens $Tokens -GroupStartTokenIndex $openingGroupTokenIndex return $openingGroupTokenIndex, $closingGroupTokenIndex } function Get-GroupStartTokenForCommand { param ( [System.Management.Automation.PSToken[]] $Tokens, [int] $CommandIndex ) $commandName = $Tokens[$CommandIndex].Content if ($CommandIndex + 1 -lt $tokens.Count -and ($tokens[$CommandIndex + 1].Type -eq [System.Management.Automation.PSTokenType]::GroupStart -or $tokens[$CommandIndex + 1].Content -eq '{')) { return $CommandIndex + 1 } if ($CommandIndex + 2 -lt $tokens.Count -and ($tokens[$CommandIndex + 2].Type -eq [System.Management.Automation.PSTokenType]::GroupStart -or $tokens[$CommandIndex + 2].Content -eq '{')) { return $CommandIndex + 2 } throw "The $commandName command must be followed by the script block as the first argument or named parameter value." } & $SafeCommands['Add-Type'] -TypeDefinition @' namespace Pester { using System; using System.Management.Automation; public static class ClosingBraceFinder { public static int GetClosingBraceIndex(PSToken[] tokens, int startIndex) { int groupLevel = 1; int len = tokens.Length; for (int i = startIndex + 1; i < len; i++) { PSTokenType type = tokens[i].Type; if (type == PSTokenType.GroupStart) { groupLevel++; } else if (type == PSTokenType.GroupEnd) { groupLevel--; if (groupLevel <= 0) { return i; } } } return -1; } } } '@ function Get-GroupCloseTokenIndex { param ( [System.Management.Automation.PSToken[]] $Tokens, [int] $GroupStartTokenIndex ) $closeIndex = [Pester.ClosingBraceFinder]::GetClosingBraceIndex($Tokens, $GroupStartTokenIndex) if ($closeIndex -lt 0) { throw 'No corresponding GroupEnd token was found.' } return $closeIndex } function Get-ScriptBlockFromTokens { param ( [System.Management.Automation.PSToken[]] $Tokens, [int] $OpenBraceIndex, [int] $CloseBraceIndex, [string] $CodeText ) $blockStart = $Tokens[$OpenBraceIndex + 1].Start $blockLength = $Tokens[$CloseBraceIndex].Start - $blockStart $setupOrTeardownCodeText = $codeText.Substring($blockStart, $blockLength) $scriptBlock = [scriptblock]::Create($setupOrTeardownCodeText) Set-ScriptBlockHint -Hint "Unbound ScriptBlock from Get-ScriptBlockFromTokens" -ScriptBlock $scriptBlock Set-ScriptBlockScope -ScriptBlock $scriptBlock -SessionState $pester.SessionState return $scriptBlock } function Add-SetupOrTeardownScriptBlock { param ( [string] $CommandName, [scriptblock] $ScriptBlock ) $Pester.AddSetupOrTeardownBlock($ScriptBlock, $CommandName) }
combined_dataset/train/non-malicious/sample_11_64.ps1
sample_11_64.ps1
# # Module manifest for module 'OCI.PSModules.Applicationmigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Applicationmigration.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'eb3a14f9-0881-4138-8aee-090e2f4145e2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Applicationmigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Applicationmigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApplicationmigrationMigration', 'Get-OCIApplicationmigrationMigrationsList', 'Get-OCIApplicationmigrationSource', 'Get-OCIApplicationmigrationSourceApplicationsList', 'Get-OCIApplicationmigrationSourcesList', 'Get-OCIApplicationmigrationWorkRequest', 'Get-OCIApplicationmigrationWorkRequestErrorsList', 'Get-OCIApplicationmigrationWorkRequestLogsList', 'Get-OCIApplicationmigrationWorkRequestsList', 'Invoke-OCIApplicationmigrationMigrateApplication', 'Move-OCIApplicationmigrationMigrationCompartment', 'Move-OCIApplicationmigrationSourceCompartment', 'New-OCIApplicationmigrationMigration', 'New-OCIApplicationmigrationSource', 'Remove-OCIApplicationmigrationMigration', 'Remove-OCIApplicationmigrationSource', 'Stop-OCIApplicationmigrationWorkRequest', 'Update-OCIApplicationmigrationMigration', 'Update-OCIApplicationmigrationSource' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Applicationmigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_53_25.ps1
sample_53_25.ps1
# # Module manifest for module 'OCI.PSModules.Functions' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Functions.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '21b96577-939f-4757-b9c9-34f5b0c1c54b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Functions Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Functions.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIFunctionsApplication', 'Get-OCIFunctionsApplicationsList', 'Get-OCIFunctionsFunction', 'Get-OCIFunctionsList', 'Get-OCIFunctionsPbfListing', 'Get-OCIFunctionsPbfListingsList', 'Get-OCIFunctionsPbfListingVersion', 'Get-OCIFunctionsPbfListingVersionsList', 'Get-OCIFunctionsTriggersList', 'Invoke-OCIFunctionsFunction', 'Move-OCIFunctionsApplicationCompartment', 'New-OCIFunctionsApplication', 'New-OCIFunctionsFunction', 'Remove-OCIFunctionsApplication', 'Remove-OCIFunctionsFunction', 'Update-OCIFunctionsApplication', 'Update-OCIFunctionsFunction' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Functions' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1353.ps1
1353.ps1
function Remove-CHostsEntry { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,Position=0)] [string[]] $HostName, [string] $Path = (Get-CPathToHostsFile) ) begin { Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $allHostNames = New-Object 'Collections.ArrayList' } process { $HostName | ForEach-Object { [Text.RegularExpressions.Regex]::Escape( $_ ) } | ForEach-Object { [void] $allHostNames.Add( $_ ) } } end { $regex = $allHostNames -join '|' $regex = '^[0-9a-f.:]+\s+\b({0})\b.*$' -f $regex $cmdErrors = @() $newHostsFile = Read-CFile -Path $Path -ErrorVariable 'cmdErrors' | Where-Object { $_ -notmatch $regex } if( $cmdErrors ) { return } $entryNoun = 'entry' if( $HostName.Count -gt 1 ) { $entryNoun = 'entries' } if( $PSCmdlet.ShouldProcess( $Path, ('removing hosts {0} {1}' -f $entryNoun,($HostName -join ', ')) ) ) { $newHostsFile | Write-CFile -Path $Path } } }
combined_dataset/train/non-malicious/1529.ps1
1529.ps1
[CmdletBinding()] param( ) Set-StrictMode -Version 'Latest' $ErrorActionPreference = 'Stop' & (Join-Path -Path $PSScriptRoot -ChildPath '..\Carbon\Import-Carbon.ps1' -Resolve) $installPath = Get-PowerShellModuleInstallPath $installPath = Join-Path -Path $installPath -ChildPath 'Carbon' $source = Join-Path -Path $PSScriptRoot -ChildPath '..\Carbon' -Resolve if( -not $source ) { return } if( (Test-Path -Path $installPath -PathType Container) ) { $newName = 'Carbon{0}' -f [IO.Path]::GetRandomFileName() Write-Verbose ('Renaming existing Carbon module: {0} -> {1}' -f $installPath,$newName) Rename-Item -Path $installPath $newName $oldModulePath = Join-Path -Path (Get-PowerShellModuleInstallPath) -ChildPath $newName if( Test-Path -Path $oldModulePath -PathType Container ) { Write-Verbose ('Removing old Carbon module: {0}' -f $oldModulePath) Remove-Item -Path $oldModulePath -Force -Recurse } else { return } if( Test-Path -Path $oldModulePath -PathType Container ) { return } } Write-Verbose -Message ('Installing Carbon: {0} -> {1}' -f $source,$installPath) Copy-Item -Path $source -Destination $installPath -Recurse
combined_dataset/train/non-malicious/3733.ps1
3733.ps1
function Get-ResourceGroupName { return getAssetName } function Get-ResourceName { return getAssetName } function Get-ProviderLocation($provider) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { $namespace = $provider.Split("/")[0] if($provider.Contains("/")) { $type = $provider.Substring($namespace.Length + 1) $location = Get-AzResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type} if ($location -eq $null) { return "West US" } else { return $location.Locations[0] } } return "West US" } return "WestUS" } function TestSetup-CreateResourceGroup { $resourceGroupName = getAssetName $rglocation = Get-ProviderLocation "North Europe" $resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation -Force return $resourceGroup } function TestSetup-CreateProfile($profileName, $resourceGroupName, $routingMethod = "Performance") { $relativeName = getAssetName $profile = New-AzTrafficManagerProfile -Name $profileName -ResourceGroupName $resourceGroupName -RelativeDnsName $relativeName -Ttl 50 -TrafficRoutingMethod $routingMethod -MonitorProtocol "HTTP" -MonitorPort 80 -MonitorPath "/testpath.asp" -ProfileStatus "Enabled" return $profile } function TestSetup-AddEndpoint($endpointName, $profile) { $profile = Add-AzTrafficManagerEndpointConfig -EndpointName $endpointName -TrafficManagerProfile $profile -Type "ExternalEndpoints" -Target "www.contoso.com" -EndpointStatus "Enabled" -EndpointLocation "North Europe" return $profile } function TestCleanup-RemoveResourceGroup($rgname) { Remove-AzResourceGroup -Name $rgname -Force }
combined_dataset/train/non-malicious/2857.ps1
2857.ps1
function Assert { [CmdletBinding()] param( [Parameter(Mandatory = $true)] $conditionToCheck, [Parameter(Mandatory = $true)] [string]$failureMessage ) if (-not $conditionToCheck) { throw ('Assert: {0}' -f $failureMessage) } }
combined_dataset/train/non-malicious/Disconnect-VMHost.ps1
Disconnect-VMHost.ps1
#requires -version 2 -pssnapin VMware.VimAutomation.Core Function Disconnect-VMHost { <# .Summary Used to Disconnect a Connected host from vCenter. .Parameter VMHost VMHost to Disconnect to virtual center .Example Get-VMHost | Where-Object {$_.state -eq "Connected"} | Disconnect-VMHost Will Attempt to Disconnect any host that are currently Connected. .Example Disconnect-VMHost -Name ESX1.get-admin.local Will Disconnect ESX1 From vCenter #> [CmdletBinding( SupportsShouldProcess=$True, SupportsTransactions=$False, ConfirmImpact="low", DefaultParameterSetName="ByString" )] Param( [Parameter( Mandatory=$True, Valuefrompipeline=$true, ParameterSetName="ByObj" )] [VMware.VimAutomation.Client20.VMHostImpl[]] $VMHost, [Parameter( Mandatory=$True, Position=0, ParameterSetName="ByString" )] [string[]] $Name ) Begin { IF ($Name) { $VMHost = $Name|%{ Get-VMHost -Name $_ } } } process { Foreach ($VMHostImpl in ($VMHost|Get-View)) { if ($pscmdlet.ShouldProcess($VMHostImpl.name)) { $VMHostImpl.DisconnectHost_Task() } } } }
combined_dataset/train/non-malicious/sample_45_48.ps1
sample_45_48.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZbqh33XEGBMyMDI0MDIxNzIxMTI1OS44NzNaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHdXVcdldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAKhOA5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2Dtri # QP+T52HXbN2g7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzI # HHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0m # Aq3earyH+AKmv6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5 # EW6NVnXMYOTRKuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgD # FjHUpcHSODujlFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7kt # FAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5 # gpv+YcvBM834bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSv # tFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zlj # EjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnS # eOXePT6hMF0Il598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/ea # O2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+m # bXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcG # dXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+ # zvGJNAF+5/5qBk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+O # dAquBiDkYQ5kVfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9 # PNlyEHHbQZDmi9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbM # P+/vdYUqaJspupBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM # 9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4Q # QQj3KgqjqDOWInVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegce # J9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNH # GWXbNaDPxnyiDbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOl7iQ0wIhgPMjAyNDAyMTgwMzM1NDFa # GA8yMDI0MDIxOTAzMzU0MVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6XuJDQIB # ADAHAgEAAgIOUjAHAgEAAgIRaTAKAgUA6XzajQIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAMhLrOCcdN1sjqVfUCJPSCOcZUvIZdyBRKnmZKcb3s2TGKwDAxBE # UzebI9z5sPLaHTzGJFlpoKbk57IvBqdJ47qE0KEXDwmzkoHsVxPsjWmKZ0AjP6rF # qc6TTmygfpYK2ctRAzVxwOt55nIbmgeeevefcQU0LCjy+E8snDWmkQIrMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcd # ldStqhsAAQAAAd0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgYVZT74R/VtL1lTszhdJkwk2U9VNP # Q5f71Mxiqyo5MTcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWs # T3iZnHtH0Vk37UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIPZEwlFVK1e9 # 4zsXmvxb/fycZSlrbBuLfZFGUzyiCYcoMA0GCSqGSIb3DQEBCwUABIICAJYcpEzI # NkMbvJLrQdpk8e79JTxsceRK9H5X+XVNdB+0X2JuQ6itJ4wAAm23VS+y8X0VuIWL # s5wjt2zV9VLwWn2jLfw2MCinfeE7zIqSWUkUB82k9DNi77iAImaWM4gKQ8HZgVVq # EJlGDMxgiJGsIpO6CIpz8ZNZ4Q4LNVgkeVr2Oz/tlgHu+Q/hYWrSPVIhjC87dKv3 # ID2mL1lvN0O6gTbRGHSZKVovKOrDCG4tradxIpdjiS0xTrJVfsWnVeiZJiy6Dwmu # oBpYdQm7Ik+YCzP1fQhpeLzO8nKapyjnRr+NPd4dusrznmsP2qEq+kB41EV8GY2y # jqskpuRXAmzOHou6s9ENjiQtkR2Ea7HlGQkWbnj5wtxAThlnMdJsUNrq0ryhLWui # 5/+EevwPW2hfEYIKCwQ4I+Mt6VSLmdQ37D9TdrHX7JsPlagDE/EQu1ZQMSIWsImw # GohBLVC299KRpqcSHb8NnN1VS9zZRDRxuelW8gd1ACSfqEhAis600ect5n1miaau # 34NSTNOOPNVbc0nkdgmPPNYPuNdSxG2Y6AgeEXEw/HqJX5n4hJWFat3DFbqL371s # FLVVnhbZzCNltZyVfSjyoduKKmW/hIdAIy8IXqzIaLbLv2KOPfBoj71I01wRSxtG # i3lSNgK/CuEkqxgIS9AcVZAcoCZlibeJXatd # SIG # End signature block
combined_dataset/train/non-malicious/3740.ps1
3740.ps1
$data=123 $securedata=$data | ConvertTo-SecureString -AsPlainText -Force $newdata=456 $newsecuredata=$newdata | ConvertTo-SecureString -AsPlainText -Force $expires= (Get-Date).AddYears(2).ToUniversalTime() $nbf=(Get-Date).ToUniversalTime() $newexpires= (Get-Date).AddYears(5).ToUniversalTime() $newnbf=(Get-Date).AddYears(1).ToUniversalTime() $delta=[TimeSpan]::FromMinutes(2) $tags=@{"tag1"="value1"; "tag2"=""; "tag3"=$null} $newtags= @{"tag1"="value1"; "tag2"="value2"; "tag3"="value3"; "tag4"="value4"} $emptytags=@{} $contenttype="contenttype" $newcontenttype="newcontenttype" $emptycontenttype="" function Assert-SecretAttributes($secretAttr, $secenable, $secexp, $secnbf, $seccontenttype, $sectags) { Assert-NotNull $secretAttr, "secretAttr is null." Assert-AreEqual $secenable $secretAttr.Enabled "Expect $secenable. Get $secretAttr.Enabled" Assert-True { Equal-DateTime $secexp $secretAttr.Expires } "Expect $secexp. Get $secretAttr.Expires" Assert-True { Equal-DateTime $secnbf $secretAttr.NotBefore} "Expect $secnbf. Get $secretAttr.NotBefore" Assert-True { Equal-String $seccontenttype $secretAttr.ContentType} "Expect $seccontenttype. Get $secretAttr.ContentType" Assert-True { Equal-Hashtable $sectags $secretAttr.Tags} "Expected $sectags. Get $secretAttr.Tags" Assert-NotNull $secretAttr.RecoveryLevel, "Deletion recovery level is null." } function BulkCreateSecrets ($vault, $prefix, $total) { for ($i=0;$i -lt $total; $i++) { $name = $prefix+$i; $sec=Set-AzKeyVaultSecret -VaultName $vault -Name $name -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $name } } function BulkCreateSecretVersions ($vault, $name, $total) { for ($i=0;$i -lt $total; $i++) { $sec=Set-AzKeyVaultSecret -VaultName $vault -Name $name -SecretValue $securedata Assert-NotNull $sec } $global:createdSecrets += $name } function Test_CreateSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'default' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null } function Test_CreateSecretWithCustomAttributes { $keyVault = Get-KeyVault $secretname= Get-SecretName 'attr' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Disable -Tag $tags Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_UpdateSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'update' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $newsecuredata Assert-NotNull $sec Assert-AreEqual $sec.SecretValueText $newdata Assert-SecretAttributes $sec.Attributes $true $null $null $null $null } function Test_SetSecretPositionalParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'positional' $sec=Set-AzKeyVaultSecret $keyVault $secretname $securedata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Disable -Tag $tags Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_SetSecretAliasParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'alias' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname -SecretValue $securedata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Disable -Tag $tags Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_SetSecretInNonExistVault { $keyVault = 'notexistvault' $secretname= Get-SecretName 'nonexist' Assert-Throws {Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata} } function Test_SetSecretInNoPermissionVault { $keyVault = Get-KeyVault $false $secretname= Get-SecretName 'nopermission' Assert-Throws {Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata} } function Test_UpdateIndividualSecretAttributes { $keyVault = Get-KeyVault $secretname=Get-SecretName 'updateattr' $sec=Set-AzKeyVaultSecret $keyVault $secretname $securedata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Disable -Tag $tags Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Expires $newexpires -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $newexpires $nbf $contenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -NotBefore $newnbf -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $newexpires $newnbf $contenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Enable $true -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $newexpires $newnbf $contenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -ContentType $newcontenttype -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $newexpires $newnbf $newcontenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Tag $newtags -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $newexpires $newnbf $newcontenttype $newtags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Tag $emptytags -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $newexpires $newnbf $newcontenttype $emptytags } function Test_UpdateSecretWithNoChange { $keyVault = Get-KeyVault $secretname=Get-SecretName 'updatenochange' $sec=Set-AzKeyVaultSecret $keyVault $secretname $securedata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Disable -Tag $tags Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_UpdateAllEditableSecretAttributes { $keyVault = Get-KeyVault $secretname=Get-SecretName 'updateall' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Expires $expires -NotBefore $nbf -ContentType $contenttype -Enable $false -Tag $tags -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_SetSecretAttributePositionalParameter { $keyVault = Get-KeyVault $secretname=Get-SecretName 'attrpos' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Set-AzKeyVaultSecretAttribute $keyVault $secretname -Expires $expires -NotBefore $nbf -ContentType $contenttype -Enable $false -Tag $tags -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_SetSecretAttributeAliasParameter { $keyVault = Get-KeyVault $secretname=Get-SecretName 'attralias' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Set-AzKeyVaultSecretAttribute -VaultName $keyVault -SecretName $secretname -Expires $expires -NotBefore $nbf -ContentType $contenttype -Enable $false -Tag $tags -PassThru Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $false $expires $nbf $contenttype $tags } function Test_SetSecretVersion { $keyVault = Get-KeyVault $secretname=Get-SecretName 'mulupdate' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $v1 = $sec.Version $global:createdSecrets += $secretname Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $null $null $null $null Set-AzKeyVaultSecretAttribute -VaultName $keyVault -SecretName $secretname -Version $v1 -Enable $true -Expires $expires -NotBefore $nbf -ContentType $contenttype -Tag $tags -PassThru $sec=Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname -Version $v1 Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $expires $nbf $contenttype $tags $sec=Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname -Version $v2 Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname Assert-NotNull $sec Assert-SecretAttributes $sec.Attributes $true $null $null $null $null } function Test_GetSecretInABadVault { $secretname = Get-SecretName 'nonexist' Assert-Throws { Get-AzKeyVaultSecret '$vaultName' $secretname } } function Test_SetSecretInNonExistVault { $keyVault = 'notexistvault' $secretname=Get-SecretName 'nonexist' Assert-Throws {Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -ContentType $newcontenttype} } function Test_SetNonExistSecret { $keyVault = Get-KeyVault $secretname=Get-SecretName 'nonexist' Assert-Throws {Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -ContentType $newcontenttype} } function Test_SetInvalidSecretAttributes { $keyVault = Get-KeyVault $secretname=Get-SecretName 'invalidattr' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-SecretAttributes $sec.Attributes $true $null $null $null $null Assert-Throws {Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Expires $nbf -NotBefore $expires } } function Test_SetSecretAttrInNoPermissionVault { $keyVault = Get-KeyVault $false $secretname= Get-SecretName 'nopermission' Assert-Throws {Set-AzKeyVaultSecretAttribute -VaultName $keyVault -Name $secretname -Enable $true} } function Test_GetOneSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'getone' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null $sec=Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-NotNull $sec Assert-AreEqual $sec.SecretValueText $data Assert-SecretAttributes $sec.Attributes $true $null $null $null $null } function Test_GetAllSecrets { $keyVault = Get-KeyVault $secretpartialname=Get-SecretName 'get' $total=30 BulkCreateSecrets $keyVault $secretpartialname $total $secs=Get-AzKeyVaultSecret -VaultName $keyVault Assert-True { $secs.Count -ge $total } } function Test_GetPreviousVersionOfSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'getversion' $sec1=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec1 $global:createdSecrets += $secretname Assert-AreEqual $sec1.SecretValueText $data Assert-SecretAttributes $sec1.Attributes $true $null $null $null $null $sec2=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $newsecuredata -Expires $expires -NotBefore $nbf -ContentType $contenttype -Tag $tags Assert-NotNull $sec2 Assert-AreEqual $sec2.SecretValueText $newdata Assert-SecretAttributes $sec2.Attributes $true $expires $nbf $contenttype $tags $sec3=Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Version $sec1.Version Assert-NotNull $sec3 Assert-AreEqual $sec3.SecretValueText $data Assert-SecretAttributes $sec3.Attributes $true $null $null $null $null $sec4=Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Version $sec2.Version Assert-NotNull $sec4 Assert-AreEqual $sec4.SecretValueText $newdata Assert-SecretAttributes $sec4.Attributes $true $expires $nbf $contenttype $tags } function Test_GetSecretVersions { $keyVault = Get-KeyVault $secretname= Get-SecretName 'getversions' $total=30 BulkCreateSecretVersions $keyVault $secretname $total $secs=Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -IncludeVersions Assert-True { $secs.Count -ge $total } } function Test_GetSecretPositionalParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'positional' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data $sec=Get-AzKeyVaultSecret $keyVault $secretname Assert-NotNull $sec Assert-AreEqual $sec.SecretValueText $data } function Test_GetSecretAliasParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'alias' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data $sec=Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname Assert-NotNull $sec Assert-AreEqual $sec.SecretValueText $data } function Test_GetSecretInNonExistVault { $keyVault = 'notexistvault' Assert-Throws {Get-AzKeyVaultSecret -VaultName $keyVault} } function Test_GetNonExistSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'notexistvault' $secret = Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-Null $secret } function Test_GetSecretInNoPermissionVault { $keyVault = Get-KeyVault $false Assert-Throws {Get-AzKeyVaultSecret -VaultName $keyVault} } function Test_RemoveSecretWithoutPrompt { $keyVault = Get-KeyVault $secretname= Get-SecretName 'remove' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname $sec=Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Force -Confirm:$false -PassThru Assert-NotNull $sec $secret = Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-Null $secret } function Test_RemoveSecretWhatIf { $keyVault = Get-KeyVault $secretname= Get-SecretName 'whatif' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -WhatIf -Force $sec=Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-NotNull $sec } function Test_RemoveSecretPositionalParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'positional' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Remove-AzKeyVaultSecret $keyVault $secretname -Force -Confirm:$false $secret = Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-Null $secret } function Test_RemoveSecretAliasParameter { $keyVault = Get-KeyVault $secretname= Get-SecretName 'alias' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-AreEqual $sec.SecretValueText $data Remove-AzKeyVaultSecret -VaultName $keyVault -SecretName $secretname -Force -Confirm:$false $secret = Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname Assert-Null $secret } function Test_RemoveSecretInNonExistVault { $keyVault = 'notexistvault' $secretname= Get-SecretName 'notexistvault' Assert-Throws {Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Force -Confirm:$false} } function Test_RemoveNonExistSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'notexistvault' Assert-Throws {Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Force -Confirm:$false} } function Test_RemoveSecretInNoPermissionVault { $keyVault = Get-KeyVault $false $secretname= Get-SecretName 'nopermission' Assert-Throws {Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -Force -Confirm:$false} } function Test_BackupRestoreSecretByName { $keyVault = Get-KeyVault $name=Get-SecretName 'backuprestore' $secret=Set-AzKeyVaultSecret -VaultName $keyVault -Name $name -SecretValue $securedata Assert-NotNull $secret $global:createdSecrets += $name $backupblob = Backup-AzKeyVaultSecret -VaultName $keyVault -SecretName $name Remove-AzKeyVaultSecret -VaultName $keyVault -Name $name -Force -Confirm:$false $restoredSecret = Restore-AzKeyVaultSecret -VaultName $keyVault -InputFile $backupblob $retrievedSecret = Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $name Assert-AreEqual $retrievedSecret.SecretValueText $data } function Test_BackupRestoreSecretByRef { $keyVault = Get-KeyVault $name=Get-SecretName 'backuprestore' $secret=Set-AzKeyVaultSecret -VaultName $keyVault -Name $name -SecretValue $securedata Assert-NotNull $secret $global:createdSecrets += $name $backupblob = Backup-AzKeyVaultSecret -Secret $secret Remove-AzKeyVaultSecret -VaultName $keyVault -Name $name -Force -Confirm:$false $restoredSecret = Restore-AzKeyVaultSecret -VaultName $keyVault -InputFile $backupblob $retrievedSecret = Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $name Assert-AreEqual $retrievedSecret.SecretValueText $data } function Test_BackupNonExistingSecret { $keyVault = Get-KeyVault $name=Get-SecretName 'backupnonexisting' Assert-Throws { Backup-AzKeyVaultSecret -VaultName $keyVault -SecretName $name } } function Test_BackupSecretToANamedFile { $keyVault = Get-KeyVault $name=Get-SecretName 'backupnamedfile' $secret=Set-AzKeyVaultSecret -VaultName $keyVault -Name $name -SecretValue $securedata Assert-NotNull $secret $global:createdSecrets += $name $backupfile='.\backup' + ([GUID]::NewGuid()).GUID.ToString() + '.blob' Backup-AzKeyVaultSecret -VaultName $keyVault -SecretName $name -OutputFile $backupfile Remove-AzKeyVaultSecret -VaultName $keyVault -Name $name -Force -Confirm:$false $restoredSecret = Restore-AzKeyVaultSecret -VaultName $keyVault -InputFile $backupfile $retrievedSecret = Get-AzKeyVaultSecret -VaultName $keyVault -SecretName $name Assert-AreEqual $retrievedSecret.SecretValueText $data } function Test_BackupSecretToExistingFile { $keyVault = Get-KeyVault $name=Get-SecretName 'backupexistingfile' $secret=Set-AzKeyVaultSecret -VaultName $keyVault -Name $name -SecretValue $securedata Assert-NotNull $secret $global:createdSecrets += $name $backupfile='.\backup' + ([GUID]::NewGuid()).GUID.ToString() + '.blob' Backup-AzKeyVaultSecret -VaultName $keyVault -SecretName $name -OutputFile $backupfile Backup-AzKeyVaultSecret -VaultName $keyVault -SecretName $name -OutputFile $backupfile -Force -Confirm:$false } function Test_RestoreSecretFromNonExistingFile { $keyVault = Get-KeyVault Assert-Throws { Restore-AzKeyVaultSecret -VaultName $keyVault -InputFile c:\nonexisting.blob } } function Test_PipelineUpdateSecrets { $keyVault = Get-KeyVault $secretpartialname=Get-SecretName 'pipeupdate' $total=2 BulkCreateSecrets $keyVault $secretpartialname $total Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Set-AzKeyVaultSecret -SecretValue $newsecuredata Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | ForEach-Object { Assert-AreEqual $_.SecretValueText $newdata } } function Test_PipelineUpdateSecretAttributes { $keyVault = Get-KeyVault $secretpartialname=Get-SecretName 'pipeupdateattr' $total=2 BulkCreateSecrets $keyVault $secretpartialname $total Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Set-AzKeyVaultSecretAttribute -ContentType $newcontenttype Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | ForEach-Object { Assert-True { Equal-String $newcontenttype $_.ContentType }} Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Set-AzKeyVaultSecretAttribute -Tag $newtags Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | ForEach-Object { Assert-True { Equal-Hashtable $newtags $_.Tags }} } function Test_PipelineUpdateSecretVersions { $keyVault = Get-KeyVault $secretname=Get-SecretName 'pipeupdateversion' $total=2 BulkCreateSecretVersions $keyVault $secretname $total Get-AzKeyVaultSecret $keyVault $secretname -IncludeVersions | Set-AzKeyVaultSecretAttribute -Expires $newexpires Get-AzKeyVaultSecret $keyVault $secretname -IncludeVersions | ForEach-Object { Assert-True { Equal-DateTime $newexpires $_.Expires }} Get-AzKeyVaultSecret $keyVault $secretname -IncludeVersions | Set-AzKeyVaultSecretAttribute -Tag $newtags Get-AzKeyVaultSecret $keyVault $secretname -IncludeVersions | ForEach-Object { Assert-True { Equal-Hashtable $newtags $_.Tags }} } function Test_PipelineRemoveSecrets { $keyVault = Get-KeyVault $secretpartialname=Get-SecretName 'piperemove' $total=2 BulkCreateSecrets $keyVault $secretpartialname $total Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Remove-AzKeyVaultSecret -Force -Confirm:$false $secs = Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} Assert-AreEqual $secs.Count 0 } function Test_GetDeletedSecret { $keyVault = Get-KeyVault $secretname=Get-SecretName 'GetDeletedSecret' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname $sec | Remove-AzKeyVaultSecret -Force -Confirm:$false Wait-ForDeletedSecret $keyVault $secretname $deletedSecret = Get-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -InRemovedState Assert-NotNull $deletedSecret Assert-NotNull $deletedSecret.DeletedDate Assert-NotNull $deletedSecret.ScheduledPurgeDate } function Test_GetDeletedSecrets { $keyVault = Get-KeyVault $secretname=Get-SecretName 'GetDeletedSecrets' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname $sec | Remove-AzKeyVaultSecret -Force -Confirm:$false Wait-ForDeletedSecret $keyVault $secretname $deletedSecrets = Get-AzKeyVaultSecret -VaultName $keyVault -InRemovedState Assert-True {$deletedSecrets.Count -ge 1} Assert-True {$deletedSecrets.Name -contains $key.Name} } function Test_UndoRemoveSecret { $keyVault = Get-KeyVault $secretname=Get-SecretName 'UndoRemoveSecret' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname $sec | Remove-AzKeyVaultSecret -Force -Confirm:$false Wait-ForDeletedSecret $keyVault $secretname $recoveredSecret = Undo-AzKeyVaultSecretRemoval -VaultName $keyVault -Name $secretname Assert-NotNull $recoveredSecret Assert-AreEqual $recoveredSecret.Name $sec.Name Assert-AreEqual $recoveredSecret.Version $sec.Version } function Test_RemoveDeletedSecret { $keyVault = Get-KeyVault $secretname=Get-SecretName 'RemoveDeletedSecret' $sec=Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname $sec | Remove-AzKeyVaultSecret -Force -Confirm:$false Wait-ForDeletedSecret $keyVault $secretname Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -InRemovedState -Force -Confirm:$false } function Test_RemoveNonExistDeletedSecret { $keyVault = Get-KeyVault $secretname= Get-SecretName 'RemoveNonExistSecret' $sec= Set-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -SecretValue $securedata Assert-NotNull $sec $global:createdSecrets += $secretname Assert-Throws {Remove-AzKeyVaultSecret -VaultName $keyVault -Name $secretname -InRemovedState -Force -Confirm:$false} } function Test_PipelineRemoveDeletedSecrets { $keyVault = Get-KeyVault $secretpartialname=Get-SecretName 'piperemove' $total=2 BulkCreateSecrets $keyVault $secretpartialname $total Get-AzKeyVaultSecret $keyVault | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Remove-AzKeyVaultSecret -Force -Confirm:$false Wait-Seconds 30 Get-AzKeyVaultSecret $keyVault -InRemovedState | Where-Object {$_.SecretName -like $secretpartialname+'*'} | Remove-AzKeyVaultSecret -Force -Confirm:$false -InRemovedState $secs = Get-AzKeyVaultSecret $keyVault -InRemovedState | Where-Object {$_.SecretName -like $secretpartialname+'*'} Assert-AreEqual $secs.Count 0 }
combined_dataset/train/non-malicious/sample_16_85.ps1
sample_16_85.ps1
ConvertFrom-StringData @' IPAddressDisplayNameFormat=Endereço IP: {0} NetworkNameDisplayNameFormat=Nome: {0} NetworkNameOfflineDisplayNameFormat=Endereço IP: Endereço em "{0}" CreateClusterProgressValidationStart=Validando a adequação dos servidores para um cluster de failover. CreateClusterProgressValidationEnd=Concluída a validação da adequação dos servidores para um cluster de failover. CreateClusterProgressCreationStartFormat=Criando o cluster de failover "{0}". CreateClusterProgressCreationEndFormat=A criação do cluster de failover "{0}" foi concluída. AddNodesProgressValidationStart=Validando a adequação dos novos servidores para um cluster de failover. AddNodesProgressValidationEnd=Concluída a validação da adequação dos novos servidores para um cluster de failover. AddNodesProgressAdditionStartFormat=Adicionando nós ao cluster de failover "{0}". AddNodesProgressAdditionEndFormat=A adição de nós ao cluster de failover "{0}" foi concluída. '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCZNQpI35uLlJRf # i2HW+1DtXk4MlHkbnDjlqHmnCe33haCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHPd # dS8nuFodJ5sGXV53fez15kaaVMAtKSCBMSnxpA4DMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAbE5d4toqUbvMn+Rhd2968rAFSe5mZrEbERT/ # L1HLqkuHgeCn5AiDjsdIlHCvC+r9317fkVCAbd2vQpaPIxEr/ef8dFiF7Cmif0Op # lDWGsHUzdLA39HbHJFyzaA7n5nVHqthKgCBRNr+LQnUTkD/0fDtCqlCkcLyDb92K # DnZSxtNauP3n5QXIA4aNaTZs6M06eDxOsm/VQG0+dRLsf5UVaFLCADLOdNnsBjiv # CucbB2EunhQhYsHJ/hl1mFk+VQKfdbAJarsj3oafUgiRnI8eFyQL7D34N9b7X67Q # WXMdCSaK/uDeMx3d/KQjWLb11wQtWiEaEmP9t9k+mfvuCCFso6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDt7oqQ0k8+gnnxXs7+pnb+z0ANEDuRPQV/ # xOZOFizudgIGZc3/ed6fGBMyMDI0MDIyMDA3MjE0OS45MTVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X5sAjAi # GA8yMDI0MDIyMDAwMDgzNFoYDzIwMjQwMjIxMDAwODM0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpfmwCAgEAMAcCAQACAh4kMAcCAQACAhOuMAoCBQDpf72CAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEjBdhxc2Dy1IiI/abmk2E8Is2Yg # KjvpKrgHVxrmR6uToVLP+UTfGUj2Wdk6mOU9tYSo2+fynkECZN0DoKjTEGh4Crnk # ehLBVuWNgWLsCZc4U+fPnNmgZ2qAoDCCXREnJR9JIJm5UtNXteuMozC7q8xxg/do # s4gse4eoUCHByHFAsQF2yQH4lw0AL5Ue8QK/wBmQWo0hdzZhEo/AGIWBJd5X4190 # yduqpmJpj4buYrRtrFQzbAVLlTIHmz8KofO3bdLsozBU9WK9+/+8a1AXn1SyEt5h # LUX4UrzcmTMmM9UIFyLGwG1hDOrZI6UOtwP+SPLuYv5fTIvLKjn62cj88bgxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCApiBW01F5vdeb4NRN465e425SK # trRepnqppitHUiJTDDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg5strNsYb # AJScKAE5aG3Lom5LvoS5tFxoBQ4e8fINHe0wDQYJKoZIhvcNAQELBQAEggIAq1CS # KDdDZNRI7VTba7lFGJkITzlCRxpD5vdf+qyvtiRrAEIgIgtkyAdy6i3cr9pOsj// # 8YePvg/K+E+oBDvBjkf5H06tHMmoyMQjbAjxVIqz0qAcA/JwF5trgLE7NTWyGNjo # 9VhguLj7pT1jEszfd2NjaBDLL1JS+YzbiutZFm3zUbBhvhQ6PzAvHyr1ZYdU8P2J # dSF8we2tXqOT5hIg7gWW4a27X+9aaHG1SzlszK4aoGiQ+QWwHtWvJ1oNQ4n1w7rA # MEKFZ0VAvRCqSpwHK+bePjbsGk02kL4P4ZafJzIOEzJaczPuXnVR78vvtedc7Jcg # tm6PRwFD5FNGrAQzuXGbI8CkgD7GXNFHiW0Zt+AemNJcE7KZVPk2dmyntNrlNSW2 # 3GgBFuU2eTgLxFINqz/0EMJzAriTJfW59YPkxeGIBXgikIhw3VHSDR4ydx3hgrYx # X4UPMFNp9nTvfSC5CAcbNSJ8ri2/cDPFRhzZGQgr5BbocMFV5loOwHmxFfSkqKUg # /N2igw4zwtLfM6YaPzgrdcjTOionMIKK3HiaBEOPGoILeeUsLTa/G538kVfqW98m # E+IyuD+lFo8BG+wFcnwP8g9wMztrsXFlVQunezibSFFTsMLDUH7DvVAsJ+hQ0Fgd # seI8ywxaiFbE19fP0fSU787rTA3v8j5+Arrmeg8= # SIG # End signature block
combined_dataset/train/non-malicious/Get-MWSOrder_1.ps1
Get-MWSOrder_1.ps1
// -------------------------------------------------------------------------------------------------------------------- // <copyright file="GetOrderCmdlet.cs" company="Huddled Masses"> // Copyright (c) 2011 Joel Bennett // </copyright> // <summary> // Defines the Get-Order Cmdlet for Amazon Marketplace Orders WebService. // </summary> // -------------------------------------------------------------------------------------------------------------------- namespace PoshOrders { using System; using System.Management.Automation; // I'm using Amazon's MarketplaceWebServiceOrders Apache-licensed web-service access code. using MarketplaceWebServiceOrders; using MarketplaceWebServiceOrders.Model; /// <summary> /// Get Amazon Marketplace Orders from the WebService /// </summary> [Cmdlet(VerbsCommon.Get, "Order")] public class GetOrderCmdlet : Cmdlet { // Access Key ID and Secret Access Key ID for the Amazon MWS /// <summary>The Amazon Access Key ID</summary> private const string AccessKeyId = "INSERT YOUR MWS ACCESS KEY HERE"; /// <summary>The Amazon Secret Key</summary> private const string SecretAccessKey = "INSERT YOUR MWS SECRET ACCESS KEY HERE"; /// <summary>The Application Name is sent to MWS as part of the HTTP User-Agent header</summary> private const string ApplicationName = "INSERT YOUR APPLICATION NAME HERE"; /// <summary>The Application Version is sent to MWS as part of the HTTP User-Agent header</summary> private const string ApplicationVersion = "1.0"; /// <summary>Default value for the service URL is for the USA</summary> private string serviceUrl = "https://mws.amazonservices.com/Orders/2011-01-01"; /// <summary>The web service client</summary> private MarketplaceWebServiceOrdersClient marketplaceWebServiceOrdersClient; /// <summary>Default value for "Created After" is 1 day ago.</summary> private DateTime createdAfter = DateTime.MinValue; /// <summary>Default value for "Created Before" is infinitely in the future</summary> private DateTime createdBefore = DateTime.MaxValue; /// <summary>The Default order status is Unshipped or PartiallyShipped</summary> private OrderStatusEnum[] orderStatus = new[] { OrderStatusEnum.Unshipped, OrderStatusEnum.PartiallyShipped }; /// <summary> /// Gets or sets the merchant id. /// </summary> /// <value> /// The merchant id. /// </value> [Parameter(Mandatory = true, Position = 0, ValueFromPipelineByPropertyName = true)] public string MerchantId { get; set; } /// <summary> /// Gets or sets the marketplace id. /// </summary> /// <value> /// The marketplace id. /// </value> [Parameter(Mandatory = true, ValueFromPipelineByPropertyName = true)] public string[] Marketplace { get; set; } /// <summary> /// Gets or sets the service URL. /// Defaults to the USA service URL. /// </summary> /// <value> /// The service URL. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public string ServiceUrl { get { return this.serviceUrl; } set { this.serviceUrl = value; } } /// <summary> /// Gets or sets a date orders must prescede. /// </summary> /// <value> /// The date. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public DateTime CreatedBefore { get { return this.createdBefore; } set { this.createdBefore = value; } } /// <summary> /// Gets or sets a date the orders must come aftercreated after. /// </summary> /// <value> /// The created after. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public DateTime CreatedAfter { get { return this.createdAfter; } set { this.createdAfter = value; } } /// <summary> /// Gets or sets the order status. /// </summary> /// <value> /// The order status. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public OrderStatusEnum[] OrderStatus { get { return orderStatus; } set { orderStatus = value; } } /// <summary> /// Gets or sets the buyer email. /// </summary> /// <value> /// The buyer email. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public string BuyerEmail { get; set; } /// <summary> /// Gets or sets the seller order id. /// </summary> /// <value> /// The seller order id. /// </value> [Parameter(Mandatory = false, ValueFromPipelineByPropertyName = true)] public string SellerOrderId { get; set; } /// <summary> /// Gets or sets whether to include the Order Items /// </summary> /// <value> /// True to included the Order Items /// </value> [Parameter(Mandatory = false)] public SwitchParameter IncludeItems { get; set; } /// <summary> /// Implement the Begin step for PowerShell Cmdlets /// </summary> protected override void BeginProcessing() { base.BeginProcessing(); var config = new MarketplaceWebServiceOrdersConfig { ServiceURL = "https://mws.amazonservices.com/Orders/2011-01-01" }; this.marketplaceWebServiceOrdersClient = new MarketplaceWebServiceOrdersClient( ApplicationName, ApplicationVersion, AccessKeyId, SecretAccessKey, config); } /// <summary> /// Implement the Process step for PowerShell Cmdlets /// </summary> protected override void ProcessRecord() { base.ProcessRecord(); /* // If no dates are specificied, start a day ago ... if (CreatedBefore == DateTime.MaxValue && CreatedAfter == DateTime.MinValue) { CreatedAfter = DateTime.UtcNow.AddDays(-1); } */ // Amazon's policy doesn't allow calling with a CreatedBefore after two minutes before the request time if (CreatedBefore == DateTime.MaxValue) { CreatedBefore = DateTime.Now.AddMinutes(-2); } var orderRequest = new ListOrdersRequest { MarketplaceId = new MarketplaceIdList(), OrderStatus = new OrderStatusList(), BuyerEmail = this.BuyerEmail, SellerId = this.MerchantId, SellerOrderId = this.SellerOrderId, CreatedAfter = this.CreatedAfter, CreatedBefore = this.CreatedBefore }; orderRequest.OrderStatus.Status.AddRange(OrderStatus); orderRequest.MarketplaceId.Id.AddRange(Marketplace); var response = marketplaceWebServiceOrdersClient.ListOrders(orderRequest); foreach (var order in response.ListOrdersResult.Orders.Order) { var output = new PSObject(order); if (IncludeItems.ToBool()) { var itemRequest = new ListOrderItemsRequest { AmazonOrderId = order.AmazonOrderId, SellerId = this.MerchantId, }; var items = marketplaceWebServiceOrdersClient.ListOrderItems(itemRequest); output.Properties.Add(new PSNoteProperty("Items", items.ListOrderItemsResult.OrderItems.OrderItem)); } WriteObject(output); } } } }
combined_dataset/train/non-malicious/Set-Keydelay.ps1
Set-Keydelay.ps1
Begin { $key = "keyboard.typematicMinDelay" $value = "2000000" } Process { #Make Sure it's a VM if ( $_ -isnot [VMware.VimAutomation.Client20.VirtualMachineImpl] ) { continue } #Setup our Object $vm = Get-View $_.Id $vmConfigSpec = New-Object VMware.Vim.VirtualMachineConfigSpec $vmConfigSpec.extraconfig += New-Object VMware.Vim.optionvalue $vmConfigSpec.extraconfig[0].Key=$key $vmConfigSpec.extraconfig[0].Value=$value #Run the change $vm.ReconfigVM($vmConfigSpec) }
combined_dataset/train/non-malicious/1858.ps1
1858.ps1
$powershell = Join-Path -Path $PsHome -ChildPath "pwsh" function Wait-JobPid { param ( $Job ) $startTime = [DateTime]::Now $TimeoutInMilliseconds = 10000 do { Start-Sleep -Seconds 1 $pwshId = Receive-Job $Job if (([DateTime]::Now - $startTime).TotalMilliseconds -gt $timeoutInMilliseconds) { throw "Unable to receive PowerShell process id." } } while (!$pwshId) $pwshId } function Invoke-PSHostProcessScript { param ( [string] $ArgumentString, [int] $Id, [int] $Retry = 5 ) $sb = { $commandStr = @' Start-Sleep -Seconds {0} Enter-PSHostProcess {1} -ErrorAction Stop $pid Exit-PSHostProcess '@ -f $i, $ArgumentString ($commandStr | & $powershell -c -) -eq $Id } $result = $false $failures = 0 foreach ($i in 1..$Retry) { if ($sb.Invoke()) { $result = $true break } $failures++ } if($failures) { Write-Warning "Enter-PSHostProcess script failed $i out of $Retry times." } $result } Describe "Enter-PSHostProcess tests" -Tag Feature { Context "By Process Id" { BeforeEach { $pwshJob = Start-Job { $pid while ($true) { Start-Sleep -Seconds 30 | Out-Null } } $pwshId = Wait-JobPid $pwshJob } AfterEach { $pwshJob | Stop-Job -PassThru | Remove-Job } It "Can enter, exit, and re-enter another PSHost" { Wait-UntilTrue { [bool](Get-PSHostProcessInfo -Id $pwshId) } | Should -BeTrue Invoke-PSHostProcessScript -ArgumentString "-Id $pwshId" -Id $pwshId | Should -BeTrue -Because "The script was able to enter another process and grab the pid of '$pwshId'." Invoke-PSHostProcessScript -ArgumentString "-Id $pwshId" -Id $pwshId | Should -BeTrue -Because "The script was able to re-enter another process and grab the pid of '$pwshId'." } It "Can enter, exit, and re-enter another Windows PowerShell PSHost" -Skip:(!$IsWindows) { $powershellJob = Start-Job -PSVersion 5.1 { $pid while ($true) { Start-Sleep -Seconds 30 | Out-Null } } $powershellId = Wait-JobPid $powershellJob try { Wait-UntilTrue { [bool](Get-PSHostProcessInfo -Id $powershellId) } | Should -BeTrue Invoke-PSHostProcessScript -ArgumentString "-Id $powershellId" -Id $powershellId | Should -BeTrue -Because "The script was able to enter another process and grab the pid of '$powershellId'." Invoke-PSHostProcessScript -ArgumentString "-Id $powershellId" -Id $powershellId | Should -BeTrue -Because "The script was able to re-enter another process and grab the pid of '$powershellId'." } finally { $powershellJob | Stop-Job -PassThru | Remove-Job } } It "Can enter using NamedPipeConnectionInfo" { try { Wait-UntilTrue { [bool](Get-PSHostProcessInfo -Id $pwshId) } | Should -BeTrue $npInfo = [System.Management.Automation.Runspaces.NamedPipeConnectionInfo]::new($pwshId) $rs = [runspacefactory]::CreateRunspace($npInfo) $rs.Open() $ps = [powershell]::Create() $ps.Runspace = $rs $ps.AddScript('$pid').Invoke() | Should -Be $pwshId } finally { $rs.Dispose() $ps.Dispose() } } } Context "By CustomPipeName" { It "Can enter, exit, and re-enter using CustomPipeName" { $pipeName = [System.IO.Path]::GetRandomFileName() $pipePath = Get-PipePath -PipeName $pipeName $pwshJob = Start-Job -ArgumentList $pipeName { [System.Management.Automation.Remoting.RemoteSessionNamedPipeServer]::CreateCustomNamedPipeServer($args[0]) $pid while ($true) { Start-Sleep -Seconds 30 | Out-Null } } $pwshId = Wait-JobPid $pwshJob try { Wait-UntilTrue { Test-Path $pipePath } | Should -BeTrue Invoke-PSHostProcessScript -ArgumentString "-CustomPipeName $pipeName" -Id $pwshId | Should -BeTrue -Because "The script was able to enter another process and grab the pipe of '$pipeName'." Invoke-PSHostProcessScript -ArgumentString "-CustomPipeName $pipeName" -Id $pwshId | Should -BeTrue -Because "The script was able to re-enter another process and grab the pipe of '$pipeName'." } finally { $pwshJob | Stop-Job -PassThru | Remove-Job } } It "Should throw if CustomPipeName does not exist" { { Enter-PSHostProcess -CustomPipeName badpipename } | Should -Throw -ExpectedMessage "No named pipe was found with CustomPipeName: badpipename." } } }
combined_dataset/train/non-malicious/LibraryChart_3.ps1
LibraryChart_3.ps1
# --------------------------------------------------------------------------- ### <Script> ### <Author> ### Chad Miller ### </Author> ### <Description> ### Defines functions for wokring with Microsoft Chart Control for .NET 3.5 Framework ### Pipe output of Powershell command to Out-Chart function and specify chart type ### Chart will display in form or save to image file ### Real-time charts are supported by passing in a script block ### My thanks to Richard MacDonald for his wonderful post on Charting with PowerShell ### http://blogs.technet.com/richard_macdonald/archive/2009/04/28/3231887.aspx ### Note: Requires NET Framework 3.5 and Microsoft Chart Controls for Microsoft .NET Framework 3.5 ### </Description> ### <Usage> ### . ./LibraryChart.ps1 ### -------------------------- EXAMPLE 1 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' ### ### This command will produce a default column chart ### ### -------------------------- EXAMPLE 2 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -filename 'c:\\users\\u00\\documents\\process.png' ### This command will output the chart to a file ### ### -------------------------- EXAMPLE 3 -------------------------- ### Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 5 | out-chart -xField 'name' -yField 'WS' -chartType 'Pie' ### ### This command will produce a pie chart ### ### -------------------------- EXAMPLE 4 -------------------------- ### out-chart -xField 'name' -yField 'WS' -scriptBlock {Get-Process | Sort-Object -Property WS | Select-Object Name,WS -Last 1} -chartType 'line' ### ### This command will produce a real-time line chart ### ### </Usage> ### </Script> # -------------------------------------------------------------------------- [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") [void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms.DataVisualization") ####################### function New-Chart { param ([int]$width,[int]$height,[int]$left,[int]$top,$chartTitle) # create chart object $global:Chart = New-object System.Windows.Forms.DataVisualization.Charting.Chart $global:Chart.Width = $width $global:Chart.Height = $height $global:Chart.Left = $left $global:Chart.Top = $top # create a chartarea to draw on and add to chart $chartArea = New-Object System.Windows.Forms.DataVisualization.Charting.ChartArea $global:chart.ChartAreas.Add($chartArea) [void]$global:Chart.Titles.Add($chartTitle) # change chart area colour $global:Chart.BackColor = [System.Drawing.Color]::Transparent } #New-Chart ####################### function New-BarColumnChart { param ([hashtable]$ht, $chartType='Column', $chartTitle,$xTitle,$yTitle, [int]$width,[int]$height,[int]$left,[int]$top,[bool]$asc) @@ New-Chart -width $width -height $height -left $left -top $top -chartTitle $chartTitle $chart.ChartAreas[0].AxisX.Title = $xTitle $chart.ChartAreas[0].AxisY.Title = $yTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::$chartType if ($asc) { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Ascending, "Y") } else { $global:Chart.Series["Data"].Sort([System.Windows.Forms.DataVisualization.Charting.PointSortOrder]::Descending, "Y") } $global:Chart.Series["Data"]["DrawingStyle"] = "Cylinder" $global:chart.Series["Data"].IsValueShownAsLabel = $true $global:chart.Series["Data"]["LabelStyle"] = "Top" } #New-BarColumnChart ####################### function New-LineChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) @@ New-Chart -width $width -height $height -left $left -top $top -chartTitle $chartTitle [void]$global:Chart.Series.Add("Data") # $global:Chart.Series["Data"].Points.AddXY($(get-date), $($ht.Values)) $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys,$ht.Values) #$global:Chart.Series["Data"].XValueType = [System.Windows.Forms.DataVisualization.Charting.ChartValueType]::Time #$global:Chart.chartAreas[0].AxisX.LabelStyle.Format = "hh:mm:ss" #$global:Chart.chartAreas[0].AxisX.LabelStyle.Interval = 1 #$global:Chart.chartAreas[0].AxisX.LabelStyle.IntervalType = [System.Windows.Forms.DataVisualization.Charting.DateTimeIntervalType]::Seconds $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Line #$global:chart.Series["Data"].IsValueShownAsLabel = $false } #New-LineChart ####################### function New-PieChart { param ([hashtable]$ht,$chartTitle, [int]$width,[int]$height,[int]$left,[int]$top) @@ New-Chart -width $width -height $height -left $left -top $top -chartTitle $chartTitle [void]$global:Chart.Series.Add("Data") $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) $global:Chart.Series["Data"].ChartType = [System.Windows.Forms.DataVisualization.Charting.SeriesChartType]::Pie $global:Chart.Series["Data"]["PieLabelStyle"] = "Outside" $global:Chart.Series["Data"]["PieLineColor"] = "Black" #$global:chart.Series["Data"].IsValueShownAsLabel = $true #$global:chart.series["Data"].Label = "#PERCENT{P1}" #$legend = New-object System.Windows.Forms.DataVisualization.Charting.Legend #$global:Chart.Legends.Add($legend) #$Legend.Name = "Default" } #New-PieChart ####################### function Remove-Points { param($name='Data',[int]$maxPoints=200) while ( $global:chart.Series["$name"].Points.Count > $maxPoints ) { $global:chart.Series["$name"].Points.RemoveAT(0) } } #Add-Series ####################### function Out-Form { param($interval,$scriptBlock,$xField,$yField) # display the chart on a form $global:Chart.Anchor = [System.Windows.Forms.AnchorStyles]::Bottom -bor [System.Windows.Forms.AnchorStyles]::Right -bor [System.Windows.Forms.AnchorStyles]::Top -bor [System.Windows.Forms.AnchorStyles]::Left $Form = New-Object Windows.Forms.Form $Form.Text = 'PowerCharts' $Form.Width = 600 $Form.Height = 600 $Form.controls.add($global:Chart) if ($scriptBlock -is [ScriptBlock]) { if (!($xField -or $yField)) { throw 'xField and yField required with scriptBlock parameter.' } $timer = New-Object System.Windows.Forms.Timer $timer.Interval = $interval $timer.add_Tick({ $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField if ($global:Chart.Series["Data"].ChartTypeName -eq 'Line') { Remove-Points $ht | foreach { $global:Chart.Series["Data"].Points.AddXY($($_.Keys), $($_.Values)) } } else { $global:Chart.Series["Data"].Points.DataBindXY($ht.Keys, $ht.Values) } $global:chart.ResetAutoValues() $global:chart.Invalidate() }) $timer.Enabled = $true $timer.Start() } $Form.Add_Shown({$Form.Activate()}) $Form.ShowDialog() } #Out-Form ####################### function Out-ImageFile { param($fileName,$fileformat) $global:Chart.SaveImage($fileName,$fileformat) } ####################### ### ConvertTo-Hashtable function based on code by Jeffery Snover ### http://blogs.msdn.com/powershell/archive/2008/11/23/poshboard-and-convertto-hashtable.aspx ####################### function ConvertTo-Hashtable { param([string]$key, $value) Begin { $hash = @{} } Process { $thisKey = $_.$Key $hash.$thisKey = $_.$Value } End { Write-Output $hash } } #ConvertTo-Hashtable ####################### function Out-Chart { param( $xField=$(throw 'Out-Chart:xField is required'), $yField=$(throw 'Out-Chart:yField is required'), $chartType='Column',$chartTitle, [int]$width=500, [int]$height=400, [int]$left=40, [int]$top=30, $filename, $fileformat='png', [int]$interval=1000, $scriptBlock, [switch]$asc ) Begin { $ht = @{} } Process { if ($_) { $thisKey = $_.$xField $ht.$thisKey = $_.$yField } } End { if ($scriptBlock) { $ht = &$scriptBlock | ConvertTo-HashTable $xField $yField } switch ($chartType) { 'Bar' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Column' {New-BarColumnChart -ht $ht -chartType $chartType -chartTitle $chartTitle -width $width -height $height -left $left -top $top -asc $($asc.IsPresent)} 'Pie' {New-PieChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } 'Line' {New-LineChart -chartType -ht $ht -chartTitle $chartTitle -width $width -height $height -left $left -top $top } } if ($filename) { Out-ImageFile $filename $fileformat } elseif ($scriptBlock ) { Out-Form $interval $scriptBlock $xField $yField } else { Out-Form } } } #Out-Chart
combined_dataset/train/non-malicious/sample_26_56.ps1
sample_26_56.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD5K2gZTLsu2PRp # shNrRiUE+ZVwgjMmKjg2hCyLOxkSHKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPRhDES0JvjkdEQU/Z+WxyVQ # C10nsNYMkCbNNi7KG09pMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsroLi5DQs/r7gBviDJd7QOn7qKB2tipziMbtSL8i6bz3lAuVwMWPt93d # dnPPFjRO8XX11Ay9n2qUB9rvN2DRrMujdzeyLe+q/esGYL4iebCQp3ViaCevebNB # kEm9Ab/HONoL8CrImgkhlgIp27ZDBUMDVcrxP1dKjLkwYK8IvFNSrHcp22RXAr66 # d3wxxomJqCMbBJxUlmzkvB1SPTfLiuzguOUw0cB7nb7+iZpFZyZMTNMVenVwejcu # HyvJhB5EXtxxotwdZtYJGZOF1KE02y8Sllxh3UE+w2CxIsNye56lR8ZZ34DzFKjL # 0i58n63XNeFdsWN0BZLdb8Kb9q1tsaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDCU1SWc5uFVH9nIq/+QGr5lLHCU8l36zoxsXhRogHZKgIGZYMWUfsm # GBMyMDI0MDExMDE5NDUxNC45MjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlJQxgwIhgPMjAyNDAxMTEwMDIzNTJaGA8yMDI0MDExMjAwMjM1MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6UlDGAIBADAHAgEAAgITxjAHAgEAAgIRVTAKAgUA # 6UqUmAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAA1htxHLW72fIf1ls0+U # iI43SU1SMbxVBRH4VNG1oIOyfa9wjuKlxCTEteA+Z4/Cwkb+DbdEnBPOXpcExE4F # 6n07uxFN1ZxtAoyALb/yfCRmMlrPS6e7CCrMHc4hMv25fgW7CUrawQZVmMRt61Bh # tYUUs7DXvfWdPgwING098yqGMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgwyMorC5TrSNKBygwQYV7uFNp0SRulq5gP6pJhGtjb/4wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIIc6v0sHH8f1kgkxIb+6VlqQaqqY4Dsv710Me8HF9nkg # MA0GCSqGSIb3DQEBCwUABIICADbmfJe0xW45hnU5XwGhsFUFyTBn/GjKwHfFR9mB # RUJnBamBKh1zvV+ZDXZXgKcYmca8+aq0vXzGStWLEQx+jdIDjL3JK2EVWzOAeUMG # sdfOWVMVBR2MfG8AqPb9IPntBNgF11hrSzjr3+CJNXknLlfWLCKqOyIrWQ9TuLDG # cd7n7DQgWOjs2jLy5Q7a2bcvui4e+2Fo8Uvb2uYyqtuys7OOsML1HiD/LRJSvWKA # NGNhavLAfQeUvMSfVQKnT70IA+V3ooEEUH/XCNchwIxNPxA3LJ2T13jAY+GgDNZM # EK77SxTECKuRzaE2q3h0bBJOwL2FvaaynFLKwwtoETAdU59kglkcM6TTDmRlh1Gd # cVb4hHKpMg50Fz+jS6qBJEGgycAtPEqXYgXzyC6X5XjcyjRgMr8Tn7ZBp5mP/rlh # z4PSSeOe1PrtQD7Co4XYv8MouLJoUTcI6qKixmsaTpU58NyUIYKE0K1JaFIDz6RR # B7r2V9WVW0CXiPO+x7Q1A2yBc2LjD0oVWcGzCT622qrdRvpVpYLyDDlNJsTgJXeS # PIhF8ZmBRjcrQ2plO2tUCZz/nNwDlaJZTVfG6sRuK+/UB6XsBJDVUBy2ayU2OWhr # hXb42D91zPpxeNz0mKPp+kBEKZCuSwYh0ZVHFoN0NZhV8QjQFfj1Avb+WgYq6STF # dwaJ # SIG # End signature block
combined_dataset/train/non-malicious/sample_53_34.ps1
sample_53_34.ps1
# Copyright (c) 2019 Ansible Project # Simplified BSD License (see licenses/simplified_bsd.txt or https://opensource.org/licenses/BSD-2-Clause) Function Get-AnsibleWebRequest { <# .SYNOPSIS Creates a System.Net.WebRequest object based on common URL module options in Ansible. .DESCRIPTION Will create a WebRequest based on common input options within Ansible. This can be used manually or with Invoke-WithWebRequest. .PARAMETER Uri The URI to create the web request for. .PARAMETER Method The protocol method to use, if omitted, will use the default value for the URI protocol specified. .PARAMETER FollowRedirects Whether to follow redirect reponses. This is only valid when using a HTTP URI. all - Will follow all redirects none - Will follow no redirects safe - Will only follow redirects when GET or HEAD is used as the Method .PARAMETER Headers A hashtable or dictionary of header values to set on the request. This is only valid for a HTTP URI. .PARAMETER HttpAgent A string to set for the 'User-Agent' header. This is only valid for a HTTP URI. .PARAMETER MaximumRedirection The maximum number of redirections that will be followed. This is only valid for a HTTP URI. .PARAMETER Timeout The timeout in seconds that defines how long to wait until the request times out. .PARAMETER ValidateCerts Whether to validate SSL certificates, default to True. .PARAMETER ClientCert The path to PFX file to use for X509 authentication. This is only valid for a HTTP URI. This path can either be a filesystem path (C:\folder\cert.pfx) or a PSPath to a credential (Cert:\CurrentUser\My\<thumbprint>). .PARAMETER ClientCertPassword The password for the PFX certificate if required. This is only valid for a HTTP URI. .PARAMETER ForceBasicAuth Whether to set the Basic auth header on the first request instead of when required. This is only valid for a HTTP URI. .PARAMETER UrlUsername The username to use for authenticating with the target. .PARAMETER UrlPassword The password to use for authenticating with the target. .PARAMETER UseDefaultCredential Whether to use the current user's credentials if available. This will only work when using Become, using SSH with password auth, or WinRM with CredSSP or Kerberos with credential delegation. .PARAMETER UseProxy Whether to use the default proxy defined in IE (WinINet) for the user or set no proxy at all. This should not be set to True when ProxyUrl is also defined. .PARAMETER ProxyUrl An explicit proxy server to use for the request instead of relying on the default proxy in IE. This is only valid for a HTTP URI. .PARAMETER ProxyUsername An optional username to use for proxy authentication. .PARAMETER ProxyPassword The password for ProxyUsername. .PARAMETER ProxyUseDefaultCredential Whether to use the current user's credentials for proxy authentication if available. This will only work when using Become, using SSH with password auth, or WinRM with CredSSP or Kerberos with credential delegation. .PARAMETER Module The AnsibleBasic module that can be used as a backup parameter source or a way to return warnings back to the Ansible controller. .EXAMPLE $spec = @{ options = @{} } $module = Ansible.Basic.AnsibleModule]::Create($args, $spec, @(Get-AnsibleWebRequestSpec)) $web_request = Get-AnsibleWebRequest -Module $module #> [CmdletBinding()] [OutputType([System.Net.WebRequest])] Param ( [Alias("url")] [System.Uri] $Uri, [System.String] $Method, [Alias("follow_redirects")] [ValidateSet("all", "none", "safe")] [System.String] $FollowRedirects = "safe", [System.Collections.IDictionary] $Headers, [Alias("http_agent")] [System.String] $HttpAgent = "ansible-httpget", [Alias("maximum_redirection")] [System.Int32] $MaximumRedirection = 50, [System.Int32] $Timeout = 30, [Alias("validate_certs")] [System.Boolean] $ValidateCerts = $true, # Credential params [Alias("client_cert")] [System.String] $ClientCert, [Alias("client_cert_password")] [System.String] $ClientCertPassword, [Alias("force_basic_auth")] [Switch] $ForceBasicAuth, [Alias("url_username")] [System.String] $UrlUsername, [Alias("url_password")] [System.String] $UrlPassword, [Alias("use_default_credential")] [Switch] $UseDefaultCredential, # Proxy params [Alias("use_proxy")] [System.Boolean] $UseProxy = $true, [Alias("proxy_url")] [System.String] $ProxyUrl, [Alias("proxy_username")] [System.String] $ProxyUsername, [Alias("proxy_password")] [System.String] $ProxyPassword, [Alias("proxy_use_default_credential")] [Switch] $ProxyUseDefaultCredential, [ValidateScript({ $_.GetType().FullName -eq 'Ansible.Basic.AnsibleModule' })] [System.Object] $Module ) # Set module options for parameters unless they were explicitly passed in. if ($Module) { foreach ($param in $PSCmdlet.MyInvocation.MyCommand.Parameters.GetEnumerator()) { if ($PSBoundParameters.ContainsKey($param.Key)) { # Was set explicitly we want to use that value continue } foreach ($alias in @($Param.Key) + $param.Value.Aliases) { if ($Module.Params.ContainsKey($alias)) { $var_value = $Module.Params.$alias -as $param.Value.ParameterType Set-Variable -Name $param.Key -Value $var_value break } } } } # Disable certificate validation if requested # FUTURE: set this on ServerCertificateValidationCallback of the HttpWebRequest once .NET 4.5 is the minimum if (-not $ValidateCerts) { [System.Net.ServicePointManager]::ServerCertificateValidationCallback = { $true } } # Enable TLS1.1/TLS1.2 if they're available but disabled (eg. .NET 4.5) $security_protocols = [System.Net.ServicePointManager]::SecurityProtocol -bor [System.Net.SecurityProtocolType]::SystemDefault if ([System.Net.SecurityProtocolType].GetMember("Tls11").Count -gt 0) { $security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls11 } if ([System.Net.SecurityProtocolType].GetMember("Tls12").Count -gt 0) { $security_protocols = $security_protocols -bor [System.Net.SecurityProtocolType]::Tls12 } [System.Net.ServicePointManager]::SecurityProtocol = $security_protocols $web_request = [System.Net.WebRequest]::Create($Uri) if ($Method) { $web_request.Method = $Method } $web_request.Timeout = $Timeout * 1000 if ($UseDefaultCredential -and $web_request -is [System.Net.HttpWebRequest]) { $web_request.UseDefaultCredentials = $true } elseif ($UrlUsername) { if ($ForceBasicAuth) { $auth_value = [System.Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes(("{0}:{1}" -f $UrlUsername, $UrlPassword))) $web_request.Headers.Add("Authorization", "Basic $auth_value") } else { $credential = New-Object -TypeName System.Net.NetworkCredential -ArgumentList $UrlUsername, $UrlPassword $web_request.Credentials = $credential } } if ($ClientCert) { # Expecting either a filepath or PSPath (Cert:\CurrentUser\My\<thumbprint>) $cert = Get-Item -LiteralPath $ClientCert -ErrorAction SilentlyContinue if ($null -eq $cert) { Write-Error -Message "Client certificate '$ClientCert' does not exist" -Category ObjectNotFound return } $crypto_ns = 'System.Security.Cryptography.X509Certificates' if ($cert.PSProvider.Name -ne 'Certificate') { try { $cert = New-Object -TypeName "$crypto_ns.X509Certificate2" -ArgumentList @( $ClientCert, $ClientCertPassword ) } catch [System.Security.Cryptography.CryptographicException] { Write-Error -Message "Failed to read client certificate at '$ClientCert'" -Exception $_.Exception -Category SecurityError return } } $web_request.ClientCertificates = New-Object -TypeName "$crypto_ns.X509Certificate2Collection" -ArgumentList @( $cert ) } if (-not $UseProxy) { $proxy = $null } elseif ($ProxyUrl) { $proxy = New-Object -TypeName System.Net.WebProxy -ArgumentList $ProxyUrl, $true } else { $proxy = $web_request.Proxy } # $web_request.Proxy may return $null for a FTP web request. We only set the credentials if we have an actual # proxy to work with, otherwise just ignore the credentials property. if ($null -ne $proxy) { if ($ProxyUseDefaultCredential) { # Weird hack, $web_request.Proxy returns an IWebProxy object which only guarantees the Credentials # property. We cannot set UseDefaultCredentials so we just set the Credentials to the # DefaultCredentials in the CredentialCache which does the same thing. $proxy.Credentials = [System.Net.CredentialCache]::DefaultCredentials } elseif ($ProxyUsername) { $proxy.Credentials = New-Object -TypeName System.Net.NetworkCredential -ArgumentList @( $ProxyUsername, $ProxyPassword ) } else { $proxy.Credentials = $null } } $web_request.Proxy = $proxy # Some parameters only apply when dealing with a HttpWebRequest if ($web_request -is [System.Net.HttpWebRequest]) { if ($Headers) { foreach ($header in $Headers.GetEnumerator()) { switch ($header.Key) { Accept { $web_request.Accept = $header.Value } Connection { $web_request.Connection = $header.Value } Content-Length { $web_request.ContentLength = $header.Value } Content-Type { $web_request.ContentType = $header.Value } Expect { $web_request.Expect = $header.Value } Date { $web_request.Date = $header.Value } Host { $web_request.Host = $header.Value } If-Modified-Since { $web_request.IfModifiedSince = $header.Value } Range { $web_request.AddRange($header.Value) } Referer { $web_request.Referer = $header.Value } Transfer-Encoding { $web_request.SendChunked = $true $web_request.TransferEncoding = $header.Value } User-Agent { continue } default { $web_request.Headers.Add($header.Key, $header.Value) } } } } # For backwards compatibility we need to support setting the User-Agent if the header was set in the task. # We just need to make sure that if an explicit http_agent module was set then that takes priority. if ($Headers -and $Headers.ContainsKey("User-Agent")) { if ($HttpAgent -eq $ansible_web_request_options.http_agent.default) { $HttpAgent = $Headers['User-Agent'] } elseif ($null -ne $Module) { $Module.Warn("The 'User-Agent' header and the 'http_agent' was set, using the 'http_agent' for web request") } } $web_request.UserAgent = $HttpAgent switch ($FollowRedirects) { none { $web_request.AllowAutoRedirect = $false } safe { if ($web_request.Method -in @("GET", "HEAD")) { $web_request.AllowAutoRedirect = $true } else { $web_request.AllowAutoRedirect = $false } } all { $web_request.AllowAutoRedirect = $true } } if ($MaximumRedirection -eq 0) { $web_request.AllowAutoRedirect = $false } else { $web_request.MaximumAutomaticRedirections = $MaximumRedirection } } return $web_request } Function Invoke-WithWebRequest { <# .SYNOPSIS Invokes a ScriptBlock with the WebRequest. .DESCRIPTION Invokes the ScriptBlock and handle extra information like accessing the response stream, closing those streams safely as well as setting common module return values. .PARAMETER Module The Ansible.Basic module to set the return values for. This will set the following return values; elapsed - The total time, in seconds, that it took to send the web request and process the response msg - The human-readable description of the response status code status_code - An int that is the response status code .PARAMETER Request The System.Net.WebRequest to call. This can either be manually crafted or created with Get-AnsibleWebRequest. .PARAMETER Script The ScriptBlock to invoke during the web request. This ScriptBlock should take in the params Param ([System.Net.WebResponse]$Response, [System.IO.Stream]$Stream) This scriptblock should manage the response based on what it need to do. .PARAMETER Body An optional Stream to send to the target during the request. .PARAMETER IgnoreBadResponse By default a WebException will be raised for a non 2xx status code and the Script will not be invoked. This parameter can be set to process all responses regardless of the status code. .EXAMPLE Basic module that downloads a file $spec = @{ options = @{ path = @{ type = "path"; required = $true } } } $module = Ansible.Basic.AnsibleModule]::Create($args, $spec, @(Get-AnsibleWebRequestSpec)) $web_request = Get-AnsibleWebRequest -Module $module Invoke-WithWebRequest -Module $module -Request $web_request -Script { Param ([System.Net.WebResponse]$Response, [System.IO.Stream]$Stream) $fs = [System.IO.File]::Create($module.Params.path) try { $Stream.CopyTo($fs) $fs.Flush() } finally { $fs.Dispose() } } #> [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Object] [ValidateScript({ $_.GetType().FullName -eq 'Ansible.Basic.AnsibleModule' })] $Module, [Parameter(Mandatory = $true)] [System.Net.WebRequest] $Request, [Parameter(Mandatory = $true)] [ScriptBlock] $Script, [AllowNull()] [System.IO.Stream] $Body, [Switch] $IgnoreBadResponse ) $start = Get-Date if ($null -ne $Body) { $request_st = $Request.GetRequestStream() try { $Body.CopyTo($request_st) $request_st.Flush() } finally { $request_st.Close() } } try { try { $web_response = $Request.GetResponse() } catch [System.Net.WebException] { # A WebResponse with a status code not in the 200 range will raise a WebException. We check if the # exception raised contains the actual response and continue on if IgnoreBadResponse is set. We also # make sure we set the status_code return value on the Module object if possible if ($_.Exception.PSObject.Properties.Name -match "Response") { $web_response = $_.Exception.Response if (-not $IgnoreBadResponse -or $null -eq $web_response) { $Module.Result.msg = $_.Exception.StatusDescription $Module.Result.status_code = $_.Exception.Response.StatusCode throw $_ } } else { throw $_ } } if ($Request.RequestUri.IsFile) { # A FileWebResponse won't have these properties set $Module.Result.msg = "OK" $Module.Result.status_code = 200 } else { $Module.Result.msg = $web_response.StatusDescription $Module.Result.status_code = $web_response.StatusCode } $response_stream = $web_response.GetResponseStream() try { # Invoke the ScriptBlock and pass in WebResponse and ResponseStream &$Script -Response $web_response -Stream $response_stream } finally { $response_stream.Dispose() } } finally { if ($web_response) { $web_response.Close() } $Module.Result.elapsed = ((Get-date) - $start).TotalSeconds } } Function Get-AnsibleWebRequestSpec { <# .SYNOPSIS Used by modules to get the argument spec fragment for AnsibleModule. .EXAMPLES $spec = @{ options = @{} } $module = [Ansible.Basic.AnsibleModule]::Create($args, $spec, @(Get-AnsibleWebRequestSpec)) #> @{ options = $ansible_web_request_options } } # See lib/ansible/plugins/doc_fragments/url_windows.py # Kept here for backwards compat as this variable was added in Ansible 2.9. Ultimately this util should be removed # once the deprecation period has been added. $ansible_web_request_options = @{ method = @{ type = "str" } follow_redirects = @{ type = "str"; choices = @("all", "none", "safe"); default = "safe" } headers = @{ type = "dict" } http_agent = @{ type = "str"; default = "ansible-httpget" } maximum_redirection = @{ type = "int"; default = 50 } timeout = @{ type = "int"; default = 30 } # Was defaulted to 10 in win_get_url but 30 in win_uri so we use 30 validate_certs = @{ type = "bool"; default = $true } # Credential options client_cert = @{ type = "str" } client_cert_password = @{ type = "str"; no_log = $true } force_basic_auth = @{ type = "bool"; default = $false } url_username = @{ type = "str" } url_password = @{ type = "str"; no_log = $true } use_default_credential = @{ type = "bool"; default = $false } # Proxy options use_proxy = @{ type = "bool"; default = $true } proxy_url = @{ type = "str" } proxy_username = @{ type = "str" } proxy_password = @{ type = "str"; no_log = $true } proxy_use_default_credential = @{ type = "bool"; default = $false } } $export_members = @{ Function = "Get-AnsibleWebRequest", "Get-AnsibleWebRequestSpec", "Invoke-WithWebRequest" Variable = "ansible_web_request_options" } Export-ModuleMember @export_members
combined_dataset/train/non-malicious/sample_4_20.ps1
sample_4_20.ps1
ConvertFrom-StringData @' id_rdsserverprogress=Gathering RDS Information: id_rdswmiget=Getting Win32_TerminalServiceSetting from WMI. id_rdswmigeterror=ERROR: WMI not working. unable to get Win32_TerminalServiceSetting. id_rdswmigetsolution=Please verify that WMI service running using wbemtest. id_rdsiis=Getting IIS configuration. id_rdspowershell=Getting RDS configuration using PowerShell. (could take up to 3 minutes/role). id_rdssaved=Saved: '@ # SIG # Begin signature block # MIIoUwYJKoZIhvcNAQcCoIIoRDCCKEACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+3JpAKWe3AZbq # BM8951rJeT1FOvEQM1B6Qgw0Zwg8yKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiQwghogAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAgf # fRgbiN6WDFZdGt13xjWLKDnUdn1BkAnZ7dfTZdofMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEATkSioDoFUp1CnND/uCpnGqfcu7n8bCc+xe3L # ARv9Hx11MtCKayBkvu+hui4jcrfslaSsH6I97I591Na4v0qXOT/4zn4eH8F4a3zw # OSIL8aIeyXDrIVgXsCmWV4ASgTBm55GwHf7sO+XszLa16XY5ezcnrHASIMbc1lUl # YV7RVGElBDsuHnJtn5XnQrtNNcBru5z/PFJliTZkqMQYjabsCQVf+TCiR56uifVo # fFeklxPBy9YSLBYCAYPyiTaEzuvb229xfU5xDIVugTOX8UW1IlvbS7j7o+W/O0Kr # c2gEFrRnmlxA2e40iuk9nteisu93165ihSi6UUyD9xaA9f9G5aGCF64wgheqBgor # BgEEAYI3AwMBMYIXmjCCF5YGCSqGSIb3DQEHAqCCF4cwgheDAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDBb7yw6Rh47sYPcAgH624TEly87u577gKG # JCX0tyNmhgIGZut+oGFCGBEyMDI0MTAyODExNDAzOS43WjAEgAIB9KCB2aSB1jCB # 0zELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5u # U2hpZWxkIFRTUyBFU046NkYxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WgghH+MIIHKDCCBRCgAwIBAgITMwAAAfwYoK/M # aVqHOgABAAAB/DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDAeFw0yNDA3MjUxODMxMTRaFw0yNTEwMjIxODMxMTRaMIHTMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv # ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQg # VFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKdQ # wCi8aW0HD1WDx5SR8lu1uZQWYyVlg4zH5eVsobgMpT/yw5toW+MplJkspldBBUUH # JjPAcqcI4Vj/Be8eIjvPHfvRmfTEJjYd40g6IYV14H/KzjRAMnwj1ZiczO8rbLq2 # fcaHG7hC+/j+xJCMKDrjBZUxdhv87qsdRPsADbJaT6j6W/DwuegUMYCQiNSzheZZ # NwHjye/Di92sPzXZZL3VZd1YAUj1+DWsLd1IFKH7j5/3Kfb8CigcLiFkBBWfN+xl # 1yE7IXdjH7OqGH8VxLZo9kgRhIcVbO8REblhm9HCumn8u52ipG2SNr9VKrMbmbfe # K5/3stsp77p5cdEev2+pzZAtazkwH1pabAI/0Jc8jOrmE0sWGQtmFsy220ZdJUbU # s/uE3aVFP6AGUgfmPrNdkapoM4u0VcTXCNpZv/7AhJugOt5wiQoGLTPiy3vaU7IZ # f1n/Djrj0EYgPrLU7IPPQThvbW5Ws9pH3jpGH+YXR/KYQG7jrg0H6+rOWGulvr2c # +hNGbHp84tDrTH+UQmtoQA2FYFMQ/oKwvBKbX1nlQFoGAmkBYXjTf2RjUDJJO/Fe # t8qDwX3yRALvgecZUz2KIo1HaPTV6LyZqBl4+kfE4LKPkD2gBhysQmx2tUC/QEjB # dzrNY66IAhxospH6dXShp5gOcCU+jcewXnZUg7AJAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUmPGlK7FGs4cQch+/XYYkAi/+0HYwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAE+7LP2QGdG02hbK7IiWHf/y0OiJim/SWUiokcPcbPIcJOWP+84oJ/YBrcHk # QoQtpSfBlUR4KxZAcQAo7rj6a0s/1GF+5+dtiSnLnZ1riHhNad9AWa6j0zp7HA/f # A2YuljUwMpp2ku4reagIDSJ63gCW01NnAKLCaHlwB6+dGIEhpZiTPnDepmCwC+k0 # xTLRWCa6SvUzOUcoeXmZpulEyZxoNI7daRf9rvD0nc93Q8uwxeygyWndqh8WTkbz # N5PVfGJ9ySOWCz7i7KNiebN36V8glYEf4avOoOc43fW0UcsogvIiyJvzfeauh1lb # Ansknra6n7A8mFkrcC/eocuwyMiy+YofGBTHdAHZr00aMpZgA7isBNk0Ak7z545y # 5O8qSVtvbde2MmuFfiZc+eLAZz1O5CHmGbL1E/mCoMpD9UAfqfrlHUR+nu/VWos/ # onsFqyCWeLV5AzJi9tZ4dI/ufBNXnAGA70+geMhSHqJ8QP+hpfV7OyS3IjwiAuoR # nZYohAacmHlBdKIWRZ+zSkLvNCGdI3eddVgNm6usfWlKv8xcn/BIMPnbp1I9SrTa # Fqau1biamqXJGLJr5pmB2VwoytRLrO1dSPml46wWLqsjPUKXhWVOFNNWBteblsFA # mo9LmZWof0RkmDHfOMvQwqjqX3ihOjyzJO4S54b3DkK58T+pMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1kwggJBAgEBMIIBAaGB2aSB1jCB # 0zELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5u # U2hpZWxkIFRTUyBFU046NkYxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAE5BKSVzmqiNsH6g # bMODS1cKmKqqoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # DQYJKoZIhvcNAQELBQACBQDqyWT+MCIYDzIwMjQxMDI4MDExODU0WhgPMjAyNDEw # MjkwMTE4NTRaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOrJZP4CAQAwCgIBAAIC # I/kCAf8wBwIBAAICFTowCgIFAOrKtn4CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYK # KwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsF # AAOCAQEAKrSxhZbLa7G/kr1L269YSwnrZCDRMA8X54om6FEFbeBnkC6GNeDOpXjP # cutaAICBd93xyWpXNJuoUWB1FLpB5p3/Djkmk4ol/57JRId6E7GTET6s0dZOS37z # Kd2tqSA57XGJTG5dqMhg+8Im9/JDLjJOcRQ1YbwpPVZADhVG/CLAaJ6jsJt9jAsM # buD4jC9yj+feZLPZrej8V9WrgUNYCHC32BJ6PvL1SkKWAcGcoswAPC5cQsBPmrVq # Tyh+wBwQmlJ6FgMHZJuTbRyiwRq5g1I5clrWkV71l2CXRQt0eBkr1gAHZm32qNvn # KMnfSHTl5M93+7u72Adz+B2BuTRM9TGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/Bigr8xpWoc6AAEAAAH8MA0GCWCGSAFl # AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcN # AQkEMSIEIL28brC5AdMAKFj12v1IHkyM6RJkV+5b92A9Vfm3FGPXMIH6BgsqhkiG # 9w0BCRACLzGB6jCB5zCB5DCBvQQglUKvkLvv4fwTlT+MMHlMGx7glIYfk+4at3eT # AmjRLWIwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfwYoK/MaVqHOgABAAAB/DAiBCDThWaeJlr4pTZrtqD/CWog7G2ITC/nN0sAVEf7 # yeFAFjANBgkqhkiG9w0BAQsFAASCAgAVWbVaT1dNlx7BTjFruhL3sT2c39+vcTZZ # RHw9P5jhfJyY+uLwe4/ZRLdMfyfnDWqqYM/ebIjOnX+6fJOCDJsfl6EExsq7DJkl # 9H7xGzk3Lze9xsvIV0qiFucxd3h64iaRjnwLX7z5TP6EKu3KeCW5SQiWR+nx5yAT # ubVj7ffgbaIEgDMoqObtwuNRu8dPChd0FyzHypG6kiWLMv49Zk4NzFUcNV2Je7Mi # mKcPoAb37UBbXLgNyk5bN3ZZ9HSfNeYjIyfTGeSF5Kil9zB1unSQ702AJ51z48ql # fnphy8nwRMkKAqRZ4Axl+BYL16QmRueydpuIVt8/6tQAhF0sjZHjWUhoNABn5coC # yuqIxoGb5PswinvzqKdx5uqmdglgZkbILrCPllRbAMpLxt0Fka7my8j2dGo1AN+g # QzelGdiTLQO0TFJkS2rqMUlSu8UM5NSDBbUdIWpAVIfXjPC5hKV3kTgiy/eMcSLc # Ju9YdbuxSMyOBXOCTAJJMC7uJkvScXnyFymnSTaTGdOMiTXcIuOtA0pFPIBt+051 # FhwHuSpRDJSt28IaTEdHtyvOFATDyRSOfdopuSqvv/JB9kyg32kZH21qjzU2suDM # Db7MC00UGmcZPrc3IaulhZ8GrYITaC0RmgYqSEkNGnYbmIX2QcZNwiR7hQ4I2/lj # 5QuWc5+u9w== # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_17.ps1
sample_6_17.ps1
#************************************************ # DC_ServerManagerLogs.ps1 # Version 1.0.1 # Date: 01-04-2011 # Author: Andre Teixeira - [email protected] # Description: This script can be used to obtain server manager related logs #************************************************ PARAM($MachineName=$ComputerName, $Path="") if($Path -ne "") { $SkipRunningExe =$true } else { $Path = $Env:windir } if ($OSVersion.Build -gt 6000) { Import-LocalizedData -BindingVariable ServerManagerStrings Write-DiagProgress -Activity $ServerManagerStrings.ID_ServerManagerInfo -Status $ServerManagerStrings.ID_ServerManagerObtaining if ((Get-CimInstance -Class Win32_ComputerSystem).DomainRole -gt 1) { #Server $sectionDescription = $ServerManagerStrings.ID_ServerManagerOutputDesc $filesToCollect = "$Path\logs\ServerManager.log" if (test-path $filesToCollect) { $filesDescription = $ServerManagerStrings.ID_ServerManagerLogOutput if (test-path $FilesToCollect) { CollectFiles -filesToCollect $filesToCollect -fileDescription $filesDescription -sectionDescription $sectionDescription -renameOutput $true -MachineNamePrefix $MachineName } } if($SkipRunningExe -ne $true) { if (test-path "$Path\system32\servermanagercmd.exe") { $OutputFile = $MachineName + "_ServerManagerCmdQuery" $CommandToExecute = "$Path\system32\cmd.exe /c $Env:windir\system32\servermanagercmd.exe -query $OutputFile.xml > $OutputFile.txt" $fileDescription = $ServerManagerStrings.ID_ServerManagerCMDOutput RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect "$OutputFile.*" -fileDescription $fileDescription } if (test-path "$Path\system32\oclist.exe") { $OutputFile = $MachineName + "_OptionalComponents.txt" $CommandToExecute = "$Path\system32\cmd.exe /c $Path\system32\oclist.exe > $OutputFile" $fileDescription = $ServerManagerStrings.ID_ServerManagerOclist RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect "$OutputFile.*" -fileDescription $fileDescription } } } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBECbCHyYlX9w1g # jticZnPcFIF4YEeL9qtNHMbaQfCpYaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHBc3D6SDyMBzi1dhADo5XHu # qbGTk8zvVkWMCFsIsATRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAoCFfhmeFWFN+VEw1XMWvA5JM3iOHHK2PvbKhOlHPQCB7QNErneA86ORI # k9ZMkDjpYAFDatYwcxeB426/EYZeGIQmWmPuSa98W9NRdXZA84tZIQFTCFEesev9 # UbX4FxcSyFQhlU6kXvEgWqru8fLOfXkFkKIqoZ2KKjhoz2rH/C/CI7Xzj00UQCEG # 8JdAlRvq+AqYvAuPvMXK0MuHqtZZTyPixX1ZFvlSe0nh9ZEotS5SnWi1qgkJlF1w # e+NIiLA5WNUlo+IuocrEhZ2XTptBp2UlJLcURh4XBEUo1dSMKlsMkHMbV2Jz8Eep # MVGFn5dvHA6zTws1Fp7SOdpQs5WYPKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAEsnNwExKVbZd5BejcnnlmBrRcj1MuT+pXbiYOwdMypgIGZuspkdL7 # GBMyMDI0MTAyODExNDA0My42MDlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C # u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx # /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV # V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR # 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp # gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo # j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4 # yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm # TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi # wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd # 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s # huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q # lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG # l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc # 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A # /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl # SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4 # gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG # 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt # oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc # 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn # ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq # Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/ # R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK # AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I # gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo # SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY # o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k # ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt # 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb # zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgazDzhMxwkAJa # jzZ098xvpzuAD0203MNKQ4E0wtHAv/0wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4 # MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB # CwUABIICADRoRfzGLdaGYvCkp8jDtZpIEdeRCI/fFeKAtHuoZVIUgoMHlGaPJ3Fm # xgE+NjjZhZIyvswEz5Bs3HMCTWgfH7nz7ikq7BytrDkAx52TemwqLrF/vh72bWpg # Obau3GC3jxFPqtfUoukzy+1WnYkw71Xn5eFg7JnSBjq7naJIADcucDvA94wWl91R # GN4JVE433IfKkFkzxd/MSz8sLOOPvYjTb50u0PudbD11tsOYuOP4pYDCfvnMuhoo # CtEZ6Y4k9ptDvKYOwRPhJE+M11rYwCbEYj5fS+jsEOuh8RLELkWSOeZOabLtrQ7o # YPFwMXCq+g+nJZ/yCCuTLKFyysn7LnIAgN2l/gekQCGOWzJNsvzIbfzdNXZXZMha # o5/gm+9TWIweNE2HnFJk2ubMGygU3uwHydt2Qp4mf8ToerJi43tZ+7nKhE81DOCp # u1kln35WbgM8bEiH7SOKwvizs2PRmI0A0OWxO+wtVJkMBWw//cQfvAT04e6sFTtc # mToCGwRlMhzmZQ7oHeGOTVXKRVRasmUS1gecjou549zMUI8vqnkP2b4YSoLTfAgK # C2d7QW+wfxCGg3Ava1yQB/2CKhmzFZmP3Vk7V1fPjW3GETI1toCguPq+0yeAAdpv # 44POL0m3A+BCvaHX/b009IAMgqmpw5rlt78wU+T6dRsUVnOlZxCI # SIG # End signature block
combined_dataset/train/non-malicious/sample_25_38.ps1
sample_25_38.ps1
# # Module manifest for module 'OCI.PSModules.Servicemesh' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicemesh.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16189a7b-c9fe-4714-98b6-983f1fa28ccd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicemesh Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemesh.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicemeshAccessPoliciesList', 'Get-OCIServicemeshAccessPolicy', 'Get-OCIServicemeshIngressGateway', 'Get-OCIServicemeshIngressGatewayRouteTable', 'Get-OCIServicemeshIngressGatewayRouteTablesList', 'Get-OCIServicemeshIngressGatewaysList', 'Get-OCIServicemeshMesh', 'Get-OCIServicemeshMeshesList', 'Get-OCIServicemeshProxyDetails', 'Get-OCIServicemeshVirtualDeployment', 'Get-OCIServicemeshVirtualDeploymentsList', 'Get-OCIServicemeshVirtualService', 'Get-OCIServicemeshVirtualServiceRouteTable', 'Get-OCIServicemeshVirtualServiceRouteTablesList', 'Get-OCIServicemeshVirtualServicesList', 'Get-OCIServicemeshWorkRequest', 'Get-OCIServicemeshWorkRequestErrorsList', 'Get-OCIServicemeshWorkRequestLogsList', 'Get-OCIServicemeshWorkRequestsList', 'Move-OCIServicemeshAccessPolicyCompartment', 'Move-OCIServicemeshIngressGatewayCompartment', 'Move-OCIServicemeshIngressGatewayRouteTableCompartment', 'Move-OCIServicemeshMeshCompartment', 'Move-OCIServicemeshVirtualDeploymentCompartment', 'Move-OCIServicemeshVirtualServiceCompartment', 'Move-OCIServicemeshVirtualServiceRouteTableCompartment', 'New-OCIServicemeshAccessPolicy', 'New-OCIServicemeshIngressGateway', 'New-OCIServicemeshIngressGatewayRouteTable', 'New-OCIServicemeshMesh', 'New-OCIServicemeshVirtualDeployment', 'New-OCIServicemeshVirtualService', 'New-OCIServicemeshVirtualServiceRouteTable', 'Remove-OCIServicemeshAccessPolicy', 'Remove-OCIServicemeshIngressGateway', 'Remove-OCIServicemeshIngressGatewayRouteTable', 'Remove-OCIServicemeshMesh', 'Remove-OCIServicemeshVirtualDeployment', 'Remove-OCIServicemeshVirtualService', 'Remove-OCIServicemeshVirtualServiceRouteTable', 'Stop-OCIServicemeshWorkRequest', 'Update-OCIServicemeshAccessPolicy', 'Update-OCIServicemeshIngressGateway', 'Update-OCIServicemeshIngressGatewayRouteTable', 'Update-OCIServicemeshMesh', 'Update-OCIServicemeshVirtualDeployment', 'Update-OCIServicemeshVirtualService', 'Update-OCIServicemeshVirtualServiceRouteTable' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemesh' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_39_77.ps1
sample_39_77.ps1
# # Module manifest for module 'OCI.PSModules.Managementagent' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Managementagent.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2f5c5edb-5a3f-40c3-bf5b-eb95bc0d12aa' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Managementagent Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementagent.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIManagementagent', 'Get-OCIManagementagentAutoUpgradableConfig', 'Get-OCIManagementagentAvailabilityHistoriesList', 'Get-OCIManagementagentDataSource', 'Get-OCIManagementagentDataSourcesList', 'Get-OCIManagementagentImagesList', 'Get-OCIManagementagentInstallKey', 'Get-OCIManagementagentInstallKeyContent', 'Get-OCIManagementagentInstallKeysList', 'Get-OCIManagementagentPluginsList', 'Get-OCIManagementagentsList', 'Get-OCIManagementagentWorkRequest', 'Get-OCIManagementagentWorkRequestErrorsList', 'Get-OCIManagementagentWorkRequestLogsList', 'Get-OCIManagementagentWorkRequestsList', 'Invoke-OCIManagementagentDeployPlugins', 'Invoke-OCIManagementagentSetAutoUpgradableConfig', 'Invoke-OCIManagementagentSummarizeManagementAgentCounts', 'Invoke-OCIManagementagentSummarizeManagementAgentPluginCounts', 'New-OCIManagementagentDataSource', 'New-OCIManagementagentInstallKey', 'Remove-OCIManagementagent', 'Remove-OCIManagementagentDataSource', 'Remove-OCIManagementagentInstallKey', 'Remove-OCIManagementagentWorkRequest', 'Update-OCIManagementagent', 'Update-OCIManagementagentDataSource', 'Update-OCIManagementagentInstallKey' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementagent' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_54_67.ps1
sample_54_67.ps1
# # Module manifest for module 'OCI.PSModules.Oda' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oda.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '040ef05d-6373-43bf-a0a9-67444099f906' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oda Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oda.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIOdaDigitalAssistant', 'Export-OCIOdaSkill', 'Get-OCIOdaAuthenticationProvider', 'Get-OCIOdaAuthenticationProvidersList', 'Get-OCIOdaChannel', 'Get-OCIOdaChannelsList', 'Get-OCIOdaDigitalAssistant', 'Get-OCIOdaDigitalAssistantParameter', 'Get-OCIOdaDigitalAssistantParametersList', 'Get-OCIOdaDigitalAssistantsList', 'Get-OCIOdaImportedPackage', 'Get-OCIOdaImportedPackagesList', 'Get-OCIOdaInstance', 'Get-OCIOdaInstanceAttachment', 'Get-OCIOdaInstanceAttachmentsList', 'Get-OCIOdaInstancesList', 'Get-OCIOdaPackage', 'Get-OCIOdaPackagesList', 'Get-OCIOdaPrivateEndpoint', 'Get-OCIOdaPrivateEndpointAttachment', 'Get-OCIOdaPrivateEndpointAttachmentsList', 'Get-OCIOdaPrivateEndpointScanProxiesList', 'Get-OCIOdaPrivateEndpointScanProxy', 'Get-OCIOdaPrivateEndpointsList', 'Get-OCIOdaSkill', 'Get-OCIOdaSkillParameter', 'Get-OCIOdaSkillParametersList', 'Get-OCIOdaSkillsList', 'Get-OCIOdaTranslator', 'Get-OCIOdaTranslatorsList', 'Get-OCIOdaWorkRequest', 'Get-OCIOdaWorkRequestErrorsList', 'Get-OCIOdaWorkRequestLogsList', 'Get-OCIOdaWorkRequestsList', 'Import-OCIOdaBot', 'Invoke-OCIOdaBulkCreateSkillEntities', 'Invoke-OCIOdaCascadingDeleteSkillCustomEntities', 'Invoke-OCIOdaConfigureDigitalAssistantParameters', 'Invoke-OCIOdaPublishDigitalAssistant', 'Invoke-OCIOdaPublishSkill', 'Invoke-OCIOdaRotateChannelKeys', 'Invoke-OCIOdaTrainSkill', 'Move-OCIOdaInstanceCompartment', 'Move-OCIOdaPrivateEndpointCompartment', 'New-OCIOdaAuthenticationProvider', 'New-OCIOdaChannel', 'New-OCIOdaDigitalAssistant', 'New-OCIOdaImportedPackage', 'New-OCIOdaInstance', 'New-OCIOdaInstanceAttachment', 'New-OCIOdaPrivateEndpoint', 'New-OCIOdaPrivateEndpointAttachment', 'New-OCIOdaPrivateEndpointScanProxy', 'New-OCIOdaSkill', 'New-OCIOdaSkillParameter', 'New-OCIOdaTranslator', 'Remove-OCIOdaAuthenticationProvider', 'Remove-OCIOdaChannel', 'Remove-OCIOdaDigitalAssistant', 'Remove-OCIOdaImportedPackage', 'Remove-OCIOdaInstance', 'Remove-OCIOdaInstanceAttachment', 'Remove-OCIOdaPrivateEndpoint', 'Remove-OCIOdaPrivateEndpointAttachment', 'Remove-OCIOdaPrivateEndpointScanProxy', 'Remove-OCIOdaSkill', 'Remove-OCIOdaSkillParameter', 'Remove-OCIOdaTranslator', 'Start-OCIOdaChannel', 'Start-OCIOdaInstance', 'Stop-OCIOdaChannel', 'Stop-OCIOdaInstance', 'Update-OCIOdaAuthenticationProvider', 'Update-OCIOdaChannel', 'Update-OCIOdaDigitalAssistant', 'Update-OCIOdaDigitalAssistantParameter', 'Update-OCIOdaImportedPackage', 'Update-OCIOdaInstance', 'Update-OCIOdaInstanceAttachment', 'Update-OCIOdaPrivateEndpoint', 'Update-OCIOdaSkill', 'Update-OCIOdaSkillParameter', 'Update-OCIOdaTranslator' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oda' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/677.ps1
677.ps1
$reportServerUri = if ($env:PesterServerUrl -eq $null) { 'http://localhost/reportserver' } else { $env:PesterServerUrl } Function New-InMemoryEmailSubscription { [xml]$matchData = '<?xml version="1.0" encoding="utf-16" standalone="yes"?><ScheduleDefinition xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><StartDateTime xmlns="http://schemas.microsoft.com/sqlserver/reporting/2010/03/01/ReportServer">2017-07-14T08:00:00.000+01:00</StartDateTime><WeeklyRecurrence xmlns="http://schemas.microsoft.com/sqlserver/reporting/2010/03/01/ReportServer"><WeeksInterval>1</WeeksInterval><DaysOfWeek><Monday>true</Monday><Tuesday>true</Tuesday><Wednesday>true</Wednesday><Thursday>true</Thursday><Friday>true</Friday></DaysOfWeek></WeeklyRecurrence></ScheduleDefinition>' $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri $namespace = $proxy.GetType().NameSpace $ExtensionSettingsDataType = "$namespace.ExtensionSettings" $ParameterValueOrFieldReference = "$namespace.ParameterValueOrFieldReference[]" $ParameterValueDataType = "$namespace.ParameterValue" $ExtensionSettings = New-Object $ExtensionSettingsDataType $ExtensionSettings.Extension = "Report Server Email" $ParameterValues = New-Object $ParameterValueOrFieldReference -ArgumentList 8 $to = New-Object $ParameterValueDataType $to.Name = "TO"; $to.Value = "[email protected]"; $ParameterValues[0] = $to; $replyTo = New-Object $ParameterValueDataType $replyTo.Name = "ReplyTo"; $replyTo.Value ="[email protected]"; $ParameterValues[1] = $replyTo; $includeReport = New-Object $ParameterValueDataType $includeReport.Name = "IncludeReport"; $includeReport.Value = "False"; $ParameterValues[2] = $includeReport; $renderFormat = New-Object $ParameterValueDataType $renderFormat.Name = "RenderFormat"; $renderFormat.Value = "MHTML"; $ParameterValues[3] = $renderFormat; $priority = New-Object $ParameterValueDataType $priority.Name = "Priority"; $priority.Value = "NORMAL"; $ParameterValues[4] = $priority; $subject = New-Object $ParameterValueDataType $subject.Name = "Subject"; $subject.Value = "Your sales report"; $ParameterValues[5] = $subject; $comment = New-Object $ParameterValueDataType $comment.Name = "Comment"; $comment.Value = "Here is the link to your report."; $ParameterValues[6] = $comment; $includeLink = New-Object $ParameterValueDataType $includeLink.Name = "IncludeLink"; $includeLink.Value = "True"; $ParameterValues[7] = $includeLink; $ExtensionSettings.ParameterValues = $ParameterValues $subscription = [pscustomobject]@{ DeliverySettings = $ExtensionSettings Description = "Send email to [email protected]" EventType = "TimedSubscription" IsDataDriven = $false MatchData = $matchData.OuterXml Values = $null } return $subscription } Function New-InMemoryFileShareSubscription { [xml]$matchData = '<?xml version="1.0" encoding="utf-16" standalone="yes"?><ScheduleDefinition xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><StartDateTime xmlns="http://schemas.microsoft.com/sqlserver/reporting/2010/03/01/ReportServer">2017-07-14T08:00:00.000+01:00</StartDateTime><WeeklyRecurrence xmlns="http://schemas.microsoft.com/sqlserver/reporting/2010/03/01/ReportServer"><WeeksInterval>1</WeeksInterval><DaysOfWeek><Monday>true</Monday><Tuesday>true</Tuesday><Wednesday>true</Wednesday><Thursday>true</Thursday><Friday>true</Friday></DaysOfWeek></WeeklyRecurrence></ScheduleDefinition>' $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri $namespace = $proxy.GetType().NameSpace $ExtensionSettingsDataType = "$namespace.ExtensionSettings" $ParameterValueOrFieldReference = "$namespace.ParameterValueOrFieldReference[]" $ParameterValueDataType = "$namespace.ParameterValue" $ExtensionSettings = New-Object $ExtensionSettingsDataType $ExtensionSettings.Extension = "Report Server FileShare" $ParameterValues = New-Object $ParameterValueOrFieldReference -ArgumentList 7 $to = New-Object $ParameterValueDataType $to.Name = "PATH"; $to.Value = "\\unc\path"; $ParameterValues[0] = $to; $replyTo = New-Object $ParameterValueDataType $replyTo.Name = "FILENAME"; $replyTo.Value ="Report"; $ParameterValues[1] = $replyTo; $includeReport = New-Object $ParameterValueDataType $includeReport.Name = "FILEEXTN"; $includeReport.Value = "True"; $ParameterValues[2] = $includeReport; $renderFormat = New-Object $ParameterValueDataType $renderFormat.Name = "USERNAME"; $renderFormat.Value = "user"; $ParameterValues[3] = $renderFormat; $priority = New-Object $ParameterValueDataType $priority.Name = "RENDER_FORMAT"; $priority.Value = "PDF"; $ParameterValues[4] = $priority; $subject = New-Object $ParameterValueDataType $subject.Name = "WRITEMODE"; $subject.Value = "Overwrite"; $ParameterValues[5] = $subject; $comment = New-Object $ParameterValueDataType $comment.Name = "DEFAULTCREDENTIALS"; $comment.Value = "False"; $ParameterValues[6] = $comment; $ExtensionSettings.ParameterValues = $ParameterValues $subscription = [pscustomobject]@{ DeliverySettings = $ExtensionSettings Description = "Shared on \\unc\path" EventType = "TimedSubscription" IsDataDriven = $false MatchData = $matchData.OuterXml Values = $null } return $subscription } Function Set-FolderReportDataSource { param ( [string] $NewFolderPath ) $tempProxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\emptyReport.rdl' $null = Write-RsCatalogItem -Path $localResourcesPath -RsFolder $NewFolderPath -Proxy $tempProxy $report = (Get-RsFolderContent -RsFolder $NewFolderPath -Proxy $tempProxy)| Where-Object TypeName -eq 'Report' $localResourcesPath = (Get-Item -Path ".\").FullName + '\Tests\CatalogItems\testResources\UnDataset.rsd' $null = Write-RsCatalogItem -Path $localResourcesPath -RsFolder $NewFolderPath -Proxy $tempProxy $dataSet = (Get-RsFolderContent -RsFolder $NewFolderPath -Proxy $tempProxy) | Where-Object TypeName -eq 'DataSet' $DataSetPath = $NewFolderPath + '/UnDataSet' $newRSDSName = "DataSource" $newRSDSExtension = "SQL" $newRSDSConnectionString = "Initial Catalog=DB; Data Source=Instance" $newRSDSCredentialRetrieval = "Store" $Pass = ConvertTo-SecureString -String "123" -AsPlainText -Force $newRSDSCredential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList "sql", $Pass $null = New-RsDataSource -RsFolder $NewFolderPath -Name $newRSDSName -Extension $newRSDSExtension -ConnectionString $newRSDSConnectionString -CredentialRetrieval $newRSDSCredentialRetrieval -DatasourceCredentials $newRSDSCredential -Proxy $tempProxy $DataSourcePath = "$NewFolderPath/$newRSDSName" $RsDataSet = Get-RsItemReference -Path $report.Path -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSet' $RsDataSource = Get-RsItemReference -Path $report.Path -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSource' $RsDataSetSource = Get-RsItemReference -Path $DataSetPath -Proxy $tempProxy | Where-Object ReferenceType -eq 'DataSource' $null = Set-RsDataSourceReference -Path $DataSetPath -DataSourceName $RsDataSetSource.Name -DataSourcePath $DataSourcePath -Proxy $tempProxy $null = Set-RsDataSourceReference -Path $report.Path -DataSourceName $RsDataSource.Name -DataSourcePath $DataSourcePath -Proxy $tempProxy $null = Set-RsDataSetReference -Path $report.Path -DataSetName $RsDataSet.Name -DataSetPath $dataSet.Path -Proxy $tempProxy return $report } Describe "Copy-RsSubscription" { $folderPath = '' $newReport = $null $subscription = $null BeforeEach { $folderName = 'SutGetRsItemReference_MinParameters' + [guid]::NewGuid() $null = New-RsFolder -Path / -FolderName $folderName -ReportServerUri $reportServerUri $folderPath = '/' + $folderName $newReport = Set-FolderReportDataSource($folderPath) $subscription = New-InMemoryFileShareSubscription } AfterEach { Remove-RsCatalogItem -RsFolder $folderPath -ReportServerUri $reportServerUri -Confirm:$false -ErrorAction Continue } Context "Copy-RsSubscription with Proxy parameter"{ It "Should set a subscription" { $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Copy-RsSubscription -Subscription $subscription -Path $newReport.Path -Proxy $proxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false } } Context "Copy-RsSubscription with ReportServerUri Parameter"{ It "Should set a subscription" { Copy-RsSubscription -Subscription $subscription -Path $newReport.Path -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false } } Context "Copy-RsSubscription with ReportServerUri and Proxy Parameter"{ It "Should set a subscription" { $proxy = New-RsWebServiceProxy -ReportServerUri $ReportServerUri Copy-RsSubscription -ReportServerUri $ReportServerUri -Subscription $subscription -Path $newReport.Path -Proxy $proxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 1 $reportSubscriptions.Report | Should Be "emptyReport" $reportSubscriptions.EventType | Should Be "TimedSubscription" $reportSubscriptions.IsDataDriven | Should Be $false } } } Describe "Copy-RsSubscription from pipeline" { $folderPath = '' $newReport = $null $subscription = $null BeforeEach { $folderName = 'SutGetRsItemReference_MinParameters' + [guid]::NewGuid() $null = New-RsFolder -Path / -FolderName $folderName -ReportServerUri $reportServerUri $folderPath = '/' + $folderName $newReport = Set-FolderReportDataSource($folderPath) $subscription = New-InMemoryFileShareSubscription } AfterEach { Remove-RsCatalogItem -RsFolder $folderPath -ReportServerUri $reportServerUri -Confirm:$false -ErrorAction Continue } Context "Copy-RsSubscription from pipeline with Proxy parameter"{ It "Should set a subscription" { $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Copy-RsSubscription -Subscription $subscription -Path $newReport.Path -Proxy $proxy Get-RsSubscription -Path $newReport.Path -Proxy $proxy | Copy-RsSubscription -Path $newReport.Path -Proxy $proxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 2 ($reportSubscriptions | Select-Object SubscriptionId -Unique).Count | Should Be 2 } } Context "Copy-RsSubscription from pipeline with ReportServerUri Parameter"{ It "Should copy a subscription" { Copy-RsSubscription -Subscription $subscription -Path $newReport.Path -ReportServerUri $reportServerUri Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri | Copy-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 2 ($reportSubscriptions | Select-Object SubscriptionId -Unique).Count | Should Be 2 } } Context "Copy-RsSubscription from pipeline with ReportServerUri and Proxy Parameter"{ It "Should copy a subscription" { $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Copy-RsSubscription -Subscription $subscription -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy | Copy-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 2 ($reportSubscriptions | Select-Object SubscriptionId -Unique).Count | Should Be 2 } } Context "Copy-RsSubscription from pipeline with input from disk"{ It "Should copy a subscription" { $TestPath = 'TestDrive:\Subscription.xml' $subscription | Export-RsSubscriptionXml $TestPath $subscriptionFromDisk = Import-RsSubscriptionXml $TestPath -ReportServerUri $reportServerUri $proxy = New-RsWebServiceProxy -ReportServerUri $reportServerUri Copy-RsSubscription -Subscription $subscriptionFromDisk -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy | Copy-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri -Proxy $proxy $reportSubscriptions = Get-RsSubscription -Path $newReport.Path -ReportServerUri $reportServerUri @($reportSubscriptions).Count | Should Be 2 ($reportSubscriptions | Select-Object SubscriptionId -Unique).Count | Should Be 2 } } }
combined_dataset/train/non-malicious/99425dd4-2c85-40f1-9cc8-39300a810b7a.ps1
99425dd4-2c85-40f1-9cc8-39300a810b7a.ps1
[reflection.assembly]::LoadWithPartialName("Microsoft.SharePoint") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server.Search") | out-null #NOTE: I've set strict crawl freshness/crawl duration/success ratio threshholds. Reset as desired # to something that more suits your reality. $crawlFreshnessDayThreshhold = 2 $crawlDurationHourThreshhold = 4 $successRatioThreshhold = 0.9 function Calculate-CrawlDuration( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { if ($contentSource.CrawlStatus -eq [Microsoft.Office.Server.Search.Administration.CrawlStatus]::Idle) { return "Green - no current crawl" } $timespan = [datetime]::Now - $contentSource.CrawlStarted $timespanFormatted = "Running for $($timespan.TotalDays.ToString('0.00')) Days" + "($($timespan.TotalHours.ToString('0.0')) hours)" if ($timespan.TotalHours -le ($crawlDurationHourThreshhold / 2)) { return "Green - $timespanFormatted" } elseif ($timespan.TotalHours -le ($crawlDurationHourThreshhold)) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-CrawlFreshness( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { $timespan = [datetime]::Now - $contentSource.CrawlCompleted $timespanFormatted = "$($timespan.TotalDays.ToString('0.00')) days ago" if ($timespan.Days -le 0) { return "Green - $timespanFormatted" } elseif ($timespan.Days -lt $crawlFreshnessDayThreshhold) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-IndexHealth( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource, $successCount, $warningCount, $errorCount) { $formatted = "($($successCount)/$($warningCount)/$($errorCount))" if ($errorCount -eq 1) { return "Red - exactly 1 error, usually indicates permissions/config error - $formatted" } $successRatio = ([double]$successCount)/([double]($warningCount + $errorCount)) $successRatioMidpointToPerfection = (1.0 - ((1.0 - $successRatioThreshhold)/2.0)) if ($successRatio -ge $successRatioMidpointToPerfection) { return "Green - $formatted" } elseif ($successRatio -ge $successRatioThreshhold) { return "Yellow - $formatted" } else { return "Red - $formatted" } } function Get-CrawlHealth { $serverContext = [Microsoft.Office.Server.ServerContext]::Default $searchContext = [Microsoft.Office.Server.Search.Administration.SearchContext]::GetContext($serverContext) $content = [Microsoft.Office.Server.Search.Administration.Content]$searchContext $history = [Microsoft.Office.Server.Search.Administration.CrawlHistory]$searchContext $contentSources = $content.ContentSources | foreach { $_ } $contentSources | foreach { #unroll DataTable object into more useful DataRow object $crawlHistory = $history.GetLastCompletedCrawlHistory($_.Id) | % { $_ } add-member -inputobject $_ -membertype NoteProperty -name "CurrentCrawlDuration" -value ( Calculate-CrawlDuration $_) add-member -inputobject $_ -membertype NoteProperty -name "CompletedCrawlFreshness" -value ( Calculate-CrawlFreshness $_) add-member -inputobject $_ -membertype NoteProperty -name "IndexHealth" -value ( Calculate-IndexHealth -contentSource $_ -successCount $crawlHistory.SuccessCount -warningCount ( $crawlHistory.WarningCount) -errorCount $crawlHistory.ErrorCount) } $contentSources | select Name, CurrentCrawlDuration, CompletedCrawlFreshness, IndexHealth | fl } #USAGE: -Open a PowerShell session on the SharePoint server with elevated credentials # (specifically, with access to the SSP - usually the SharePoint farm account) # -Tweak the threshholds (they may be too ambitious for your environment) # -Paste this text into an open PowerShell window and type (without the # mark) # Get-CrawlHealth
combined_dataset/train/non-malicious/1049.ps1
1049.ps1
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) if( Test-AdminPrivilege ) { $originalTrustedHosts = $null function Start-Test { $originalTrustedHosts = @( Get-TrustedHost ) Clear-TrustedHost } function Stop-Test { if( $originalTrustedHosts ) { Set-TrustedHost -Entry $originalTrustedHosts } } function Test-ShouldAddNewHost { Add-TrustedHost -Entries example.com $trustedHosts = @( Get-TrustedHost ) Assert-True ($trustedHosts -contains 'example.com') Assert-Equal 1 $trustedHosts.Count } function Test-ShouldAddMultipleHosts { Add-TrustedHost -Entry example.com,webmd.com $trustedHosts = @( Get-TrustedHost ) Assert-True ($trustedHosts -contains 'example.com') Assert-True ($trustedHosts -contains 'webmd.com') Assert-Equal 2 $trustedHosts.Count } function Test-ShouldNotDuplicateEntries { Add-TrustedHost -Entry example.com Add-TrustedHost -Entry example.com $trustedHosts = @( Get-TrustedHost ) Assert-True ($trustedHosts -contains 'example.com') Assert-Equal 1 $trustedHosts.Count } function Test-ShouldSupportWhatIf { $preTrustedHosts = @( Get-TrustedHost ) Add-TrustedHost -Entry example.com -WhatIf $trustedHosts = @( Get-TrustedHost ) Assert-True ($trustedHosts -notcontains 'example.com') Assert-Equal $preTrustedHosts.Count $trustedHosts.Count } }
combined_dataset/train/non-malicious/749.ps1
749.ps1
$vstsVariables = @{ PSES_BRANCH = 'master' } foreach ($var in $vstsVariables.Keys) { if (Get-Item "env:$var" -ErrorAction Ignore) { continue } $val = $vstsVariables[$var] Write-Host "Setting var '$var' to value '$val'" Write-Host " }
combined_dataset/train/non-malicious/sample_39_31.ps1
sample_39_31.ps1
function Get-CloudTrailKmsPolicy { <# .SYNOPSIS Returns a customized Kms policy for CloudTrail using the supplied Role Arn principal #> $kmsPolicy = "{ 'Statement': [ { 'Sid': 'Allow CloudTrail to encrypt logs', 'Effect': 'Allow', 'Principal': { 'Service': 'cloudtrail.amazonaws.com' }, 'Action': 'kms:GenerateDataKey*', 'Resource': '*' }, { 'Sid': 'Allow use of the key', 'Effect': 'Allow', 'Principal': { 'AWS': ['${roleArn}'] }, 'Action': [ 'kms:Decrypt' ], 'Resource': '*' } ]}" return $kmsPolicy.Replace("'",'"') } function Get-OrganizationCloudTrailS3Policy { <# .SYNOPSIS Returns a customized S3 Policy for specified organization and S3 bucket #> $s3PolicyForRoleOrganizationCloudTrail = "{ 'Sid': 'AWSCloudTrailWrite20150319', 'Effect': 'Allow', 'Principal': { 'Service': [ 'cloudtrail.amazonaws.com' ] }, 'Action': 's3:PutObject', 'Resource': '$($AwsCloudResource):s3:::${bucketName}/AWSLogs/${organizationId}/*', 'Condition': { 'StringEquals': { 's3:x-amz-acl': 'bucket-owner-full-control' } } }" return $s3PolicyForRoleOrganizationCloudTrail.Replace("'",'"') } function Get-KmsS3Policy { <# .SYNOPSIS Returns customized S3 policy for Kms Arn to access S3 bucket #> $s3PolicyForKms = " [ { 'Sid': 'Deny unencrypted object uploads. This is optional', 'Effect': 'Deny', 'Principal': { 'Service': 'cloudtrail.amazonaws.com' }, 'Action': 's3:PutObject', 'Resource': '$($AwsCloudResource):s3:::${bucketName}/*', 'Condition': { 'StringNotEquals': { 's3:x-amz-server-side-encryption': 'aws:kms' } } }, { 'Sid': 'Deny incorrect encryption header. This is optional', 'Effect': 'Deny', 'Principal': { 'Service': 'cloudtrail.amazonaws.com' }, 'Action': 's3:PutObject', 'Resource': '$($AwsCloudResource):s3:::${bucketName}/*', 'Condition': { 'StringNotEquals': { 's3:x-amz-server-side-encryption-aws-kms-key-id': '${kmsArn}' } } } ]" return $s3PolicyForKms.Replace("'",'"') } function Get-RoleAndCloudTrailS3Policy { <# .SYNOPSIS Returns customized S3 Policy to allown specified Role Arn to write CloudTrail logs to specified S3 bucket #> $s3PolicyForRoleAndCloudTrail = "{ 'Statement': [ { 'Sid': 'Allow Arn read access S3 bucket', 'Effect': 'Allow', 'Principal': { 'AWS': '${roleArn}' }, 'Action': ['s3:GetObject'], 'Resource': '$($AwsCloudResource):s3:::${bucketName}/*' }, { 'Sid': 'AWSCloudTrailAclCheck20150319', 'Effect': 'Allow', 'Principal': { 'Service': 'cloudtrail.amazonaws.com' }, 'Action': 's3:GetBucketAcl', 'Resource': '$($AwsCloudResource):s3:::${bucketName}' }, { 'Sid': 'AWSCloudTrailWrite20150319', 'Effect': 'Allow', 'Principal': { 'Service': 'cloudtrail.amazonaws.com' }, 'Action': 's3:PutObject', 'Resource': '$($AwsCloudResource):s3:::${bucketName}/AWSLogs/${callerAccount}/*', 'Condition': { 'StringEquals': { 's3:x-amz-acl': 'bucket-owner-full-control' } } }]}" return $s3PolicyForRoleAndCloudTrail.Replace("'",'"') } function New-CloudTrailS3Policy { <# .SYNOPSIS Returns customized S3 Policy for CloudTrail logs #> $s3RequiredPolicy = Get-RoleAndCloudTrailS3Policy $s3RequiredPolicyObject = $s3RequiredPolicy | ConvertFrom-Json if ($organizationCloudTrailConfirmation -ne 'n') { $s3RequiredPolicyObject.Statement += (Get-OrganizationCloudTrailS3Policy | ConvertFrom-Json) } if ($kmsConfirmation -eq 'y') { $s3RequiredPolicyObject.Statement += (Get-KmsS3Policy | ConvertFrom-Json) } return $s3RequiredPolicyObject | ConvertTo-Json -Depth 5 } function Get-EventNotificationPrefix { <# .SYNOPSIS Returns the default event notification prefix #> if ($organizationCloudTrailConfirmation -ne 'n') { return "AWSLogs/${organizationId}/" } else { return "AWSLogs/${callerAccount}/CloudTrail/" } } function Set-CloudTrailDataEventConfig { <# .SYNOPSIS Sets the CloudTrail event configuration #> $DataEventsConfirmation = Read-ValidatedHost `n'Do you want to enable the CloudTrail data events? [y/n]' -ValidationType Confirm if ($DataEventsConfirmation -eq 'y') { Write-Log -Message "Executing: aws cloudtrail put-event-selectors --trail-name $cloudTrailName --event-selectors '[{'DataResources': [{'Type':'AWS::S3::Object', 'Values': ['$($AwsCloudResource):s3:::']}]}]' | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail put-event-selectors --trail-name $cloudTrailName --event-selectors '[{\"DataResources\": [{\"Type\":\"AWS::S3::Object\", \"Values\": [\"'$($AwsCloudResource)':s3:::\"]}]}]' | Out-Null } } function Set-MultiRegionTrailConfig { <# .SYNOPSIS Configures multi-region trail capability #> $regionConfirmation = Read-ValidatedHost 'Do you want the Trail to be multi-region? [y/n]' -ValidationType Confirm if ($regionConfirmation -eq 'y') { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --is-multi-region-trail | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --is-multi-region-trail | Out-Null } else { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --no-is-multi-region-trail | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --no-is-multi-region-trail | Out-Null } } function Set-OrganizationTrailConfig { <# .SYNOPSIS Configures trail logging for the entire organization #> if ($organizationCloudTrailConfirmation -ne 'n') { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --is-organization-trail | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --is-organization-trail | Out-Null } else { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --no-is-organization-trail | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --no-is-organization-trail | Out-Null } } # *********** Main Flow *********** # Validate AWS configuration Test-AwsConfiguration Write-Log -Message "Starting CloudTrail data connector configuration script" -LogFileName $LogFileName -Severity Verbose Write-Log -Message "This script creates an Assume Role with minimal permissions to grant Azure Sentinel access to your logs in a designated S3 bucket & SQS of your choice, enable CloudTrail Logs, S3 bucket, SQS Queue, and S3 notifications." -LogFileName $LogFileName -Severity Information -LinePadding 2 Write-ScriptNotes # Add an Identity Provider if($CloudEnv -eq "Gov"){ New-OidcProvider } New-ArnRole Write-Log -Message "Executing: aws iam get-role --role-name $roleName" -LogFileName $LogFileName -Severity Verbose $roleArnObject = aws iam get-role --role-name $roleName $roleArn = ($roleArnObject | ConvertFrom-Json ).Role.Arn Write-Log -Message $roleArn -LogFileName $LogFileName -Severity Verbose New-S3Bucket Write-Log -Message "Executing: (aws sts get-caller-identity | ConvertFrom-Json).Account" -LogFileName $LogFileName -Severity Verbose $callerAccount = (aws sts get-caller-identity | ConvertFrom-Json).Account Write-Log -Message "$callerAccount" -LogFileName $LogFileName -Severity Verbose New-SQSQueue Write-Log -Message "Executing: ((aws sqs get-queue-url --queue-name $sqsName) | ConvertFrom-Json).QueueUrl" -LogFileName $LogFileName -Severity Verbose $sqsUrl = ((aws sqs get-queue-url --queue-name $sqsName) | ConvertFrom-Json).QueueUrl Write-Log -Message $sqsUrl -LogFileName $LogFileName -Severity Verbose Write-Log -Message "Executing: (aws sts get-caller-identity | ConvertFrom-Json).Account" -LogFileName $LogFileName -Severity Verbose $sqsArn = ((aws sqs get-queue-attributes --queue-url $sqsUrl --attribute-names QueueArn )| ConvertFrom-Json).Attributes.QueueArn Write-Log -Message $sqsArn -LogFileName $LogFileName -Severity Verbose $kmsConfirmation = Read-ValidatedHost -Prompt 'Do you want to enable KMS for CloudTrail? [y/n]' -ValidationType Confirm if ($kmsConfirmation -eq 'y') { New-KMS $kmsArn = ($kmsKeyDescription | ConvertFrom-Json).KeyMetadata.Arn $kmsKeyId = ($kmsKeyDescription | ConvertFrom-Json).KeyMetadata.KeyId $customMessage = "Changes CloudTrail: Kms GenerateDataKey to CloudTrail" $kmsRequiredPolicies = Get-CloudTrailKmsPolicy Update-KmsPolicy -RequiredPolicy $kmsRequiredPolicies -CustomMessage $customMessage } Update-SQSPolicy $organizationCloudTrailConfirmation = Read-ValidatedHost -Prompt 'Do you want to enable the Trail and CloudTrail S3 Policy for ALL accounts in your organization? [y/n]' -ValidationType Confirm if ($organizationCloudTrailConfirmation -eq "y") { # Retreive the organization information Write-Log -Message "Executing: ((aws organizations describe-account --account-id $callerAccount ) | ConvertFrom-Json -ErrorAction SilentlyContinue).Account.Arn.Split('/')[1]" -LogFileName $LogFileName -Severity Verbose try { $organizationId = ((aws organizations describe-account --account-id $callerAccount) | ConvertFrom-Json -ErrorAction SilentlyContinue).Account.Arn.Split('/')[1] } catch { Write-Log -Message "Unable to access AWS organization information. This could be a permissions or policy issue." -LogFileName $LogFileName -Severity Information -Indent 2 $organizationCloudTrailConfirmation = "n" } } $s3RequiredPolicy = New-CloudTrailS3Policy $customMessage = "Changes S3: Get CloudTrail notifications" Update-S3Policy -RequiredPolicy $s3RequiredPolicy -CustomMessage $customMessage $eventNotificationPrefix = Get-EventNotificationPrefix Enable-S3EventNotification -DefaultEventNotificationPrefix $eventNotificationPrefix Write-Log -Message 'CloudTrail definition' -LogFileName $LogFileName -LinePadding 2 Set-RetryAction({ $script:cloudTrailName = Read-ValidatedHost 'Please enter CloudTrail name' Write-Log -Message "Using CloudTrail name: $cloudTrailName" -LogFileName $LogFileName -Indent 2 Write-Log -Message "Executing: aws cloudtrail get-trail --name $cloudTrailName 2>&1| Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail get-trail --name $cloudTrailName 2>&1| Out-Null $isCloudTrailNotExist = $lastexitcode -ne 0 if ($isCloudTrailNotExist) { if ($kmsConfirmation -eq 'y') { Write-Log -Message "Executing: aws cloudtrail create-trail --name $cloudTrailName --s3-bucket-name $bucketName --kms-key-id $kmsKeyId --tags-list [$(Get-SentinelTagInJsonFormat)] 2>&1" -LogFileName $LogFileName -Severity Verbose $tempForOutput = aws cloudtrail create-trail --name $cloudTrailName --s3-bucket-name $bucketName --kms-key-id $kmsKeyId --tags-list [$(Get-SentinelTagInJsonFormat)] 2>&1 Write-Log -Message $tempForOutput -LogFileName $LogFileName -Severity Verbose } else { Write-Log -Message "Executing: aws cloudtrail create-trail --name $cloudTrailName --s3-bucket-name $bucketName --tags-list [$(Get-SentinelTagInJsonFormat)] 2>&1" -LogFileName $LogFileName -Severity Verbose $tempForOutput = aws cloudtrail create-trail --name $cloudTrailName --s3-bucket-name $bucketName --tags-list [$(Get-SentinelTagInJsonFormat)] 2>&1 Write-Log -Message $tempForOutput -LogFileName $LogFileName -Severity Verbose } if($lastexitcode -eq 0) { Write-Log -Message "${cloudTrailName} trail created successfully" -LogFileName $LogFileName -Indent 2 } } else { $cloudTrailBucketConfirmation = Read-ValidatedHost "Trail '${cloudTrailName}' is already configured. Do you want to override the bucket destination? [y/n]" if ($cloudTrailBucketConfirmation -eq 'y') { if ($kmsConfirmation -eq 'y') { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --s3-bucket-name $bucketName -kms-key-id $kmsKeyId | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --s3-bucket-name $bucketName -kms-key-id $kmsKeyId | Out-Null } else { Write-Log -Message "Executing: aws cloudtrail update-trail --name $cloudTrailName --s3-bucket-name $bucketName | Out-Null" -LogFileName $LogFileName -Severity Verbose aws cloudtrail update-trail --name $cloudTrailName --s3-bucket-name $bucketName | Out-Null } } else { Write-Log -Message "CloudTrail setup was not completed. You must manually updated the CloudTrail destination bucket" -LogFileName $LogFileName -LinePadding 1 } } }) Set-CloudTrailDataEventConfig Set-MultiRegionTrailConfig Set-OrganizationTrailConfig # Enable CloudTrail logging Write-Log -Message "Executing: aws cloudtrail start-logging --name $cloudTrailName" -LogFileName $LogFileName -Severity Verbose aws cloudtrail start-logging --name $cloudTrailName # Output information needed to configure Sentinel data connector Write-RequiredConnectorDefinitionInfo -DestinationTable AWSCloudTrail
combined_dataset/train/non-malicious/sample_33_31.ps1
sample_33_31.ps1
# # Module manifest for module 'OCI.PSModules.Certificatesmanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Certificatesmanagement.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c420014c-ae2b-4d3a-a11e-e78a626f134b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Certificatesmanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificatesmanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICertificatesmanagementAssociation', 'Get-OCICertificatesmanagementAssociationsList', 'Get-OCICertificatesmanagementCaBundle', 'Get-OCICertificatesmanagementCaBundlesList', 'Get-OCICertificatesmanagementCertificate', 'Get-OCICertificatesmanagementCertificateAuthoritiesList', 'Get-OCICertificatesmanagementCertificateAuthority', 'Get-OCICertificatesmanagementCertificateAuthorityVersion', 'Get-OCICertificatesmanagementCertificateAuthorityVersionsList', 'Get-OCICertificatesmanagementCertificatesList', 'Get-OCICertificatesmanagementCertificateVersion', 'Get-OCICertificatesmanagementCertificateVersionsList', 'Invoke-OCICertificatesmanagementRevokeCertificateAuthorityVersion', 'Invoke-OCICertificatesmanagementRevokeCertificateVersion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityVersionDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateDeletion', 'Invoke-OCICertificatesmanagementScheduleCertificateVersionDeletion', 'Move-OCICertificatesmanagementCaBundleCompartment', 'Move-OCICertificatesmanagementCertificateAuthorityCompartment', 'Move-OCICertificatesmanagementCertificateCompartment', 'New-OCICertificatesmanagementCaBundle', 'New-OCICertificatesmanagementCertificate', 'New-OCICertificatesmanagementCertificateAuthority', 'Remove-OCICertificatesmanagementCaBundle', 'Stop-OCICertificatesmanagementCertificateAuthorityDeletion', 'Stop-OCICertificatesmanagementCertificateAuthorityVersionDeletion', 'Stop-OCICertificatesmanagementCertificateDeletion', 'Stop-OCICertificatesmanagementCertificateVersionDeletion', 'Update-OCICertificatesmanagementCaBundle', 'Update-OCICertificatesmanagementCertificate', 'Update-OCICertificatesmanagementCertificateAuthority' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificatesmanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_46_73.ps1
sample_46_73.ps1
Import-LocalizedData -BindingVariable lnTxt -FileName AzStackHci.Network.Strings.psd1 function Test-MgmtIpRange { [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting Management IP Range")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end Management IP Range")] [System.Net.IPAddress] $EndingAddress, [int[]] $port = @(5986, 5985, 22), [int] $Timeout = 1000, [int] $Minimum = 5, [int] $Maximum = 255 ) try { $instanceResults = @() # Check same subnet $TestMgmtSubnet = TestMgmtSubnet -StartingAddress $StartingAddress -EndingAddress $EndingAddress $Status = if ($TestMgmtSubnet) { 'SUCCESS' } else { 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_Management_IP_Range_Subnet' Title = 'Test Management IP Subnet' DisplayName = "Test Management IP Subnet $StartingAddress - $EndingAddress" Severity = 'CRITICAL' Description = 'Checking start and end address are on the same subnet' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = "$StartingAddress-$EndingAddress" TargetResourceName = "ManagementIPRange" TargetResourceType = 'Network Range' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = 'CustomerNetwork' Resource = 'CustomerSubnet' Detail = if ($TestMgmtSubnet) { $lnTxt.TestMgmtSubnetPass -f $StartingAddress, $EndingAddress } else { $lnTxt.TestMgmtSubnetFail -f $StartingAddress, $EndingAddress } Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Check range size $TestMgmtRangeSize = TestMgmtRangeSize -StartingAddress $StartingAddress -EndingAddress $EndingAddress -Minimum $Minimum -Maximum $Maximum $status = if ($TestMgmtRangeSize) { 'SUCCESS' } else { 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_Management_IP_Range_Size' Title = 'Test Management IP Range Size' DisplayName = "Test Management IP Range Size $StartingAddress - $EndingAddress" Severity = 'CRITICAL' Description = "Checking management IP range size is between $minimum-$maximum" Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = "$StartingAddress-$EndingAddress" TargetResourceName = "ManagementIPRange" TargetResourceType = 'Network Range' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = 'CustomerNetwork' Resource = 'CustomerRange' Detail = if ($TestMgmtRangeSize) { $lnTxt.TestMgmtRangeSizePass -f $Minimum, $Maximum } else { $lnTxt.TestMgmtRangeSizeFail -f $Minimum, $Maximum } Status = if ($TestMgmtRangeSize) { 'SUCCESS' } else { 'FAILURE' } TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Get IP in Range $MgmtIpRange = GetMgmtIpRange -StartingAddress $StartingAddress -EndingAddress $EndingAddress foreach ($Ip in $MgmtIpRange) { $result = @{} $result += @{ 'Ping' = Test-NetConnection -ComputerName $Ip -InformationLevel Quiet -WarningAction SilentlyContinue } foreach ($p in $port) { $result += @{ $p = IsTcpPortInUse -Ip $ip -Port $p -Timeout $Timeout } } $Status = if ($true -notin $result.Values) { 'SUCCESS' } else { 'FAILURE' } $msg = $lnTxt.ActiveHostCheck -f $ip, (($result.Keys | ForEach-Object { "{0}:{1}" -f $psitem,$result[$psitem] }) -join ', ') $Type = if ($result.Values -contains $true) { 'WARNING' } else { 'INFORMATIONAL' } Log-Info $msg -Type $Type $params = @{ Name = 'AzStackHci_Network_Test_Management_IP_No_Active_Hosts' Title = 'Test Management IP Range for Active Hosts' DisplayName = "Test Management IP Range $Ip for Active Hosts" Severity = 'CRITICAL' Description = 'Checking no hosts respond on Management IP range' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = $Ip TargetResourceName = "ManagementIPRange" TargetResourceType = 'Network Range' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $Ip Resource = 'ICMP/SSH/WINRM' Detail = ($result.Keys | ForEach-Object { "{0}:{1}" -f $psitem,$result[$psitem] }) -join ', ' Status = $Status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params } return $instanceResults } catch { throw $_ } } # Run during both Deployment and AddNode # 1. Mgmt NIC IP should not be overlapping with IP Pool # 2. Ensure Mgmt NIC IPs and IP Pool are in the same subnet function TestDHCPStatus { [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting infra IP Range for DHCP")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end infra IP Range for DHCP")] [System.Net.IPAddress] $EndingAddress, [System.Management.Automation.Runspaces.PSSession[]] $PsSession ) try { $instanceResults = @() $AdditionalData = @() foreach ($session in $PsSession) { $sb = { $env:COMPUTERNAME ( Get-NetIPConfiguration | Where-Object { $_.IPv4DefaultGateway -ne $null -and $_.NetAdapter.Status -eq "Up" } ).IPv4Address.IPAddress } $NewNodeData = Invoke-Command $session -ScriptBlock $sb $NodeName = $NewNodeData[0] # Check for all of the IPs found on the Host for ($i = 1; $i -lt $NewNodeData.count; $i++) { $NodeManagementIPAddress = $NewNodeData[$i] Log-Info "Node Name retrieved from session: $NodeName" Log-Info "Node Management IP Address retrieved from session: $NodeManagementIPAddress" # Check node management IP is not in infra pool range Log-Info "Starting Test Mgmt IP is not in Infra IP Pool for $($session.ComputerName)" $ip = [system.net.ipaddress]::Parse($NodeManagementIPAddress).GetAddressBytes() [array]::Reverse($ip) $ip = [system.BitConverter]::ToUInt32($ip, 0) $from = [system.net.ipaddress]::Parse($StartingAddress).GetAddressBytes() [array]::Reverse($from) $from = [system.BitConverter]::ToUInt32($from, 0) $to = [system.net.ipaddress]::Parse($EndingAddress).GetAddressBytes() [array]::Reverse($to) $to = [system.BitConverter]::ToUInt32($to, 0) $mgmtIPOutsideRange = ($ip -le $from) -or ($ip -ge $to) if ($mgmtIPOutsideRange) { $TestMgmtIPInfraRangeDetail = $lnTxt.TestMgmtIPInfraRangePass -f $NodeManagementIPAddress, $StartingAddress, $EndingAddress } else { $TestMgmtIPInfraRangeDetail = $lnTxt.TestMgmtIPInfraRangeFail -f $NodeManagementIPAddress, $StartingAddress, $EndingAddress Log-Info $TestMgmtIPInfraRangeDetail -Type Warning } $status = if ($mgmtIPOutsideRange) { 'SUCCESS' } else { 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_New_DHCP_Validity_Infra_Pool' Title = 'Test DHCP Configuration Validity Mgmt IP Infra Pool' DisplayName = "Test DHCP Configuration Validity Mgmt IP Infra Pool" Severity = 'CRITICAL' Description = 'Checking Mgmt IPs are not in Infra IP Pool' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = "$StartingAddress-$EndingAddress" TargetResourceName = "DHCPDeploymentConfiguration" TargetResourceType = 'DHCPConfiguration' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $session.ComputerName Resource = 'DHCPNodeManagementIP' Detail = $TestMgmtIPInfraRangeDetail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params $TestMgmtSubnet = TestMgmtSubnet -StartingAddress $NodeManagementIPAddress -EndingAddress $EndingAddress $status = if ($TestMgmtSubnet) { 'SUCCESS' } else { 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_New_DHCP_Validity_Infra_Subnet' Title = 'Test DHCP Configuration Validity Mgmt IP Infra Subnet' DisplayName = "Test DHCP Configuration Validity Mgmt IP Infra Subnet" Severity = 'CRITICAL' Description = 'Checking Mgmt IPs are in same subnet as infra IP Pool' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = "$StartingAddress-$EndingAddress" TargetResourceName = "DHCPDeploymentConfiguration" TargetResourceType = 'DHCPConfiguration' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$($session.ComputerName)AndCustomerNetwork" Resource = 'DHCPNodeManagementIPAndCustomerSubnet' Detail = if ($TestMgmtSubnet) { $lnTxt.TestMgmtSubnetPass -f $NodeManagementIPAddress, $EndingAddress } else { $lnTxt.TestMgmtSubnetFail -f $NodeManagementIPAddress, $EndingAddress } Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params } } return $instanceResults } catch { throw $_ } } # Initial tests to determine if Mgmt IP of new Node is OK # Below Tests are for Static IP Allocation (Non-DHCP) function TestMgmtIPForNewNode { [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting infra IP Range")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end infra IP Range")] [System.Net.IPAddress] $EndingAddress, [System.Management.Automation.Runspaces.PSSession] $PsSession, [Hashtable] $NodeToManagementIPMap, [String] $FirstAdapterName, [String] $IntentName ) try { $sb = { $env:COMPUTERNAME ( Get-NetIPConfiguration | Where-Object { $_.IPv4DefaultGateway -ne $null -and $_.NetAdapter.Status -eq "Up" } ).IPv4Address.IPAddress } $NewNodeData = Invoke-Command $PsSession -ScriptBlock $sb $NodeName = $NewNodeData[0] $NodeManagementIPAddress = $NewNodeData[1] Log-Info "Node Name retrieved from PSSession: $NodeName" Log-Info "Node Management IP Address retrieved from PSSession: $NodeManagementIPAddress" # Check node management IP is not in infra pool range Log-Info "Starting Test Mgmt IP is not in Infra IP Pool for $($psSession.ComputerName)" $ip = [system.net.ipaddress]::Parse($NodeManagementIPAddress).GetAddressBytes() [array]::Reverse($ip) $ip = [system.BitConverter]::ToUInt32($ip, 0) $from = [system.net.ipaddress]::Parse($StartingAddress).GetAddressBytes() [array]::Reverse($from) $from = [system.BitConverter]::ToUInt32($from, 0) $to = [system.net.ipaddress]::Parse($EndingAddress).GetAddressBytes() [array]::Reverse($to) $to = [system.BitConverter]::ToUInt32($to, 0) $instanceResults = @() $AdditionalData = @() $mgmtIPOutsideRange = ($ip -le $from) -or ($ip -ge $to) if ($mgmtIPOutsideRange) { $TestMgmtIPInfraRangeDetail = $lnTxt.TestMgmtIPInfraRangePass -f $NodeManagementIPAddress, $StartingAddress, $EndingAddress $status = 'SUCCESS' } else { $TestMgmtIPInfraRangeDetail = $lnTxt.TestMgmtIPInfraRangeFail -f $NodeManagementIPAddress, $StartingAddress, $EndingAddress Log-Info $TestMgmtIPInfraRangeDetail -Type Warning $status = 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_New_Node_Validity_Outside_Mgmt_Range' Title = 'Test New Node Configuration Outside Management Range' DisplayName = "Test New Node Configuration Outside Management Range" Severity = 'CRITICAL' Description = 'Checking New Node IP' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = $NodeManagementIPAddress TargetResourceName = "IPAddress" TargetResourceType = 'IPAddress' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $NodeName Resource = 'NewNodeManagementIP' Detail = $TestMgmtIPInfraRangeDetail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Check that no management IPs are the same (Mgmt IP shouldn't conflict with existing node) Log-Info "Starting Test for No Mgmt IPs are the same for any Nodes" $duplicateIPs = $false $numDuplicates = $NodeToManagementIPMap.GetEnumerator() | Group-Object Value | ? { $_.Count -gt 1 } if ($numDuplicates -ne $null) { $duplicateIPs = $true Log-Info 'Duplicate IPs found for Node Management IPs' -Type Warning } if ($duplicateIPs) { $dtl = 'Duplicate IPs found for Node Management IPs' $status = 'FAILURE' } else { $dtl = 'No Duplicate IPs found for Node Management IPs' $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_Network_Test_New_Node_Validity_Duplicate_IP' Title = 'Test New Node Configuration Duplicate IP' DisplayName = "Test New Node Configuration Duplicate IP" Severity = 'CRITICAL' Description = 'Checking New Node IP is not a duplicate' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = $NodeManagementIPAddress TargetResourceName = "IPAddress" TargetResourceType = 'IPAddress' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = 'NodeAndManagementIPMapping' Resource = 'NodeManagementIPs' Detail = $dtl Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Check that host name exists, and the name and mgmt IP both match current node Log-Info "Starting Test to check if Mgmt IP is on a different node as $NodeName" Log-Info "Starting simultaneous Test to check if HostName and Mgmt IP Match for $NodeName" $ipOnAnotherNode = $false $NodeNameAndIPMatches = $false $nodeNameForIP = $null foreach ($NodeIP in $NodeToManagementIPMap.GetEnumerator()) { Write-Host "$($NodeIP.Name): $($NodeIP.Value)" if ($NodeIP.Name -eq $NodeName) { if ($NodeIP.Value -eq $NodeManagementIPAddress) { $NodeNameAndIPMatches = $true $nodeNameForIP = $NodeIP.Name } } else { if ($NodeIP.Value -eq $NodeManagementIPAddress) { $ipOnAnotherNode = $true $nodeNameForIP = $NodeIP.Name } } } if ($ipOnAnotherNode) { $CheckMgmtIPNotOnOtherNodeDetail = $lnTxt.CheckMgmtIPNotOnOtherNodeFail -f $NodeManagementIPAddress, $nodeNameForIP Log-Info $CheckMgmtIPNotOnOtherNodeDetail -Type Warning } else { $CheckMgmtIPNotOnOtherNodeDetail = $lnTxt.CheckMgmtIPNotOnOtherNodePass -f $NodeManagementIPAddress, $nodeNameForIP } $status = if ($ipOnAnotherNode) { 'FAILURE' } else { 'SUCCESS' } $params = @{ Name = 'AzStackHci_Network_Test_New_Node_Validity_IP_Conflict' Title = 'Test New Node Configuration Conflicting IP' DisplayName = "Test New Node Configuration Conflicting IP" Severity = 'CRITICAL' Description = 'Checking New Node IP is not on another node' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = $NodeManagementIPAddress TargetResourceName = "IPAddress" TargetResourceType = 'IPAddress' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = 'NodeAndManagementIPMapping' Resource = 'NodeNameAndManagementIP' Detail = $CheckMgmtIPNotOnOtherNodeDetail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params if ($NodeNameAndIPMatches) { $CheckMgmtIPOnNewNodeDetail = $lnTxt.CheckMgmtIPOnNewNodePass -f $NodeManagementIPAddress, $nodeNameForIP $status = 'SUCCESS' } else { $CheckMgmtIPOnNewNodeDetail = $lnTxt.CheckMgmtIPOnNewNodeFail -f $NodeManagementIPAddress, $nodeNameForIP Log-Info $CheckMgmtIPOnNewNodeDetail -Type Warning $status = 'FAILURE' } $params = @{ Name = 'AzStackHci_Network_Test_New_Node_And_IP_Match' Title = 'Test New Node Configuration Name and IP Match' DisplayName = "Test New Node Configuration Name and IP Match" Severity = 'CRITICAL' Description = 'Checking New Node Name and IP match' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-prerequisites#network-requirements' TargetResourceID = $NodeManagementIPAddress TargetResourceName = "IPAddress" TargetResourceType = 'IPAddress' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = 'NodeAndManagementIPMapping' Resource = 'NewNodeNameAndManagementIP' Detail = $CheckMgmtIPOnNewNodeDetail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Check that New Node has the first physical adapter and the physical adapter has the mgmt IP Log-Info "Starting Test to see if $FirstAdapterName on $NodeName has the correct Mgmt IP" $adapterSB = { param($adapterName) $returnDict = @{} $returnDict["GetNetIPAddressOutput"] = Get-NetIPAddress $returnDict["GetNetAdapterOutput"] = Get-NetAdapter $AdapterIPObject = Get-NetIPAddress -InterfaceAlias $adapterName -AddressFamily IPv4 -ErrorAction SilentlyContinue if ($AdapterIPObject -eq $null) { $returnDict["Result"] = $false $returnDict["AdapterName"] = $adapterName return $returnDict } $returnDict["Result"] = $true $returnDict["AdapterName"] = $adapterName $returnDict["AdapterIP"] = $AdapterIPObject.IPAddress return $returnDict } $AdapterContainsMgmtIP = $false $physicalAdapterExists = $false $VirtualNICName = "vManagement($IntentName)" try { $NewNodeAdapterData = Invoke-Command $PsSession -ScriptBlock $adapterSB -ArgumentList $FirstAdapterName Log-Info "Data found for New Node Adapter ($FirstAdapterName): $($NewNodeAdapterData | Out-String)" if ($NewNodeAdapterData['Result'] -eq $false) { Log-Info "Physical Adapter Not Found" Log-Info "Get-NetIPAddress output: $($NewNodeAdapterData['GetNetIPAddressOutput'] | Out-String)" Log-Info "Get-NetAdapter output: $($NewNodeAdapterData['GetNetAdapterOutput'] | Out-String)" } elseif ($NewNodeAdapterData['Result'] -eq $true -and $NewNodeAdapterData['AdapterIP'] -eq $NodeManagementIPAddress) { Log-Info "Physical Adapter found with Correct IP: $($NewNodeAdapterData['AdapterIP'] | Out-String)" $physicalAdapterExists = $true $AdapterContainsMgmtIP = $true $CheckAdapterContainsIPDetail = $lnTxt.CheckAdapterContainsIPPass -f $FirstAdapterName, $NodeManagementIPAddress } else { Log-Info "Physical Adapter found but with incorrect IP" Log-Info "Get-NetIPAddress output: $($NewNodeAdapterData['GetNetIPAddressOutput'] | Out-String)" Log-Info "Get-NetAdapter output: $($NewNodeAdapterData['GetNetAdapterOutput'] | Out-String)" } # In certain cases, new node will be set up with the vNIC instead and need to check that for mgmt IP if (!$physicalAdapterExists) { Log-Info "Physical Adapter does not exist or mgmt IP is wrong. Checking Virtual Adapter" -Type Warning $NewNodeVirtualAdapterData = Invoke-Command $PsSession -ScriptBlock $adapterSB -ArgumentList $VirtualNICName Log-Info "Data found for New Node Virtual Adapter ($VirtualNICName): $($NewNodeVirtualAdapterData | Out-String)" if ($NewNodeVirtualAdapterData['Result'] -eq $false) { Log-Info "Virtual Adapter Not Found" Log-Info "Get-NetIPAddress output: $($NewNodeVirtualAdapterData['GetNetIPAddressOutput'] | Out-String)" Log-Info "Get-NetAdapter output: $($NewNodeVirtualAdapterData['GetNetAdapterOutput'] | Out-String)" } elseif ($NewNodeVirtualAdapterData['Result'] -eq $true -and $NewNodeVirtualAdapterData['AdapterIP'] -eq $NodeManagementIPAddress) { Log-Info "Virtual Adapter found with Correct IP: $($NewNodeVirtualAdapterData['AdapterIP'] | Out-String)" $AdapterContainsMgmtIP = $true $CheckAdapterContainsIPDetail = $lnTxt.CheckAdapterContainsIPPass -f $VirtualNICName, $NodeManagementIPAddress } else { Log-Info "Virtual Adapter found but with incorrect IP" Log-Info "Get-NetIPAddress output: $($NewNodeVirtualAdapterData['GetNetIPAddressOutput'] | Out-String)" Log-Info "Get-NetAdapter output: $($NewNodeVirtualAdapterData['GetNetAdapterOutput'] | Out-String)" } } } catch { Log-Info "Exception thrown when checking New Node Adapter: $_" -Type Warning } if (!$AdapterContainsMgmtIP) { $CheckAdapterContainsIPDetail = $lnTxt.CheckAdapterContainsIPFail -f $FirstAdapterName, $VirtualNICName, $NodeManagementIPAddress Log-Info $CheckAdapterContainsIPDetail -Type Warning $status = 'FAILURE' } else { $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_Network_Test_New_Node_First_Adapter_Validity' Title = 'Test New Node Configuration First Network Adapter has Mgmt IP' DisplayName = "Test New Node Configuration First Network Adapter has Mgmt IP" Severity = 'CRITICAL' Description = 'Checking New Node first adapter has mgmt IP' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-checklist' TargetResourceID = $NodeManagementIPAddress TargetResourceName = $FirstAdapterName TargetResourceType = 'Network Adapter' Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = 'NewNodeAdapter' Resource = 'NewNodeAdapterIP' Detail = $CheckAdapterContainsIPDetail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params return $instanceResults } catch { throw $_ } } function TestMgmtSubnet { <# .SYNOPSIS Ensure Start and End IPs are on the same subnet. #> param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting Management IP Range")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end Management IP Range")] [System.Net.IPAddress] $EndingAddress ) try { $start = $StartingAddress -replace "\.[0-9]{1,3}$", "" $end = $EndingAddress -replace "\.[0-9]{1,3}$", "" if ($start -eq $end) { Log-info "Subnet start: $start and end: $end" return $true } else { return $false } } catch { throw "Failed to check subnet. Error: $_" } } function GetMgmtIpRange { param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting Management IP Range")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end Management IP Range")] [System.Net.IPAddress] $EndingAddress ) try { $first3 = $StartingAddress -replace "\.[0-9]{1,3}$", "" $start = $StartingAddress -split "\." | Select-Object -Last 1 $end = $EndingAddress -split "\." | Select-Object -Last 1 $range = $start..$end | ForEach-Object { ([System.Net.IPAddress]("{0}.{1}" -f $first3, $PSITEM)).IPAddressToString } Log-info "Start: $start and end: $end gives range: $($range -join ',')" return $range } catch { throw "Failed to get Mgmt range. Error: $_" } } function TestMgmtRangeSize { <# .SYNOPSIS Ensure IP range is within boundaries. #> param ( [Parameter(Mandatory = $false, HelpMessage = "Specify starting Management IP Range")] [System.Net.IPAddress] $StartingAddress, [Parameter(Mandatory = $false, HelpMessage = "Specify end Management IP Range")] [System.Net.IPAddress] $EndingAddress, [int] $Minimum = 5, [int] $Maximum = 16 ) try { $start = $StartingAddress -split "\." | Select-Object -Last 1 $end = $EndingAddress -split "\." | Select-Object -Last 1 $hostCount = ($start..$end).count Log-info "Start: $start and end: $end gives host count: $hostcount" if ($hostCount -gt $Maximum -or $hostCount -lt $Minimum) { return $false } else { return $true } } catch { throw "Failed to check range size. Error: $_" } } function IsTcpPortInUse { param( [System.Net.IPAddress] $Ip, [int] $Port = 5986, [int] $Timeout = 500 ) try { $tcpClient = New-Object System.Net.Sockets.TcpClient $portOpened = $tcpClient.ConnectAsync($ip, $p).Wait($timeout) $tcpClient.Dispose() return ($portOpened -contains $true) } catch { throw "Failed to check TCP ports. Error: $_" } } function TestNetworkIntentStatus { <# .SYNOPSIS This test is run in the AddNode context only. This test validates if the intents configured on the existing cluster and the new node to be added are not in errored state. .DESCRIPTION This test performs the following Validations: 1) Check the ATC Intent status on existing nodes are successfully allocated 2) Check if NetworkATC service is running on the new node 3) Check if the existing nodes have storage intent configured in them. .PARAMETERS [System.Management.Automation.Runspaces.PSSession] $PsSession #> [CmdletBinding()] param ( [System.Management.Automation.Runspaces.PSSession] $PsSession ) try { Log-Info "Checking ATC Intent status on existing nodes and if NetworkATC service is running on the new node." $instanceResults = @() $AdditionalData = @() # Get the names of all nodes with an Up Status $activeNodes = (Get-ClusterNode | Where-Object {$_.State -eq "Up"}).Name Log-Info "Active nodes: $($activeNodes | Out-String)" # Get all intents on the active nodes $intents = Get-NetIntentStatus | Where-Object {$activeNodes -contains $_.Host} # Checks the intent status on the existing nodes. foreach ($intent in $intents) { $intentHealthy = $true if ($intent.ConfigurationStatus -ne "Success" -or $intent.ProvisioningStatus -ne "Completed") { $intentHealthy = $false $TestNetworkIntentStatusDetail = $lnTxt.TestNetworkIntentStatusFail -f $intent.Host, $intent.ConfigurationStatus, $intent.ProvisioningStatus Log-Info $TestNetworkIntentStatusDetail -Type Warning } else { $intentHealthy = $true $TestNetworkIntentStatusDetail = $lnTxt.TestNetworkIntentStatusPass -f $intent.Host, $intent.ConfigurationStatus, $intent.ProvisioningStatus } $params = @{ Name = 'AzStackHci_Network_Test_Network_AddNode_Intent_Status' Title = 'Test Network intent on existing nodes' DisplayName = 'Test Network intent on existing nodes' Severity = 'CRITICAL' Description = 'Checking if Network intent is unhealthy on existing nodes' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-checklist' TargetResourceID = 'NetworkIntent' TargetResourceName = 'NetworkIntent' TargetResourceType = 'NetworkIntent' Timestamp = [datetime]::UtcNow Status = if ($intentHealthy) { 'SUCCESS' } else { 'FAILURE' } AdditionalData = @{ Source = $intent.Host Resource = 'AddNodeIntentStatusCheck' Detail = $TestNetworkIntentStatusDetail Status = if ($intentHealthy) { 'SUCCESS' } else { 'FAILURE' } TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params } Log-Info "Checking if the storage intent is configured on the existing cluster before add node." $storageIntent = $intents | Where-Object {$_.IsStorageIntentSet -eq $true} try { $source = Get-Cluster } catch { $source = $Env:COMPUTERNAME Log-Info "Error getting the cluster, we could be running this test in standalone mode on $($source)" } if ($null -eq $storageIntent) { $TestNetworkIntentStatusDetail = $lnTxt.TestStorageIntentNotConfigured -f $source Log-Info $TestNetworkIntentStatusDetail -Type Warning } else { $TestNetworkIntentStatusDetail = $lnTxt.TestStorageIntentConfigured -f $source Log-Info $TestNetworkIntentStatusDetail -Type Success } $params = @{ Name = 'AzStackHci_Network_Test_Network_AddNode_Storage_Intent' Title = 'Test Storage intent on existing nodes' DisplayName = 'Test Storage intent on existing nodes' Severity = 'CRITICAL' Description = 'Check if the storage intent is configured on the existing cluster before add node' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-checklist' TargetResourceID = 'StorageIntent' TargetResourceName = 'StorageIntent' TargetResourceType = 'StorageIntent' Timestamp = [datetime]::UtcNow Status = if ($null -eq $storageIntent) { 'FAILURE' } else { 'SUCCESS' } AdditionalData = @{ Source = $source Resource = 'AddNodeStorageIntentCheck' Detail = $TestNetworkIntentStatusDetail Status = if ($null -eq $storageIntent) { 'FAILURE' } else { 'SUCCESS' } TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params # Check if NetworkATC service is running on the new node $sb = { $retVal = New-Object psobject -Property @{ Pass = $true Status = [string]::Empty } $atcFeature = Get-WindowsFeature -Name NetworkATC if ($atcFeature.Installstate -eq "Installed") { $atcService = Get-Service NetworkATC -ErrorAction SilentlyContinue $retVal.Status = "Feature Installed Service $($atcService.Status)" } elseif ($atcFeature.Installstate -eq "Available") { $retVal.Status = "Feature Available" } else { $retVal.Pass = $false } return $retVal } $NetworkATCStatus = Invoke-Command $PsSession -ScriptBlock $sb $ATCStatusHealthy = $true if (!$NetworkATCStatus.Pass) { # NetworkATC feature not Installed, not Available on the system $ATCStatusHealthy = $false $TestNetworkATCServiceDetail = $lnTxt.TestNetworkATCFeatureNotInSystem -f $psSession.ComputerName Log-Info $TestNetworkATCServiceDetail -Type Warning } elseif (-not (($NetworkATCStatus.Status -eq 'Feature Installed Service Running') -or ($NetworkATCStatus.Status -eq 'Feature Available'))) { # NetworkATC feature installed but service not 'Running', or feature not available $ATCStatusHealthy = $false $TestNetworkATCServiceDetail = $lnTxt.TestNetworkATCFeatureServiceStatus -f $NetworkATCStatus.Status, $psSession.ComputerName Log-Info $TestNetworkATCServiceDetail -Type Warning } else { $ATCStatusHealthy = $true $TestNetworkATCServiceDetail = $lnTxt.TestNetworkATCFeatureServiceStatus -f $NetworkATCStatus.Status, $psSession.ComputerName Log-Info $TestNetworkATCServiceDetail -Type Success } $params = @{ Name = 'AzStackHci_Network_Test_Network_AddNode_NetworkATC_Service' Title = 'Test NetworkATC service is running on new node' DisplayName = 'Test NetworkATC service is running on new node' Severity = 'CRITICAL' Description = 'Check NetworkATC service is running on new node' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-checklist' TargetResourceID = 'NetworkATCService' TargetResourceName = 'NetworkATCService' TargetResourceType = 'NetworkATCService' Timestamp = [datetime]::UtcNow Status = if ($ATCStatusHealthy) { 'SUCCESS' } else { 'FAILURE' } AdditionalData = @{ Source = $PsSession.ComputerName Resource = 'AddNodeNewNodeNetworkATCServiceCheck' Detail = $TestNetworkATCServiceDetail Status = if ($ATCStatusHealthy) { 'SUCCESS' } else { 'FAILURE' } TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } $instanceResults += New-AzStackHciResultObject @params return $instanceResults } catch { throw $_ } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCHWuADl/1ZVFa3 # vPAMCKnnG4aQgIo98fPpCajZf30T66CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMx9sPO0gfeDDw7zD4Nz5eF5 # d6ofP2GnENVm/UtG5bN2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqMFb35zjupmf+0btyRp61rfaR9pDzgcJkSyiXeJwHSx2sTG69ZSB754d # J+Ic3reXY3Pskdy3iGixIh4VEe/3VJFn5gEwvxP6we1o4Fiac0+NwyV/YZ1GIllv # LLQDKfjwAsFVTy1/h7pWom56UhY3f95GynBJl79UQ5MS4INKwjC2Xj2uc09Kbo4C # m8qp0nOFUTCScacfZqKvjhHf9KZbzAhe1UnFkMhzphKYVvXKBBFnM3kk8edDDWPJ # yFFocqkBout5ACV3lninzCgO291rK0TENVPKyUWJb2k/Jx3Y7JRA24Hb1PS58ZPV # oRAyE6PqcADCsENZH43fuc+a61Vkl6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAZwFw6zxRMdSz1RuSj8e6edKfRGfRJZqdtq0KcNJ4LqgIGZbqeuloi # GBMyMDI0MDIxMjE0MDY1MS45MzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl0RNYwIhgPMjAyNDAyMTIxNTE4NDZaGA8yMDI0MDIxMzE1MTg0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XRE1gIBADAKAgEAAgIBRwIB/zAHAgEAAgISkjAK # AgUA6XWWVgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEHMH8eDwQ5UEvYI # N/9Kq6PkMHM1J4YpUps7G5vN9ACEiNOyRzo1u51vINRVtW35RkXd/FwSJxwy2FsB # v/D0WmPV4Zm4NoWqDnB/Dpb4oBYpgmXmXTcFHbPKZldyI3/XMMJxnSLiJ6zmzbCt # mhPIujUMoFKQpSrn7wOflyWjp5aaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgBLjaUWDGsyUXn6q8bnunn3ZTauqlZbBlptN3guTZSvQwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIDnRr0iTxo7N39RYkJQjNKgSUzMlqo106/A0RY2l # 63UJMA0GCSqGSIb3DQEBCwUABIICAJBbrHUsdYpj2ppZVxBACRRi93cx8iJpleI7 # DLEWdJPvGgZHfOCOKp4DAf6r/acJm2FjVNzeoW8VWt0ujI2HVjFHiTAOkDrOkEkQ # Axv5iHwOPb0iJIQN2bseREz3mHUFdQVYqMFF55le3Px68k2KWZuu/njVLJP7MojE # u2AdFocOkXVPuaNpvt4sLGSQu/PC8FYoBTttW1xf1Y1yBPQVTZAaVEosMzNyo3GU # y7f1d06ZmxXIluiQZvU4yuQJoPNXOxAw7LGPRdKFNRNIISyFVr2ksHrwaCMksPWb # zwpa2UQT37vq0GIFNdB6qRMWrbx9x7UKS/nge7Vg7izrrLZ0o9L8k2RW1+lkHZm3 # XUXmlsuMnsYfAx3JChUrJYwTAsyp0KCggvTAzKKMOvwZZxI+94hDF680NtzgXXsN # IWngqNjh4e/KoC5FHz3MrEmZPxx18SJHRvgsbP9chGPMxw/EqLrAtndind0tH1I7 # IL+II1Rm7ZkuQoOQrTo3gTo5CmKtNZq4furFx8l1jRbdtt37Zti6tltxyvVGMNgw # on7wF+9evk5o4VZiTqbo3Lt3+JyOowQ+KqXJS4kLbrxD0DjaCBPrr6wAYFaElsGu # HXYpBryIZunWnu7g5fD14BlLM3c7HPlHi9Zcrk1lVn8D8zyTzXVwJ9zNHj3xIKlB # kYs3dwdb # SIG # End signature block
combined_dataset/train/non-malicious/sample_55_94.ps1
sample_55_94.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2023 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> # Suppress irrelevant PS Script Analyzer warnings (trailing Param() is needed to help PSSA parse the file) [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] Param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Get-IntelEthernetProfileSetting { [CmdletBinding()] Param( [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null, [parameter(Mandatory = $true, Position = 1)] [ValidateNotNullOrEmpty()] [ValidateSet("Standard Server", "Web Server", "Storage Server", "Virtualization Server (Hyper-V*)", "Low Latency", "Storage + Virtualization")] [String] $ProfileName = '' ) Begin { $AdapterName = $Name $script:ErrorMessagesProfile = @() $script:WarningMessagesProfile = @() $FinalObject = @() GetIntelEthernetDevices $script:MSNetAdvProperty = Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateSetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesProfile) $AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesProfile)) do { foreach ($a in $AdapterNamesArray) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesProfile += $TmpStatusMsg } # Check if passed in Profile is in DescriptionMap $ProfileSetting = InitializeProfileSetting $a if ( (-not [string]::IsNullOrEmpty($ProfileName)) -and ($ProfileName -in $ProfileSetting.DescriptionMap) ) { $FinalObject += GetAdapterProfiles $a $ProfileName } else { $script:ErrorMessagesProfile += $Messages.NoProfileSupport -f $a } } } while ($false) } End { $FinalObject foreach ($WarningMessage in $script:WarningMessagesProfile) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesProfile) { Write-Error $ErrorMessage } } } function GetAdapterProfiles($AdapterName, $ProfileName) { $DriverFamily = $script:SupportedAdapters.Where({ $_.Name -eq $AdapterName }).Service $ProfileSettings = @() $tmp = GetProfileSettingsFromXml $ProfileName $DriverFamily $ProfileSettings = $tmp.GetEnumerator().ForEach({ GetProfileSetting $AdapterName $($_.Key) $($_.Value) }) return $ProfileSettings | Sort-Object -Property DisplayName } function GetProfileSetting() { Param ( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $AdapterName, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $RegistryKeyword, [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $RegistryValue ) $Setting = GetAdapterSettings $AdapterName $null $RegistryKeyword $Setting.RegistryValue = $RegistryValue $Setting.CurrentValue = $RegistryValue if ($null -eq $Setting.DescriptionMap) { # int type setting $Setting.DisplayValue = $RegistryValue } else { # enum type setting $Setting.DisplayValue = $Setting.DescriptionMap.GetValue($Setting.PossibleValues.IndexOf($RegistryValue)) } return $Setting } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJlw60p11Whp62 # cPn6Y4vr9KhO9/CyZJ5z6FRjIZ9ObaCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIBFsWeTtvs+phR+vFLcbiuIP # jml8Nr8RvSw4rALrtat6MA0GCSqGSIb3DQEBAQUABIIBgLH8HrQPPnCs2jV1lioz # Md5N9YpurT3DDqy5i6cSASdrRx4kT/nOvk2m9DAAOkqphNw8UbSd2KN5X/yJV+UR # mURh18mVk2xxPr1yNkpm0W5J1xjOR+739NBd/tNCspAVyzOR4lNdnpdXIqsciLFS # DKu6MQ+XgSVjg1lfERa+xcVWVW3JuYJhCq0YNfmZ+dqDUwOx8CsMMTHch3oQdLoc # 0HM+QqYsxJCftdiZyOPhJaNV7u4t0FqMdEM7FC6uvy1Gl8W76E7GxPv7+ZMkUajS # ndSaoKRf8FxTV6jIaYC5OlG57G0PxFn9Ouk+I7Cev0GWM10SZPoo/+akOuxbrFye # 8wGWyuxhpInDbcQdVsBsU5WZIJjon4sAkp/UmqARv4H5NzFgl/qYvyj7JVmQPt7J # 5Fxts4upCsf9lV3SvB225+W+w3Wrq104jAPeHk/pXJYBVl7L8tQZdc2OkWz89Vv1 # 0XdFDRT0Re/UDg9FYqSlr3BIMllUL5+IUhw7z7WkICv5oKGCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEII0r6snihjsYPQUKBAJW7X8wS1NwmqqHs+lgolTIDqo4 # AhUA2ZKRtEQYXIgvkuiIIDYUqPSO5KYYDzIwMjQwMzE4MTgyMzUyWqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDMxODE4MjM1MlowPwYJKoZIhvcNAQkEMTIEMI4bp/xsuMVVrj8JIgKH # PAJ0N7wF3Q0x662fr80CyrKiozDlzRY4jko2a6HwOybZTjCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgCUs+u2ZRXQuH94DOwiEwb+2Twqlz8wECM9AcPUvUoaa1yAqKSRFC0FpbYx # efjBzOi2iqX/iW2h8R1KkXgS3pww9MWLPdPnscovDzLOjsdbsPJIEch6je8OTo4Y # VIbVi9G6oJWlfsvqUCurgopwOXuaLCCtTqmtJg9c+/70doDzY/aZPk5tiQ1KV5gq # RkMYhIyeczonGKm4dPPJ4x98qsgT6t2e4tcmot9N6/V2sw2a9/IXHsOPTUtjE53G # twHydtedYY78ocCoUD/twL2fedcQtCw2geaXEtkVfGhWne5NCpOCiQkfnULtq7rD # 9RC8PoRvj7sL5Zftjh69LwUfsNJrm4ehK2n+HvJegp/Bu4ccRWHv+NX9HcPC7Xpk # gUl6nzDgST99MQpBVGIgqThYoRv6lMseGgYQtnnCH2xa1ieGygbDRcCpK8CqkbLr # 5TGIyE2uvJ7Xaim6ZLrccLe+Vj3QEkMXwEe/+SWcbevWide2nNi9qyVKEkLxAQPJ # //x4YPbW4sFLlz7AXHg/5rON6zzSWoiMwo23BSt7BkMflRxe9Lv2zV0Mhmcc4js4 # OtDnW0E0u2FQaz/AVtp+u8lfub/bP5m6y3dO1HgBiLWW3AFgYvy5fUcDjfXczMuQ # vzAhcENNmzv5luUu/WSDZYEJF0rJ1hLN/V+BGiLVRbx6f7yiHg== # SIG # End signature block
combined_dataset/train/non-malicious/Findup_23.ps1
Findup_23.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; using System.Text.RegularExpressions; namespace Findup { public class FileLengthComparer : IComparer<FileInfo> { public int Compare(FileInfo x, FileInfo y) { return (x.Length.CompareTo(y.Length)); } } class Findup { public static Dictionary<string, List<string>> optionspaths = new Dictionary<string, List<string>> { {"-x", new List<string>()},{"-i",new List<string>()},{"-xf",new List<string>()},{"-if",new List<string>()}, {"-xd",new List<string>()},{"-id",new List<string>()},{"-paths",new List<string>()} }; public static Dictionary<string, List<Regex>> optionsregex = new Dictionary<string, List<Regex>> { {"-xr", new List<Regex>()},{"-ir",new List<Regex>()},{"-xfr",new List<Regex>()},{"-ifr",new List<Regex>()}, {"-xdr",new List<Regex>()},{"-idr",new List<Regex>()} }; public static Dictionary<string, Boolean> optionsbools = new Dictionary<string, bool> { { "-recurse", false }, { "-noerr", false }, {"-delete",false} }; public static long numOfDupes, dupeBytes, bytesrecovered, deletedfiles = 0; // number of duplicate files found, bytes in duplicates, bytes recovered from deleting dupes, number of deleted dupes. public static string delconfirm; public static void Main(string[] args) { DateTime startTime = DateTime.Now; Console.WriteLine("Findup.exe v2.0 - By James Gentile - [email protected] - 2012."); Console.WriteLine("Findup.exe matches sizes, then SHA512 hashes to identify duplicate files."); Console.WriteLine(" "); string optionskey = "-paths"; List<FileInfo> files = new List<FileInfo>(); int i = 0; for (i = 0; i < args.Length; i++) { string argitem=args[i].ToLower(); if ((System.String.Compare(argitem, "-help", true) == 0) || (System.String.Compare(argitem, "-h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1..#N> [-recurse] [-noerr] [-x/-i/-xd/-id/-xf/-if] <files/directories/regex> [-regex] [-delete]"); Console.WriteLine(" "); Console.WriteLine("Options: -help - displays this help message."); Console.WriteLine(" -recurse - recurses through subdirectories when directories or file specifications (e.g. *.txt) are specified."); Console.WriteLine(" -noerr - discards error messages."); Console.WriteLine(" -delete - delete each duplicate file with confirmation."); Console.WriteLine(" -x - eXcludes if full file path starts with (or RegEx matches if -xr) one of the items following this switch until another switch is used."); Console.WriteLine(" -i - include if full file path starts with (or Regex matches if -ir) one of the items following this switch until another switch is used."); Console.WriteLine(" -xd - eXcludes all directories - minus drive/files - (using RegEx if -xdr) including subdirs following this switch until another switch is used."); Console.WriteLine(" -id - Include only directories - minus drive/files - (using RegEx if -idr) including subdirs following this switch until another switch is used."); Console.WriteLine(" -xf - eXcludes all files - minus drive/directories - (using RegEx if -xfr) following this switch until another switch is used."); Console.WriteLine(" -if - Include only files - minus drive/directories - (using RegEx if -ifr) following this switch until another switch is used."); Console.WriteLine(" [r] - Use regex for include/exclude by appending an 'r' to the option, e.g. -ir, -ifr, -idr, -xr, -xfr, -xdr."); Console.WriteLine(" -paths - not needed unless you want to specify files/dirs after an include/exclude without using another non-exclude/non-include option."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances -recurse -noerr"); Console.WriteLine(" - Find dupes in c:\\\\finance."); Console.WriteLine(" - recurse all subdirs of c:\\\\finance."); Console.WriteLine(" - suppress error messages."); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data -recurse -x d:\\\\data\\\\webpics"); Console.WriteLine(" - Find dupes in c:\\\\users\\\\alice\\\\plan.txt, d:\\\\data"); Console.WriteLine(" - recurse subdirs in d:\\\\data."); Console.WriteLine(" - exclude any files in d:\\\\data\\\\webpics and subdirs."); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\quarter.doc -xr \\"(jim)\\" -regex"); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\quarter.doc"); Console.WriteLine(" - exclude any file with 'jim' in the name as specified by the Regex item \\"(jim)\\""); Console.WriteLine(" findup.exe c:\\\\data *.txt c:\\\\reports\\\\*quarter.doc -xr \\"[bf]\\" -ir \\"(smith)\\" -regex"); Console.WriteLine(" - Find dupes in c:\\\\data, *.txt in current directory and c:\\\\reports\\\\*quarter.doc"); Console.WriteLine(" - Include only files with 'smith' and exclude any file with letters b or f in the name as specified by the Regex items \\"[bf]\\",\\"(smith)\\""); Console.WriteLine("Note: Exclude takes precedence over Include."); return; } if (optionsbools.ContainsKey(argitem)) { optionsbools[argitem] = true; optionskey = "-paths"; continue; } if (optionspaths.ContainsKey(argitem) || optionsregex.ContainsKey(argitem)) { optionskey = argitem; continue; } if (optionspaths.ContainsKey(optionskey)) optionspaths[optionskey].Add(argitem); else { try { Regex rgx = new Regex(argitem, RegexOptions.Compiled); optionsregex[optionskey].Add(rgx); } catch (Exception e) {WriteErr("Regex compilation failed: " + e.Message);} } } if (optionspaths["-paths"].Count == 0) { WriteErr("No files, file specifications, or directories specified. Try findup.exe -help. Assuming current directory."); optionspaths["-paths"].Add("."); } Console.Write("Getting file info and sorting file list..."); getFiles(optionspaths["-paths"], "*.*", optionsbools["-recurse"], files); if (files.Count < 2) { WriteErr("\\nFindup.exe needs at least 2 files to compare. Try findup.exe -help"); return; } files.Sort(new FileLengthComparer()); Console.WriteLine("Completed!"); Console.Write("Building dictionary of file sizes, SHA512 hashes and full paths..."); var SizeHashFile = new Dictionary<long, Dictionary<string,List<FileInfo>>>(); for (i = 0; i < (files.Count - 1); i++) { if (files[i].Length != files[i + 1].Length) { continue; } var breakout = false; while (true) { try { var _SHA512 = SHA512.Create(); using (var fstream = File.OpenRead(files[i].FullName)) { _SHA512.ComputeHash(fstream); } string SHA512string = ""; foreach (var c in _SHA512.Hash) { SHA512string += String.Format("{0:x2}", c); } if (!SizeHashFile.ContainsKey(files[i].Length)) SizeHashFile.Add(files[i].Length, new Dictionary<string,List<FileInfo>>()); if (!SizeHashFile[files[i].Length].ContainsKey(SHA512string)) SizeHashFile[files[i].Length][SHA512string] = new List<FileInfo>() {}; SizeHashFile[files[i].Length][SHA512string].Add(files[i]); } catch (Exception e) { WriteErr("Hash error: " + e.Message); } if (breakout == true) {break;} i++; if (i == (files.Count - 1)) { breakout = true; continue; } breakout = (files[i].Length != files[i + 1].Length); } } Console.WriteLine("Completed!"); foreach (var SizeGroup in SizeHashFile) { foreach (var HashGroup in SizeGroup.Value) { var SGK = (long)SizeGroup.Key; var HGVC = (long)HashGroup.Value.Count; if (HGVC > 1) { Console.WriteLine("{0:N0} Duplicate files. {1:N0} Bytes each. {2:N0} Bytes total : ", HGVC, SGK, SGK*HGVC); foreach (var Filenfo in HashGroup.Value) { Console.WriteLine(Filenfo.FullName); numOfDupes++; dupeBytes += Filenfo.Length; if (optionsbools["-delete"]) if (DeleteDupe(Filenfo)) { bytesrecovered += Filenfo.Length; deletedfiles++; } } } } } Console.WriteLine("\\n "); Console.WriteLine("Files checked : {0:N0}", files.Count); // display statistics and return to OS. Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", dupeBytes); Console.WriteLine("Deleted duplicates : {0:N0}", deletedfiles); Console.WriteLine("Bytes recovered : {0:N0}", bytesrecovered); Console.WriteLine("Execution time : " + (DateTime.Now - startTime)); } private static void WriteErr(string Str) { if (!optionsbools["-noerr"]) Console.WriteLine(Str); } private static Boolean DeleteDupe(FileInfo Filenfo) { Console.Write("Delete this file <y/N> <ENTER>?"); delconfirm = Console.ReadLine(); if ((delconfirm[0] == 'Y') || (delconfirm[0] == 'y')) { try { Filenfo.Delete(); Console.WriteLine("File Successfully deleted."); return true; } catch (Exception e) { Console.WriteLine("File could not be deleted: " + e.Message); } } return false; } private static Boolean CheckNames(string fullname) { var filePart = Path.GetFileName(fullname); // get file name only (e.g. "d:\\temp\\data.txt" -> "data.txt") var dirPart = Path.GetDirectoryName(fullname).Substring(fullname.IndexOf(Path.VolumeSeparatorChar)+1); // remove drive & file (e.g. "d:\\temp\\data.txt" -> "\\temp") if (CheckNamesWorker(fullname, "-x", "-xr", true)) return false; if (CheckNamesWorker(filePart, "-xf", "-xfr", true)) return false; if (CheckNamesWorker(dirPart, "-xd", "-xdr", true)) return false; if (CheckNamesWorker(fullname, "-i", "-ir", false)) return false; if (CheckNamesWorker(filePart, "-if", "-ifr", false)) return false; if (CheckNamesWorker(dirPart, "-id", "-idr", false)) return false; return true; } private static Boolean CheckNamesWorker(string filestr, string pathskey, string rgxkey, Boolean CheckType) { foreach (var filepath in optionspaths[pathskey]) { if (filestr.ToLower().StartsWith(filepath) == CheckType) return true; } foreach (var rgx in optionsregex[rgxkey]) { if (rgx.IsMatch(filestr) == CheckType) return true; } return false; } private static void getFiles(List<string> pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { foreach (string d in pathRec) { getFiles(d, searchPattern, recursiveFlag, returnList); } } private static void getFiles(string[] pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { foreach (string d in pathRec) { getFiles(d, searchPattern, recursiveFlag, returnList); } } private static void getFiles(string pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfo> returnList) { string dirPart; string filePart; if (File.Exists(pathRec)) { try { FileInfo addf = (new FileInfo(pathRec)); if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) && CheckNames(addf.FullName)) returnList.Add(addf); } catch (Exception e) { WriteErr("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { if (((addf.Attributes & FileAttributes.ReparsePoint) == 0) && CheckNames(addf.FullName)) returnList.Add(addf); } } catch (Exception e) { WriteErr("Add files from Directory error: " + e.Message); } if (recursiveFlag) { try { getFiles((Directory.GetDirectories(pathRec)), searchPattern, recursiveFlag, returnList); } catch (Exception e) { WriteErr("Add Directory error: " + e.Message); } } } else { try { filePart = Path.GetFileName(pathRec); dirPart = Path.GetDirectoryName(pathRec); } catch (Exception e) { WriteErr("Parse error on: " + pathRec); WriteErr(@"Make sure you don't end a directory with a \\ when using quotes. The console arg parser doesn't accept that."); WriteErr("Exception: " + e.Message); return; } if (filePart.IndexOfAny(new char[] {'?','*'}) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart)) { getFiles(dirPart, filePart, recursiveFlag, returnList); return; } } WriteErr("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } } }
combined_dataset/train/non-malicious/sample_60_21.ps1
sample_60_21.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # # culture = "en-US" ConvertFrom-StringData -StringData @' ###PSLOC InValidUri = InValid Uri: '{0}'. A sample valid uri: https://www.powershellgallery.com/api/v2/. PathDoesNotExist = Path: '{0}' does not exist. VersionError = MinimumVersion should be less than the MaximumVersion. The MinimumVersion or MaximumVersion cannot be used with the RequiredVersion in the same command. UnexpectedArgument = Unexpected argument type: '{0}'. SourceNotFound = Source '{0}' not found. Please make sure you register it. CallingFunction = Calling function '{0}'. PropertyTypeInvalidForDesiredValues = Property 'DesiredValues' must be either a [System.Collections.Hashtable], [CimInstance] or [PSBoundParametersDictionary]. The type detected was {0}. PropertyTypeInvalidForValuesToCheck = If 'DesiredValues' is a CimInstance, then property 'ValuesToCheck' must contain a value. PropertyValidationError = Expected to find an array value for property {0} in the current values, but it was either not present or was null. This has caused the test method to return false. PropertiesDoesNotMatch = Found an array for property {0} in the current values, but this array does not match the desired state. Details of the changes are below. PropertyThatDoesNotMatch = {0} - {1} ValueOfTypeDoesNotMatch = {0} value for property {1} does not match. Current state is '{2}' and desired state is '{3}'. UnableToCompareProperty = Unable to compare property {0} as the type {1} is not handled by the Test-SQLDSCParameterState cmdlet. ###PSLOC '@ # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIoCdfhdi5Cjss # ngqx6qsfpPMDALYWOvgm/jaEU9DaSKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEbT # TZW1RXZZDCAMvCbdAXkpZIMZ0d5LRefvFGsW4itYMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMg4n9CHQzZxxFDpTYdqQSi+BJ+MeZaHbCXBO # EMtI1+Z4v6ZmYYWRlOji02nB2AChjdbPtM1p6pzzXfWFrhFFs3hKm6BesTBxwZSs # 1KK8DKl4OuCtsnLKJLjzEIkmfqUOugaZcCCoY5nqaF5S88C3Am98YvI4kCbPuo8o # LJlV5v3Z0CT8GBlL8tXhtEX9zm3McI2wzlHop73xLJh3RyaNz84a1awJXuBdvxsJ # NtQX7dXvlrVuEAHpWN5SDZzLGphVU8ERLBA7S6qEAdUMP35BN1CALzpyG1uRMVYP # 1JfV47iRtNWoEwXBiy2tA4hdQcNXEKXRcId0ojk5O04RyC2GUaGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDvUq5BYkuGiilUGai7pmdlu/GpJ7Uw2J2P # LR5XyqDvJQIGZnLDCgsUGBMyMDI0MDcxMTIxMjQzMy40MzVaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOo5l2cwIhgPMjAyNDA3MTEwNzI3MzVaGA8yMDI0MDcx # MjA3MjczNVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6jmXZwIBADAKAgEAAgIS # OwIB/zAHAgEAAgISCjAKAgUA6jro5wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBADWBzvlmCpLXyH1fCjdirPSe2H5bKaOfiMBm8BYWXXP/Z//a+cX97Qby11GK # Tg5Wx88Y3kbQ/WwcXOztdzNnvS1YNvnpQggmACTKgYFay3MiERAAMZJeqfzb9RHy # eBdl2Tk79iEESUQa41lxx7bVZJ+sTtECf0MnNi+5ECsr+wVYMYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0A # AQAAAd4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgNFjEhwn6kbMLebJBPM3v9RQszO5bcgwwt+kM # DVbm8DgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/m # C3MgrT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIM/QywOGDQCT1I85kI0I # gD4Gi6c3gCuUyZMPa9+93MVxMA0GCSqGSIb3DQEBCwUABIICAFuFc+8SEEYnQvSS # pX2tfQX7CLoiWHHwIRVY+Qq3q4WIhsyJi4T97lsAsER+XW6nOd6AXTw4fwKh3RTN # GhUQU3OfuonAP+kVST+/VY6CXzzT+A1nTM6ccIgcX7I95xAadwxmCa55VNJnPChF # iIie8PP0is0H+kUERO4WnV69elkBFLVABZoUrrUz0R3sJED/r+gz1cq6pQm9Ktn4 # b43dDFt8oFUDXJcLiNkuLKcPRKO6I6hAow8NAcbnuRbXotgKqLQQRrOCpHPXBe/U # C1ky/N+pc/xrC/L6YSs6bv96LRioE+vPZi97cNligfbr5gK6BTS/MENA2hBXVx56 # 2Ur5BPeAg+bsKXv52ew1H+4epKUD0qs6woC92xsadGtGd1TPwa+pbohh611O/rN5 # y8ZZTfu3WUr1iWzJEiOYQ86RNGDlWu630OkinFie77Jqff9XG4UmfGokL4EzPpQE # BRJptECz5kSGGLaBSthwQcyLhrvTqo/Fu4OBQckbR2Q2EiDYF8twREmiSAUdM4qk # c5BO5PlyvvwlUF60KmxAC1E8Y3EbNWqe9da/iowH3TcIr5bYXYmTFL/ia8atcaI6 # RgYvH0X7XtEuzd3VZyU9fizcCmkW7WNLBT3Y1X2npqFjvGZ3Ub16PThoeNuK0H5W # WgbPWYwiSrVJCJXZ7UueL70KWJL/ # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_66.ps1
sample_50_66.ps1
# # Module manifest for module 'OCI.PSModules.Apmsynthetics' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Apmsynthetics.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b2901c22-2813-4f21-ae94-09094aa70e0e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Apmsynthetics Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmsynthetics.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApmsyntheticsDedicatedVantagePoint', 'Get-OCIApmsyntheticsDedicatedVantagePointsList', 'Get-OCIApmsyntheticsMonitor', 'Get-OCIApmsyntheticsMonitorResult', 'Get-OCIApmsyntheticsMonitorsList', 'Get-OCIApmsyntheticsOnPremiseVantagePoint', 'Get-OCIApmsyntheticsOnPremiseVantagePointsList', 'Get-OCIApmsyntheticsPublicVantagePointsList', 'Get-OCIApmsyntheticsScript', 'Get-OCIApmsyntheticsScriptsList', 'Get-OCIApmsyntheticsWorker', 'Get-OCIApmsyntheticsWorkersList', 'Invoke-OCIApmsyntheticsAggregateNetworkData', 'New-OCIApmsyntheticsDedicatedVantagePoint', 'New-OCIApmsyntheticsMonitor', 'New-OCIApmsyntheticsOnPremiseVantagePoint', 'New-OCIApmsyntheticsScript', 'New-OCIApmsyntheticsWorker', 'Remove-OCIApmsyntheticsDedicatedVantagePoint', 'Remove-OCIApmsyntheticsMonitor', 'Remove-OCIApmsyntheticsOnPremiseVantagePoint', 'Remove-OCIApmsyntheticsScript', 'Remove-OCIApmsyntheticsWorker', 'Update-OCIApmsyntheticsDedicatedVantagePoint', 'Update-OCIApmsyntheticsMonitor', 'Update-OCIApmsyntheticsOnPremiseVantagePoint', 'Update-OCIApmsyntheticsScript', 'Update-OCIApmsyntheticsWorker' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmsynthetics' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_60_0.ps1
sample_60_0.ps1
# # Module manifest for module 'OCI.PSModules.Adm' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Adm.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Adm Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIAdmRemediationRecipe', 'Get-OCIAdmApplicationDependencyRecommendationsList', 'Get-OCIAdmApplicationDependencyVulnerabilitiesList', 'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList', 'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList', 'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList', 'Get-OCIAdmStage', 'Get-OCIAdmStagesList', 'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList', 'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList', 'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList', 'Invoke-OCIAdmDeactivateRemediationRecipe', 'Move-OCIAdmKnowledgeBaseCompartment', 'Move-OCIAdmRemediationRecipeCompartment', 'Move-OCIAdmRemediationRunCompartment', 'Move-OCIAdmVulnerabilityAuditCompartment', 'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe', 'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit', 'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe', 'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit', 'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest', 'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe', 'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Invoke-Generic.ps1
Invoke-Generic.ps1
function Invoke-Generic { #.Synopsis # Invoke Generic method definitions via reflection: [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [Alias('On','Type')] $InputObject , [Parameter(Position=1,ValueFromPipelineByPropertyName=$true)] [Alias('Named')] [string]$MethodName , [Parameter(Position=2)] [Alias('Returns')] [Type]$ReturnType , [Parameter(Position=3, ValueFromRemainingArguments=$true, ValueFromPipelineByPropertyName=$true)] [Object[]]$WithArgs ) process { $Type = $InputObject -as [Type] if(!$Type) { $Type = $InputObject.GetType() } [Type[]]$ArgumentTypes = $withArgs | % { $_.GetType() } [Object[]]$Arguments = $withArgs | %{ $_.PSObject.BaseObject } $Type.GetMethod($MethodName, $ArgumentTypes).MakeGenericMethod($returnType).Invoke( $on, $Arguments ) } }
combined_dataset/train/non-malicious/style acording video res.ps1
style acording video res.ps1
@@--------------------------------------------------------------------------------------------------------------------------- @@ this code is copied from http://www.ti4fun.com/myouikar/JavaScript/rotina.aspx?r=JJiKNeLQlIA[[ti&l=STN[ti]5tehuTA[[ti @@--------------------------------------------------------------------------------------------------------------------------- <script> document.write('<div id="div_panel" style="width:100%; height:'+ (screen.height > 768 ? '380px' : (screen.height > 600 ? '280px' : '275px')) +'; overflow:auto;">'); </script> @@-------------------------------------------------- @@ See more codes in http://www.ti4fun.com/myouikar @@--------------------------------------------------
combined_dataset/train/non-malicious/4184.ps1
4184.ps1
cls $OS = Get-WmiObject -Class Win32_OperatingSystem -ComputerName . Switch ($OS.Version) { 5.0.2195 {New-Item -Name "Windows 2000" -Path $env:windir -ItemType File} 5.1.2600 {New-Item -Name "Windows XP" -Path $env:windir -ItemType File} 5.2.3790 {New-Item -Name "Windows XP 64-Bit" -Path $env:windir -ItemType File} 6.0.6000 {New-Item -Name "Windows Vista" -Path $env:windir -ItemType File} 6.0.6001 {New-Item -Name "Windows Vista SP1" -Path $env:windir -ItemType File} 6.0.6002 {New-Item -Name "Windows Vista SP2" -Path $env:windir -ItemType File} 6.1.7600 {New-Item -Name "Windows 7" -Path $env:windir -ItemType File} 6.1.7601 {New-Item -Name "Windows 7 SP1" -Path $env:windir -ItemType File} 6.2.9200 {New-Item -Name "Windows 8" -Path $env:windir -ItemType File} 6.3.9600 {New-Item -Name "Windows 8.1" -Path $env:windir -ItemType File} }
combined_dataset/train/non-malicious/sample_1_67.ps1
sample_1_67.ps1
#************************************************ # TS_DCDiag.ps1 # Version 1.1.1 # Date: 04-11-2011 # Authors : Andre Teixeira/ David Fisher (CSS)/ Craig Landis # Description: Run DCDiag utility to obtain log files #************************************************ if($debug -eq $true){[void]$shell.popup("Run DC_DCDiag.ps1")} $ProductType = (get-itemproperty -path "HKLM:SYSTEM\CurrentControlSet\Control\ProductOptions").ProductType if ($ProductType -eq "LanmanNT") { Import-LocalizedData -BindingVariable DCDiagStrings Write-DiagProgress -Activity $DCDiagStrings.ID_DCDiag -Status $DCDiagStrings.ID_DCDiagObtaining if ($OSVersion.Build -ge 6001) { $DCDiagPath = $Env:windir + "\system32\dcdiag.exe" } else { $DCDiagPath = Join-Path $PWD.Path "dcdiag2k3.exe" if ((Test-Path $DCDiagPath) -eq $false) { "[Error]: Windows Server 2003 dcdiag2k3.exe is currently not present on the system. Please add a reference to include it on your diagnostic package" | WriteTo-ErrorDebugReport } } if (Test-Path $DCDiagPath) { $OutputFile = $ComputerName + "_DCDiag-Verbose.log" $CommandLineToExecute = $DCDiagPath + " /v /f:" + $OutputFile RunCmD -commandToRun $CommandLineToExecute -sectionDescription "DCDiag" -filesToCollect $OutputFile -fileDescription "DCDiag Verbose" -BackgroundExecution Write-DiagProgress -Activity $DCDiagStrings.ID_DCDiag -Status $DCDiagStrings.ID_DCDiagDNSObtaining $OutputFile = $ComputerName + "_DCDiag-DNS.log" $CommandLineToExecute = $DCDiagPath + " /v /test:dns /f:" + $OutputFile RunCmD -commandToRun $CommandLineToExecute -sectionDescription "DCDiag" -filesToCollect $OutputFile -fileDescription "DCDiag DNS Health information" -BackgroundExecution Write-DiagProgress -Activity $DCDiagStrings.ID_DCDiag -Status $DCDiagStrings.ID_DCDiagTopologyObtaining $OutputFile = $ComputerName + "_DCDiag-Topology.log" $CommandLineToExecute = $DCDiagPath + " /v /test:topology /f:" + $OutputFile RunCmD -commandToRun $CommandLineToExecute -sectionDescription "DCDiag" -filesToCollect $OutputFile -fileDescription "DCDiag Topology Test" -BackgroundExecution } } Trap{WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat;Continue} # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAXkYCJbVJJU4UX # +L0qUwK5BdyQXcz+8HBHuSQI1faQjKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAU/ # dUmodYSosCNy7+tlagqTx7x8pO5g49ESqRO53SpmMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAFnCJ9DtowW6GDFFatEJLon3xl9HD6XqqKRGp # tr67fRg0IciA+Kpl0hjZGxvQbXKwBd7K8FWohiz/BHDime6NkT4iPLf+wv7mNu1P # 2QElfvH+iXAtWnOvEYgP0R4/LYw3aDZl1fDL7xcdqxqYfbFp210W9H9ueSc15mGb # cySqLWaJOHKSP249c+cmZ9IyEi0niYNgrJhM1aYCHtogDmexboZyhT/mj3xY05mr # FUcFBi94hsGXy3ffe3qD0VrNBmeT0dwatI6VpFBqvDV9wan4ESCZt/WSVHy2p117 # emsVHHVm3N/Rdz3flgs813rCy3H8/4BOoXhNw7aMm31+5rwDj6GCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDjrzkkfn4Va6z3+6JhC7XMusltLx3iL7fG # OorGidcrEQIGZuto66H4GBMyMDI0MTAyODExNDAzOS4xOTVaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vL # bDdn5TCVAAEAAAH7MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU3MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # qMJWQeWAq4LwvSjYsjP0Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV # +9ox0H95Q8fhoZq3x9lxguZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloB # U9GJBs7LBNrcbH6rBiOvqDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blY # EcBvkj5dH1la9zU846QDeOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVV # urOnaNLXs31qTRTyVHX8ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwC # yh4wK9Z5+azTzfa2GD4p6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lK # pf/eWUY2o/hvcDPZNgLaHvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0Lp # Hnqbb1UF7cq09kCcfWTDPcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8 # zF9q4DCfWesSr1akycDduGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbT # ubTCLLt8Xn8t+slcKm5DkvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJ # VwNVVlBXaQ3ZMcVjijyVoUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRHVSGYUNQ3RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAwzoIKOY2dnUjfWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtT # HNk3Sj3nkyBszzxSbZEQ0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQ # MFzhVBWiWD0VAnu9x0fjifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefv # cxUCys4+DC3s8CYp7WWXpZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7f # CaSYoQhouWOr07l/KM4TndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bT # DEd3tlDKtV9AUY3rrnFwHTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXh # Hd5oI/XGjSgykgJrWA57rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YG # DrecJ/qXXWUYvfLYqHGf8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+ # //HJ9Aw6NJuR/uDR7X7vDXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx # /2gNYyezAokbrFhACsJ2BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk # 3zRkx0ExkmF8aOdpvoKhuwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz # 2RfVbyuwYwPykBWggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0 # MTAyODIzNDYxOVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEA # AgINvAIB/zAHAgEAAgIUvzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQCt9+78tOBk3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjV # cA8B4zRZWYQt61ryjsP7nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0 # aABNMEKKtN5mHLc0RqyRjYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZ # GIf20olcJr1Udx5TxmnYdsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnaz # QchF9LlhnVpwArQ160lunLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw # /SBZA3RVy2I0EMGwb608ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgpfwSUS62JoCNK+JsEGBdOuL8stV6wjrV9i6/JwslJC8wgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqY # qDu1SSTlGDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB+8vLbDdn5TCVAAEAAAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4 # qDRq2ZeFMA0GCSqGSIb3DQEBCwUABIICAEgAURMHIFZQyVWaKdXmIJf/iuTZyg2T # s7eNTdEoARtTXGu1jErQTZD7R72Z8WFgw8gTm2YcBZ1uUizzIFdICLqQZ5WhQfvV # InKBSp3c4x0xt6UiUtagDhKjdW08YzI7FOVCl3tmC4A43dH0k1WhWHHrcJ/BLOiK # 000K7Parh4jktRLeOryYkFo8ISF6X+QbahgJaH4+vAtyLIDGc3w/YnJMsVtUs+nv # m4nCsa0ye+uL0KL3q8U8n7eEd+ZVjZppgOPu3+P3vL/vnZG9bu15iuA95nqEm7Z+ # +EPuI8V5mv6OjC7ivCsI5X/6T6Al6DinO8dCG/x0BC4zOomkjnbVs1m2xp50U/Tz # N6gJStN9NMgVaoDkxWa/in8r6fNvu8v5qS+Toq2dQ+9NiiL4HNA7q6TJmpC9ab4z # hjE7g8crEnW63ILp3RG+OCOhhc3OsIOWiLZSwV50SPy8GVTPMXtGhzuy0I9xFwuL # /0IzpNdfmVsQkAva7ABnODLthadTPGAlQVZtOb2mKzP1l2TZKpIlo3DCm2tlB6bC # TnE+ELWkhcoEbLHhRVblJCEZWO6gLKkRo1LtV/KMa/hssC89R3NNrcTxhaWHQ7D3 # 3N77TWa/2EOhxVJPqUKPi5cql3Edb2ifnmFAiyiEBPye0RsGtbahBZ/CizkGLysa # zq/YFGLAACjj # SIG # End signature block
combined_dataset/train/non-malicious/Get-CrawlHealth (MOSS).ps1
Get-CrawlHealth (MOSS).ps1
[reflection.assembly]::LoadWithPartialName("Microsoft.SharePoint") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server") | out-null [reflection.assembly]::LoadWithPartialName("Microsoft.Office.Server.Search") | out-null @@#NOTE: I've set strict crawl freshness/crawl duration/success ratio threshholds. Reset as desired @@# to something that more suits your reality. $crawlFreshnessDayThreshhold = 2 $crawlDurationHourThreshhold = 4 $successRatioThreshhold = 0.9 function Calculate-CrawlDuration( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { if ($contentSource.CrawlStatus -eq [Microsoft.Office.Server.Search.Administration.CrawlStatus]::Idle) { return "Green - no current crawl" } $timespan = [datetime]::Now - $contentSource.CrawlStarted $timespanFormatted = "Running for $($timespan.TotalDays.ToString('0.00')) Days" + "($($timespan.TotalHours.ToString('0.0')) hours)" if ($timespan.TotalHours -le ($crawlDurationHourThreshhold / 2)) { return "Green - $timespanFormatted" } elseif ($timespan.TotalHours -le ($crawlDurationHourThreshhold)) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-CrawlFreshness( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource) { $timespan = [datetime]::Now - $contentSource.CrawlCompleted $timespanFormatted = "$($timespan.TotalDays.ToString('0.00')) days ago" if ($timespan.Days -le 0) { return "Green - $timespanFormatted" } elseif ($timespan.Days -lt $crawlFreshnessDayThreshhold) { return "Yellow - $timespanFormatted" } else { return "Red - $timespanFormatted" } } function Calculate-IndexHealth( [Microsoft.Office.Server.Search.Administration.SharePointContentSource]$contentSource, $successCount, $warningCount, $errorCount) { $formatted = "($($successCount)/$($warningCount)/$($errorCount))" if ($errorCount -eq 1) { return "Red - exactly 1 error, usually indicates permissions/config error - $formatted" } $successRatio = ([double]$successCount)/([double]($warningCount + $errorCount)) $successRatioMidpointToPerfection = (1.0 - ((1.0 - $successRatioThreshhold)/2.0)) if ($successRatio -ge $successRatioMidpointToPerfection) { return "Green - $formatted" } elseif ($successRatio -ge $successRatioThreshhold) { return "Yellow - $formatted" } else { return "Red - $formatted" } } function Get-CrawlHealth { $serverContext = [Microsoft.Office.Server.ServerContext]::Default $searchContext = [Microsoft.Office.Server.Search.Administration.SearchContext]::GetContext($serverContext) $content = [Microsoft.Office.Server.Search.Administration.Content]$searchContext $history = [Microsoft.Office.Server.Search.Administration.CrawlHistory]$searchContext $contentSources = $content.ContentSources | foreach { $_ } $contentSources | foreach { #unroll DataTable object into more useful DataRow object $crawlHistory = $history.GetLastCompletedCrawlHistory($_.Id) | % { $_ } add-member -inputobject $_ -membertype NoteProperty -name "CurrentCrawlDuration" -value ( Calculate-CrawlDuration $_) add-member -inputobject $_ -membertype NoteProperty -name "CompletedCrawlFreshness" -value ( Calculate-CrawlFreshness $_) add-member -inputobject $_ -membertype NoteProperty -name "IndexHealth" -value ( Calculate-IndexHealth -contentSource $_ -successCount $crawlHistory.SuccessCount -warningCount ( $crawlHistory.WarningCount) -errorCount $crawlHistory.ErrorCount) } $contentSources | select Name, CurrentCrawlDuration, CompletedCrawlFreshness, IndexHealth | fl } @@#USAGE: -Open a PowerShell session on the SharePoint server with elevated credentials @@# (specifically, with access to the SSP - usually the SharePoint farm account) @@# -Tweak the threshholds (they may be too ambitious for your environment) @@# -Paste this text into an open PowerShell window and type (without the # mark) @@# Get-CrawlHealth
combined_dataset/train/non-malicious/sample_33_46.ps1
sample_33_46.ps1
/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.46.0(21007360cad28648bdf46282a2592cb47c3a7a6f) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/ define("vs/basic-languages/powershell/powershell", ["require"],(require)=>{ "use strict"; var moduleExports = (() => { var __defProp = Object.defineProperty; var __getOwnPropDesc = Object.getOwnPropertyDescriptor; var __getOwnPropNames = Object.getOwnPropertyNames; var __hasOwnProp = Object.prototype.hasOwnProperty; var __export = (target, all) => { for (var name in all) __defProp(target, name, { get: all[name], enumerable: true }); }; var __copyProps = (to, from, except, desc) => { if (from && typeof from === "object" || typeof from === "function") { for (let key of __getOwnPropNames(from)) if (!__hasOwnProp.call(to, key) && key !== except) __defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable }); } return to; }; var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod); // src/basic-languages/powershell/powershell.ts var powershell_exports = {}; __export(powershell_exports, { conf: () => conf, language: () => language }); var conf = { // the default separators except `$-` wordPattern: /(-?\d*\.\d\w*)|([^\`\~\!\@\#%\^\&\*\(\)\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g, comments: { lineComment: "#", blockComment: ["<#", "#>"] }, brackets: [ ["{", "}"], ["[", "]"], ["(", ")"] ], autoClosingPairs: [ { open: "{", close: "}" }, { open: "[", close: "]" }, { open: "(", close: ")" }, { open: '"', close: '"', notIn: ["string"] }, { open: "'", close: "'", notIn: ["string", "comment"] } ], surroundingPairs: [ { open: "{", close: "}" }, { open: "[", close: "]" }, { open: "(", close: ")" }, { open: '"', close: '"' }, { open: "'", close: "'" } ], folding: { markers: { start: new RegExp("^\\s*#region\\b"), end: new RegExp("^\\s*#endregion\\b") } } }; var language = { defaultToken: "", ignoreCase: true, tokenPostfix: ".ps1", brackets: [ { token: "delimiter.curly", open: "{", close: "}" }, { token: "delimiter.square", open: "[", close: "]" }, { token: "delimiter.parenthesis", open: "(", close: ")" } ], keywords: [ "begin", "break", "catch", "class", "continue", "data", "define", "do", "dynamicparam", "else", "elseif", "end", "exit", "filter", "finally", "for", "foreach", "from", "function", "if", "in", "param", "process", "return", "switch", "throw", "trap", "try", "until", "using", "var", "while", "workflow", "parallel", "sequence", "inlinescript", "configuration" ], helpKeywords: /SYNOPSIS|DESCRIPTION|PARAMETER|EXAMPLE|INPUTS|OUTPUTS|NOTES|LINK|COMPONENT|ROLE|FUNCTIONALITY|FORWARDHELPTARGETNAME|FORWARDHELPCATEGORY|REMOTEHELPRUNSPACE|EXTERNALHELP/, // we include these common regular expressions symbols: /[=><!~?&%|+\-*\/\^;\.,]+/, escapes: /`(?:[abfnrtv\\"'$]|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/, // The main tokenizer for our languages tokenizer: { root: [ // commands and keywords [ /[a-zA-Z_][\w-]*/, { cases: { "@keywords": { token: "keyword.$0" }, "@default": "" } } ], // whitespace [/[ \t\r\n]+/, ""], // labels [/^:\w*/, "metatag"], // variables [ /\$(\{((global|local|private|script|using):)?[\w]+\}|((global|local|private|script|using):)?[\w]+)/, "variable" ], // Comments [/<#/, "comment", "@comment"], [/#.*$/, "comment"], // delimiters [/[{}()\[\]]/, "@brackets"], [/@symbols/, "delimiter"], // numbers [/\d*\.\d+([eE][\-+]?\d+)?/, "number.float"], [/0[xX][0-9a-fA-F_]*[0-9a-fA-F]/, "number.hex"], [/\d+?/, "number"], // delimiter: after number because of .\d floats [/[;,.]/, "delimiter"], // strings: [/\@"/, "string", '@herestring."'], [/\@'/, "string", "@herestring.'"], [ /"/, { cases: { "@eos": "string", "@default": { token: "string", next: '@string."' } } } ], [ /'/, { cases: { "@eos": "string", "@default": { token: "string", next: "@string.'" } } } ] ], string: [ [ /[^"'\$`]+/, { cases: { "@eos": { token: "string", next: "@popall" }, "@default": "string" } } ], [ /@escapes/, { cases: { "@eos": { token: "string.escape", next: "@popall" }, "@default": "string.escape" } } ], [ /`./, { cases: { "@eos": { token: "string.escape.invalid", next: "@popall" }, "@default": "string.escape.invalid" } } ], [ /\$[\w]+$/, { cases: { '$S2=="': { token: "variable", next: "@popall" }, "@default": { token: "string", next: "@popall" } } } ], [ /\$[\w]+/, { cases: { '$S2=="': "variable", "@default": "string" } } ], [ /["']/, { cases: { "$#==$S2": { token: "string", next: "@pop" }, "@default": { cases: { "@eos": { token: "string", next: "@popall" }, "@default": "string" } } } } ] ], herestring: [ [ /^\s*(["'])@/, { cases: { "$1==$S2": { token: "string", next: "@pop" }, "@default": "string" } } ], [/[^\$`]+/, "string"], [/@escapes/, "string.escape"], [/`./, "string.escape.invalid"], [ /\$[\w]+/, { cases: { '$S2=="': "variable", "@default": "string" } } ] ], comment: [ [/[^#\.]+/, "comment"], [/#>/, "comment", "@pop"], [/(\.)(@helpKeywords)(?!\w)/, { token: "comment.keyword.$2" }], [/[\.#]/, "comment"] ] } }; return __toCommonJS(powershell_exports); })(); return moduleExports; });
combined_dataset/train/non-malicious/sample_26_9.ps1
sample_26_9.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function set-AMTMPS { <# .Synopsis Set proxy information for the Intel Fast Call for Help Management Presence Server (MPS) interface .Description Set proxy information for the Intel Fast Call for Help Management Presence Server (MPS) interface .Notes .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example set-AMTMPS -HTTPProxy HTTPProxy -SOCKSProxy SocksProxy HTTPProxy SOCKSProxy Client Enabled --------- ---------- ------ ------- HTTP Proxy address SOCKS Proxy address True #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="HTTP Proxy")] [String] $HTTPProxy, [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Socks Proxy")] [String] $SOCKSProxy ) Process { [System.Reflection.Assembly]::LoadWithPartialName("Intel.Management.Wsman") $mps = new-object Intel.Management.Wsman.MpsManager $mps.Enabled = $true $mps.HttpProxy = $HTTPProxy $mps.SocksProxy = $SOCKSProxy $Result = new-object psobject $Result | Add-Member -MemberType noteproperty -Name HTTPProxy -value $mps.HttpProxy $Result | Add-Member -MemberType noteproperty -Name SOCKSProxy -value $mps.SocksProxy $Result | Add-Member -MemberType noteproperty -Name Client -value $Hostname $Result | Add-Member -MemberType noteproperty -Name Enabled -value $mps.Enabled write-output $Result } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDCHeHrgo63DZJQ # AokHesa01T2cBsjFVAKFyyXxpMNor6CCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg66Q/cNC8Az+q9ABK # C0oSeuZTEHV8gZYTLJK0kdCewo4wDQYJKoZIhvcNAQEBBQAEggGAqWcIxBDS3L6e # FwVTkQiFNlZW/g8FLiwIFTA5bNTCMqa4tQeMcM39JqB/TznxRDEEicsmNMXOU3xv # puVoE9FYsiKOaw0J2lHS2BTkl3XOp1EcAWeUQHym/rsE9hu5wEmmLvOqJH9qD9ez # gcQwlTpD8tHcpBfs54RzKUEND7EIvEPgMVniVTzmcEpsNBtu3+UFdj+T5nSPLhwM # Wq27W48M3rNZFE4CmhPPSbrLww0I2Tu0UjIu/asMJCIWqIOdOgvUM3l8OmBVz8dV # wEQ8b/pKMMWST58jO8fQCisLPhWQCXt9rj9+s50md6TkrlGchJckLNtIPIs6zeLl # zFdL2BazgnaeqSs3XGvFJYw9E+BFJA5LSPil09tXaGRMj2fpHeNYsj2puPGqHVDA # a1kYDLhgJls1mjeS9X+xQmjzAmLiqhf0ihiIwitpqX3v3r/n0PcjUTc5eYap0xY3 # jG61Wdn7esXIUionjUa9t81U0YKACGBIxe5nSWZs0YwPkmzZOmK0oYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEILtRZGQ3wJv4TgFazivtyVGovzVVZ/c/26Bk # ifUmn/nyAhQ1+NRIFt/2+yk9XeQ/dzfgoSNj0BgPMjAyMTEwMjcxMjEzMDBaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjExMDI3MTIxMzAwWjA/BgkqhkiG9w0BCQQxMgQwmJ2sS2qYZ/ZQ # hEztBDs+fEGgYOG4Vhbduv3ajtOX8kSNKkWYlblB0w7mLNRo08lcMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICAC7plAMc9M7XdJy1Ua6Uoh9yX2XOoJZ+jU8nbn3PqBouO1WnrYv5 # n9WJyBZkyA6uuNB9qKO3mySBChC0peln5YdVOlC1dkWYT9QnZC+KzxnrMsr/j5/C # XJzkv+EBKGdZtA5S+/ib9jdKpjziXFUBCIlUiFtLrRH4ptXWjoZtgsOTa85YiQmo # lLNjpUX4UO+VFqqdyOcAykS8w3uAHYBCN+gAPbt/XeVEj4Csqn2p0fuyM2dXFOaN # UMV/uQrTzwRQQBtWyJLMXhDXysg1c/MG8nnWFj/tCt3uLxCAXQGic/Ubr+DonOV/ # QxK/GFSeW8hJLiCPPtzQf1I9nGGFEwe2p7/GnasbTh9d2x3hbm0WmrSP3iQhQEoY # 1Z+dANKnlHaeD8xvBo3VwOulwdkzg7UzabeSkyr9kWzk8rEYiFMbnhRa5j1VkCO6 # fBJ2UaV6Sk3+Vb/ErFKd9r1i6lXAi2Y25cZNpGqj62LFKJoOaJehHol0EnaN2E8r # T22V/VwxuR2yz8KmdFWwhIm/IKS9B44mSGT4KIieIp9HV16VqWLzb6DtAA46jlb2 # TCjfUPFmwS9x3rYq8ZqdY2HF807HYHGxFuTp8Syk4+CuH9vFnjZpTZr+H2VAmFYC # HxA55RSspIRVR7SCd+syFD6ZMkyqNRxcS1H0LmUx6odls9w0hNGx7xpe # SIG # End signature block
combined_dataset/train/non-malicious/sample_39_43.ps1
sample_39_43.ps1
trap { # If we except, lets report it visually. Can help with debugging if there IS a problem # in here. Write-Host "EXCEPTION: $($PSItem.ToString())" -ForegroundColor Red Write-Host "$($PSItem.ScriptStackTrace)" Start-Sleep 10 } # Get an environment variable with default value if not present function VGet($varname, $default) { if (Test-Path "$varname") { $val = (Get-Item $varname).Value if ("$val".Length -gt 0) { return $val } } return $default } # Get an array as an option separated list of values --glob x --glob y etc... function VOptGet($varname,$opt) { $ARR=@() $DATA=(VGet "$varname" "") if ("$DATA".Length -gt 0) { $DATA = $DATA.Split(":") foreach ($ENTRY in $DATA) { if ("$ENTRY".Length -gt 0) { $ARR+=" $opt " $ARR+="'$ENTRY'" } } } return $ARR } $USE_GITIGNORE_OPT="" if ( (VGet "env:USE_GITIGNORE" 0) -eq 0) { $USE_GITIGNORE_OPT="--no-ignore" } $TYPE_FILTER_ARR=VOptGet "env:TYPE_FILTER" "--type" $GLOBS=VOptGet "env:GLOBS" "--glob" # If we only have one directory to search, invoke commands relative to that directory $PATHS=$args $SINGLE_DIR_ROOT="" if ($PATHS.Count -eq 1) { $SINGLE_DIR_ROOT=$PATHS[0] if ( -not (Test-Path "$SINGLE_DIR_ROOT")) { Write-Host "Failed to push into: $SINGLE_DIR_ROOT" -ForegroundColor Red exit 1 } Push-Location "$SINGLE_DIR_ROOT" $PATHS="" } $PREVIEW_ENABLED=VGet "env:FIND_WITHIN_FILES_PREVIEW_ENABLED" 0 $PREVIEW_COMMAND=VGet "env:FIND_WITHIN_FILES_PREVIEW_COMMAND" 'bat --decorations=always --color=always --plain {}' $PREVIEW_WINDOW=VGet "env:FIND_WITHIN_FILES_PREVIEW_WINDOW_CONFIG" 'right:50%:border-left' $HAS_SELECTION=VGet "env:HAS_SELECTION" 0 $SELECTION_FILE=VGet "env:SELECTION_FILE" "" $QUERY="" if ($HAS_SELECTION -eq 1 -and "$SELECTION_FILE".Length -gt 0) { $QUERY="`"$(Get-Content "$SELECTION_FILE" -Raw)`"" } $fzf_command = "fzf --cycle --multi" if ("$QUERY".Length -gt 0) { $fzf_command+=" --query" $fzf_command+=" " $fzf_command+="${QUERY}" } if ( $PREVIEW_ENABLED -eq 1){ $fzf_command+=" --preview '$PREVIEW_COMMAND' --preview-window $PREVIEW_WINDOW" } $expression = "rg --files --hidden $USE_GITIGNORE_OPT --glob '!**/.git/' $GLOBS $TYPE_FILTER_ARR $PATHS" + " | " + $fzf_command $result = Invoke-Expression( $expression ) # Output is filename, line number, character, contents if ("$result".Length -lt 1) { Write-Host canceled "1" | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 exit 1 } else { if ("$SINGLE_DIR_ROOT".Length -gt 0) { Join-Path -Path "$SINGLE_DIR_ROOT" -ChildPath "$result" | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 } else { $result | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 } }
combined_dataset/train/non-malicious/2412.ps1
2412.ps1
[CmdletBinding(DefaultParameterSetName = 'EmailNotification')] param ( [Parameter(Mandatory)] [string]$DeploymentId, [Parameter()] [ValidateRange(1, 100)] [int]$FailurePercentThreshold = 10, [Parameter(ParameterSetName = 'EmailNotification')] [string]$ToEmailAddress = '[email protected]', [Parameter(ParameterSetName = 'EmailNotification')] [string]$FromEmailAddress = 'Replace me', [Parameter(ParameterSetName = 'EmailNotification')] [string]$FromDisplayName = 'A Failed SCCM Deployment', [Parameter(ParameterSetName = 'EmailNotification')] [string]$EmailSubject = 'Failed SCCM Deployment', [Parameter(ParameterSetName = 'EmailNotification')] [string]$EmailBody, [Parameter(ParameterSetName = 'EmailNotification')] [string]$SmtpServer = 'replace.this.com', [Parameter()] [string]$SiteCode = 'UHP' ) begin { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop Set-StrictMode -Version Latest function Send-FailNotification ($Method) { switch ($Method) { 'Email' { $Params = @{ 'From' = "$FromDisplayName <$FromEmailAddress>" 'To' = $ToEmailAddress 'Subject' = $EmailSubject 'SmtpServer' = $SmtpServer } if (!$EmailBody) { $Params.Body = "$($Summary.PercentageFailed) percent of clients failed deployment ID $DeploymentId`n`r$Summary" } else { $Params.Body = $EmailBody } Send-MailMessage @Params } default { $false } } } function Get-ClientPercentage ($ClientGroup) { [math]::Round((($Deployment.$ClientGroup / $Deployment.NumberTargeted) * 100), 1) } function Get-ClientStatusSummary { $script:Deployment = Get-CMDeployment -DeploymentId $DeploymentId if (!$Deployment) { $false } else { $Object = @{ 'NumberTargeted' = $Deployment.NumberTargeted 'NumberUnknown' = $Deployment.NumberUnknown 'PercentageFailed' = Get-ClientPercentage 'NumberErrors' 'PercentageInProgress' = Get-ClientPercentage 'NumberInProgress' 'PercentageOther' = Get-ClientPercentage 'NumberOther' 'PercentageSuccess' = Get-ClientPercentage 'NumberSuccess' 'PercentageUnknown' = Get-ClientPercentage 'NumberUnknown' } [pscustomobject]$Object } } try { Write-Verbose 'Checking to see if the SCCM module is available...' if (!(Test-Path "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1")) { throw 'Configuration Manager module not found. Is the admin console intalled?' } elseif (!(Get-Module 'ConfigurationManager')) { Write-Verbose 'The SCCM module IS available.' Import-Module "$(Split-Path $env:SMS_ADMIN_UI_PATH -Parent)\ConfigurationManager.psd1" } $Location = (Get-Location).Path Set-Location "$($SiteCode):" } catch { Write-Error $_.Exception.Message } } process { try { Write-Verbose "Getting a summary of all client activity for deployment ID $DeploymentId..." $script:Summary = Get-ClientStatusSummary if (!$Summary) { throw "Could not find deployment ID '$DeploymentId'" } elseif ($Summary.PercentageFailed -ge $FailurePercentThreshold) { Write-Verbose "Failure threshold breached. There are $($Summary.PercentageFailed) percent of clients that failed this deployment" Send-FailNotification -Method 'Email' } elseif ($Summary.NumberTargeted -eq $Summary.NumberUnknown) { Write-Verbose 'It appears the deployment has not started' Send-FailNotification -Method 'Email' } else { Write-Verbose "Failure threshold not breached. There are only $($Summary.PercentageFailed) percent of clients that failed this deployment" } } catch { Write-Error $_.Exception.Message } } end { Set-Location $Location }
combined_dataset/train/non-malicious/sample_32_81.ps1
sample_32_81.ps1
@{ GUID="766204A6-330E-4263-A7AB-46C87AFC366C" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Disable-WSManCredSSP", "Enable-WSManCredSSP", "Get-WSManCredSSP", "Set-WSManQuickConfig", "Test-WSMan", "Invoke-WSManAction", "Connect-WSMan", "Disconnect-WSMan", "Get-WSManInstance", "Set-WSManInstance", "Remove-WSManInstance", "New-WSManInstance", "New-WSManSessionOption" AliasesToExport = @() NestedModules="Microsoft.WSMan.Management.dll" FormatsToProcess="WSMan.format.ps1xml" HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+Ujs/uIRQu9NJ # wrRJEY/iIf48rrMaCNk+CtkIzIqDVqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMqc # bjEMKtXhjxJkZudlYldRRLIQdzExZVTpCqFCjkJoMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAOV9J07FykVsV7GznBrc+sNIYubWXTvzGprJ9 # 9xWCt/0jM1CgE6AcfXMtJH+0MsOApQAEOlKzTyyuwayU1VXkKEeCDUAytc6+cR5w # AtwKx0IaHgaA0gfBVjNlqddMY4YLHH2FQ1TJwtQqQyDa+KBo4S8fl8mSE2b79sKx # OpZGF2y3p9QBpMZtof7zF26LgMrwi7UXMT1EiG85Zxovz/Pq9XHFDraIiTlT/qYO # oH1Wc3cyEaHPkp0JSWfl+/69Zbj9FU7StV95zeSPcXb+DC72d+n5nbfrtyoRL55u # jrjgQQxPicdqRPqRqhQUjjFljqbRubb/BL72FTla5LN5Mz876aGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB8XcWT1TXH64Ul3DAxhcquJ1ZYy5XDWckc # M2B8K2oUogIGZbqiSpPaGBMyMDI0MDIxNDIxMDAyNS4yMDVaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyH # nPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdK # s+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+ # yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/Y # cM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J # 9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+ # yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRb # cThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXd # YMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknK # XonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/ # obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLx # yyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64 # tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzK # nR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQ # RbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfa # VosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfC # PEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61 # rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsK # i2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRN # odq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJ # XxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35O # W3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx # 8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOl3lHwwIhgPMjAyNDAyMTUwMzM1MjRaGA8yMDI0MDIx # NjAzMzUyNFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6XeUfAIBADAHAgEAAgIW # 9jAHAgEAAgIRTTAKAgUA6Xjl/AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AFaQaR7os7VMUhNiuh1HXiTnCFjLMqxgIdAiiyj1LavZtqMnAxO428gXLsHF4SJc # Wb91H4hNXy+HCV+v2WYZQfps49790A4rptNiH8jX2hlG03RjC+aDbMyJveQ7aGk/ # 9KgCKa83H33fgdCGTYR2mO5zpsUcUYJuYwYNnLVat8egMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAA # AeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgfge6S85z3iXIdnUR/bKS1tplbOmHqlAXoal6MYg3 # HPwwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCS # b4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIKptsUHzuWXU8prZ/oHDJzUO # rrVEH1wazj3PKfCyphuzMA0GCSqGSIb3DQEBCwUABIICABz7auvyGVjPG4U7XYB5 # hwgOH4mQ86GvhoTAydpAON6EdBNq28FlCuc6rSJUExx54rQ3dIP+ayC9zbgh+nZR # yRZDDbOSd74nb0bMO6vuM4vYRwgHuyoDxiCNZTEI5Fijzne9fqTa5f6wPM2PZNfa # unPoGSWskWseQVVH4heNyxanLyCNpXpMbsKKUTtjQONDrwt/iDMhGrROyMKhU9sv # RYAiNjfaT33YevXe8KjJzFsmULcM3l+ueqevdqJyRkYQ2qQgJT5AYaBZH8sVso7J # qq94u0KnQrZudAIH5w3dfAPvDTjYSKEOJcDUU1BC2DU2RlSQqgXbduKgwB/5Ign9 # 32KNGXiHqA9WYBKQrtPqNQ4RkOBWwI/IcUtYOG09c/yNfbRt9d+uxN6ldeqM74UB # vmks3go9HCf5hoeyNF2kDIkSM7GBmDVKti5xJnsTHU51x3xGADuUOueoMrjXiBUr # i769i/mSeyura22bMkZJ8P+MjrrloYujdz1Q44lE3rXwdN6PXvsA/5SHWbC1i4ll # kr8XhqzCprn4JCo/41/LO9zjNqqqRW5PFXb2oEo4oxDFXnKGGKfO3hnTRUX+3Q9l # uQgDazW7P4P6iUKPB0t4vsTXty2dagtnsDU3eiGPqYWCkAid4LOU4nF/zHcUwmfT # CmT8++O2lQXROfNnevF1aNCo # SIG # End signature block
combined_dataset/train/non-malicious/1088.ps1
1088.ps1
& (Join-Path -Path $PSScriptRoot 'Initialize-CarbonTest.ps1' -Resolve) Describe 'New-Junction' { $JunctionPath = $null $tempDir = Get-Item -Path 'TestDrive:' BeforeEach { $Global:Error.Clear() $JunctionPath = Join-Path $tempDir ([IO.Path]::GetRandomFileName()) } AfterEach { Get-ChildItem -Path $tempDir | Where-Object { $_.PsIsContainer -and $_.IsJunction } | ForEach-Object { Remove-Junction -LiteralPath $_.FullName } } function Invoke-NewJunction($link, $target) { return New-Junction $link $target } It 'should create junction' { $result = Invoke-NewJunction $JunctionPath $PSScriptRoot $result | Should Not BeNullOrEmpty $JunctionPath | Should Exist $result.Attributes -like '*ReparsePoint*' | Should Be $true } It 'should not create junction if link is directory' { $error.Clear() $result = Invoke-NewJunction $PSScriptRoot $tempDir 2> $null @($error).Length | Should Be 1 $result | Should BeNullOrEmpty } It 'should not create junction if junction already exists' { $error.Clear() Invoke-NewJunction $JunctionPath $PSScriptRoot @($error).Length | Should Be 0 $result = Invoke-NewJunction $JunctionPath $tempDir 2> $null @($error).Length | Should Be 1 $result | Should BeNullOrEmpty } It 'should create a junction containing wildcard characters' { $JunctionPath = Join-Path -Path $tempDir -ChildPath 'containswildcards[]' $result = New-Junction -Link $JunctionPath -Target $PSScriptRoot $result | Should BeNullOrEmpty $Global:Error.Count | Should Be 0 Test-PathIsJunction -LiteralPath $JunctionPath | Should Be $true } It 'should error if creating an existin junction containing wildcard characters' { $JunctionPath = Join-Path -Path $tempDir -ChildPath 'containswildcards[]' New-Junction -Link $JunctionPath -Target $PSScriptRoot $Global:Error.Count | Should Be 0 New-Junction -Link $JunctionPath -Target $PSScriptRoot -ErrorAction SilentlyContinue $Global:Error.Count | Should Be 1 $Global:Error | Where { $_ -like '*already exists*' } | Should Not BeNullOrEmpty } }
combined_dataset/train/non-malicious/3367.ps1
3367.ps1
param( [string] $RootPath = "$PSScriptRoot\..\src", [string] $OutputFile = "$PSScriptRoot\groupMapping.json", [string] $WarningFile = "$PSScriptRoot\groupMappingWarnings.json", [string] $RulesFile = "$PSScriptRoot\CreateMappings_rules.json" ); $rules = Get-Content -Raw -Path $RulesFile | ConvertFrom-Json; $results = @{}; $warnings = @(); $cmdlets = Get-ChildItem $RootPath -Recurse | Where-Object { $_.FullName -cmatch ".*\\help\\.*-.*.md" -and $_.Fullname -notlike "*Stack*" }; $k = 0; $cmdlets | ForEach-Object { $cmdletPath = Split-Path $_.FullName -Parent; $cmdlet = $_.BaseName; $matchedRule = @($rules | Where-Object { $cmdletPath -cmatch ".*$($_.Regex).*" })[0]; $possibleBetterMatch = @($rules | Where-Object { $cmdlet -cmatch ".*$($_.Regex).*" })[0]; if( (($matchedRule -eq $null) -and ($possibleBetterMatch -ne $null)) -or (($matchedRule.Group -ne $null) -and ($matchedRule.Group -eq $possibleBetterMatch.Group))) { $matchedRule = $possibleBetterMatch; } if($matchedRule -eq $null) { $warnings += $cmdlet; $results[$cmdlet] = "Other"; } else { $results[$cmdlet] = $matchedRule.Alias; } }; $warnings | ConvertTo-Json | Out-File $WarningFile -Encoding utf8; $results | ConvertTo-Json | Out-File $OutputFile -Encoding utf8; Write-Host "" Write-Host "$($results.Count) cmdlets successfully mapped: $($OutputFile)." -ForegroundColor Green; Write-Host "" if($warnings.Count -gt 0) { Write-Host "$($warnings.Count) cmdlets could not be mapped and were placed in 'Other': $($WarningFile)." -ForegroundColor Yellow; throw "Some cmdlets could not be properly mapped to a documentation grouping: $($warnings -join ", "). Please add a mapping rule to $(Resolve-Path -Path $RulesFile)."; }
combined_dataset/train/non-malicious/sample_53_1.ps1
sample_53_1.ps1
if ((Test-Path "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter") -And ((Get-Item "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter").GetValue("Windows") -eq "Blocked")) { & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter" /v Windows /t REG_SZ /d Allowed /f } if ((Test-Path "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter") -And ((Get-Item "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter").GetValue("Win++") -eq "Blocked")) { & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter" /v Win++ /t REG_SZ /d Allowed /f } if ((Test-Path "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter") -And ((Get-Item "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter").GetValue("Win+-") -eq "Blocked")) { & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter" /v Win+- /t REG_SZ /d Allowed /f } if ((Test-Path "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter") -And ((Get-Item "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter").GetValue("Win+G") -ne "Blocked")) { & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter" /v Win+G /t REG_SZ /d Blocked /f } if ((Test-Path "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter") -And ((Get-Item "HKLM:\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter").GetValue("Win+X") -ne "Blocked")) { & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter" /v Win+X /t REG_SZ /d Blocked /f } & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+Down /t REG_SZ /d Blocked /f & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctl+Down /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+M /t REG_SZ /d Blocked /f & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctl+M /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+O /t REG_SZ /d Blocked /f & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctl+O /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+S /t REG_SZ /d Blocked /f & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctl+S /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+Up /t REG_SZ /d Blocked /f & reg.exe delete "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctl+Up /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+D /t REG_SZ /d Blocked /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+Q /t REG_SZ /d Blocked /f & reg.exe add "HKLM\SOFTWARE\Microsoft\Windows Embedded\KeyboardFilter\CustomFilters" /v Win+Ctrl+N /t REG_SZ /d Blocked /f
combined_dataset/train/non-malicious/Get_Set Signature (CTP2)_3.ps1
Get_Set Signature (CTP2)_3.ps1
#Requires -version 2.0 ## Authenticode.psm1 #################################################################################################### ## Wrappers for the Get-AuthenticodeSignature and Set-AuthenticodeSignature cmdlets ## These properly parse paths, so they don't kill your pipeline and script if you include a folder ## ## Usage: ## ls | Get-AuthenticodeSignature ## Get all the signatures ## ## ls | Select-Signed -Mine -Broken | Set-AuthenticodeSignature ## Re-sign anything you signed before that has changed ## ## ls | Select-Signed -NotMine -ValidOnly | Set-AuthenticodeSignature ## Re-sign scripts that are hash-correct but not signed by me or by someone trusted ## #################################################################################################### ## History: ## 1.4 - Moved the default certificate setting into an external psd1 file. ## 1.3 - Fixed some bugs in If-Signed and renamed it to Select-Signed ## - Added -MineOnly and -NotMineOnly switches to Select-Signed ## 1.2 - Added a hack workaround to make it appear as though we can sign and check PSM1 files ## It's important to remember that the signatures are NOT checked by PowerShell yet... ## 1.1 - Added a filter "If-Signed" that can be used like: ls | If-Signed ## - With optional switches: ValidOnly, InvalidOnly, BrokenOnly, TrustedOnly, UnsignedOnly ## - commented out the default Certificate which won't work for "you" ## 1.0 - first working version, includes wrappers for Get and Set ## #################################################################################################### ## README! README! README! README! ################################################################# ## README! README! README! README! ################################################################# ## YOU MUST set the location to your default signing certificate, by either modifiying this script, ## or by creating a language resource file! The second is easier: For english, create a subdirectory ## next to this file called 'en' (for English) and in that folder, create a 'Authenticode.psd1' file ## EG: Set-Content .\\en\\Authenticode.psd1 $CertificatePath ## Basically, the file should contain the path to your code-signing certificate, preferably from the ## CERT:\\ PsProvider, but alternately, from a PFX file... ## EG: ## "Cert:\\CurrentUser\\My\\F05F583BB5EA4C90E3B9BF1BDD0B657701245BD5" ## OR: ## "C:\\Users\\Joel\\Documents\\WindowsPowerShell\\PoshCerts\\Joel-Bennett_Code-Signing.pfx" ## See: http://huddledmasses.org/misusing-powershell-localizable-data/ #################################################################################################### CMDLET Get-UserCertificate -snapin Huddled.Authenticode { trap { Write-Host "The authenticode script module requires a configuration file to function fully!" Write-Host Write-Host "You must put the path to your default signing certificate in the configuration"` "file before you can use the module's Set-Authenticode cmdlet or to the 'mine'"` "feature of the Select-Signed or Test-Signature. To set it up, you can do this:" Write-Host Write-Host "MkDir $(Join-Path $PsScriptRoot $(Get-Culture)) |" Write-Host " Join-Path -Path {`$_} 'Authenticode.psd1' |" Write-Host " New-Item -Path {`$_} -Type File -Value '`"ThePathToYourCertificate`"'" Write-Host Write-Host "If you load your certificate into your 'CurrentUser\\My' store, or put the .pfx file"` "into the folder with the Authenthenticode module script, you can just specify it's"` "thumprint or filename, respectively. Otherwise, it should be a full path." return } Import-LocalizedData -bindingVariable CertificatePath -EA "STOP" $ResolvedPath = $Null $ResolvedPath = Resolve-Path $CertificatePath -ErrorAction "SilentlyContinue" if(!$ResolvedPath) { $ResolvedPath = Resolve-Path (Join-Path $PsScriptRoot $CertificatePath -ErrorAction "SilentlyContinue") -ErrorAction "SilentlyContinue" } if(!$ResolvedPath) { $ResolvedPath = Resolve-Path (Join-Path "Cert:\\CurrentUser\\My" $CertificatePath -ErrorAction "SilentlyContinue") -ErrorAction "SilentlyContinue" } $Certificate = get-item $ResolvedPath -ErrorAction "SilentlyContinue" if($Certificate -is [System.IO.FileInfo]) { $Certificate = Get-PfxCertificate $Certificate -ErrorAction "SilentlyContinue" } return $Certificate } $DefaultCertificate = Get-UserCertificate $CertificateThumbprint = $DefaultCertificate.Thumbprint CMDLET Test-Signature -snapin Huddled.Authenticode { PARAM ( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] # We can't actually require the type, or we won't be able to check the fake ones # [System.Management.Automation.Signature] $Signature , [Alias("Valid")] [Switch]$ForceValid ) return ( $Signature.Status -eq "Valid" -or ( !$ForceValid -and ($Signature.Status -eq "UnknownError") -and ($_.SignerCertificate.Thumbprint -eq $CertificateThumbprint) ) ) } CMDLET Set-AuthenticodeSignature -snapin Huddled.Authenticode { PARAM ( [Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [ValidateScript({ if((resolve-path $_).Provider.Name -ne "FileSystem") { throw "Specified Path is not in the FileSystem: '$_'" } if(!(Test-Path -PathType Leaf $_)) { throw "Specified Path is not a File: '$_'" } return $true })] [string] $Path , ## TODO: you should CHANGE THIS to a method which gets *your* default certificate [Parameter(Position=2, Mandatory=$false)] $Certificate = $DefaultCertificate ) PROCESS { if( ".psm1" -eq [IO.Path]::GetExtension($Path) ) { # function setpsm1sig($Path) { $ps1Path = "$Path.ps1" Rename-Item $Path (Split-Path $ps1Path -Leaf) $sig = Microsoft.PowerShell.Security\\Set-AuthenticodeSignature -Certificate $Certificate -FilePath $ps1Path | Select * Rename-Item $ps1Path (Split-Path $Path -Leaf) $sig.PSObject.TypeNames.Insert( 0, "System.Management.Automation.Signature" ) $sig.Path = $Path $sig } else { Microsoft.PowerShell.Security\\Set-AuthenticodeSignature -Certificate $Certificate -FilePath $Path } } } CMDLET Get-AuthenticodeSignature -snapin Huddled.Authenticode { PARAM ( [Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [ValidateScript({ if((resolve-path $_).Provider.Name -ne "FileSystem") { throw "Specified Path is not in the FileSystem: '$_'" } if(!(Test-Path -PathType Leaf $_)) { throw "Specified Path is not a File: '$_'" } return $true })] [string] $Path ) PROCESS { if( ".psm1" -eq [IO.Path]::GetExtension($Path) ) { # function getpsm1sig($Path) { $ps1Path = "$Path.ps1" Rename-Item $Path (Split-Path $ps1Path -Leaf) $sig = Microsoft.PowerShell.Security\\Get-AuthenticodeSignature -FilePath $ps1Path | select * Rename-Item $ps1Path (Split-Path $Path -Leaf) $sig.PSObject.TypeNames.Insert( 0, "System.Management.Automation.Signature" ) $sig.Path = $Path $sig } else { Microsoft.PowerShell.Security\\Get-AuthenticodeSignature -FilePath $Path } } } CMDLET Select-Signed -snapin Huddled.Authenticode { PARAM ( [Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [ValidateScript({ if((resolve-path $_).Provider.Name -ne "FileSystem") { throw "Specified Path is not in the FileSystem: '$_'" } return $true })] [string] $Path , [Parameter()] [switch]$MineOnly , [Parameter()] [switch]$NotMineOnly , [Parameter()] [switch]$BrokenOnly , [Parameter()] [switch]$TrustedOnly , [Parameter()] [switch]$ValidOnly , [Parameter()] [switch]$InvalidOnly , [Parameter()] [switch]$UnsignedOnly ) if(!(Test-Path -PathType Leaf $Path)) { # if($ErrorAction -ne "SilentlyContinue") { # Write-Error "Specified Path is not a File: '$Path'" # } } else { $sig = Get-AuthenticodeSignature $Path # Broken only returns ONLY things which are HashMismatch if($BrokenOnly -and $sig.Status -ne "HashMismatch") { Write-Debug "$($sig.Status) - Not Broken: $Path" return } # Trusted only returns ONLY things which are Valid if($TrustedOnly -and $sig.Status -ne "Valid") { Write-Debug "$($sig.Status) - Not Trusted: $Path" return } # AllValid returns only things that are SIGNED and not HashMismatch if($ValidOnly -and (($sig.Status -ne "HashMismatch") -or !$sig.SignerCertificate) ) { Write-Debug "$($sig.Status) - Not Valid: $Path" return } # NOTValid returns only things that are SIGNED and not HashMismatch if($InvalidOnly -and ($sig.Status -eq "Valid")) { Write-Debug "$($sig.Status) - Valid: $Path" return } # Unsigned returns only things that aren't signed # NOTE: we don't test using NotSigned, because that's only set for .ps1 or .exe files?? if($UnsignedOnly -and $sig.SignerCertificate ) { Write-Debug "$($sig.Status) - Signed: $Path" return } # Mine returns only things that were signed by MY CertificateThumbprint if($MineOnly -and (!($sig.SignerCertificate) -or ($sig.SignerCertificate.Thumbprint -ne $CertificateThumbprint))) { Write-Debug "Originally signed by someone else, thumbprint: $($sig.SignerCertificate.Thumbprint)" Write-Debug "Does not match your default certificate print: $CertificateThumbprint" Write-Debug " $Path" return } # NotMine returns only things that were signed by MY CertificateThumbprint if($NotMineOnly -and (!($sig.SignerCertificate) -or ($sig.SignerCertificate.Thumbprint -eq $CertificateThumbprint))) { if($sig.SignerCertificate) { Write-Debug "Originally signed by you, thumbprint: $($sig.SignerCertificate.Thumbprint)" Write-Debug "Matches your default certificate print: $CertificateThumbprint" Write-Debug " $Path" } return } if(!$BrokenOnly -and !$TrustedOnly -and !$ValidOnly -and !$InvalidOnly -and !$UnsignedOnly -and !($sig.SignerCertificate) ) { # Write-Debug ("You asked for Broken ({0}) or Trusted ({1}) or Valid ({2}) or Invalid ({3}) or Unsigned ({4}) and the cert is: ({5})" -f [int]$BrokenOnly, [int]$TrustedOnly, [int]$ValidOnly, [int]$InvalidOnly, [int]$UnsignedOnly, $sig.SignerCertificate) Write-Debug "$($sig.Status) - Not Signed: $Path" return } get-childItem $sig.Path } } Export-ModuleMember Set-AuthenticodeSignature,Get-AuthenticodeSignature,Test-Signature,Select-Signed,Get-UserCertificate # SIG # Begin signature block # MIIK0AYJKoZIhvcNAQcCoIIKwTCCCr0CAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUHoNib4Y35ha7fCzaYIyjS3sJ # HWGgggbEMIIGwDCCBKigAwIBAgIJAKpDRVMtv0LqMA0GCSqGSIb3DQEBBQUAMIHG # MQswCQYDVQQGEwJVUzERMA8GA1UECBMITmV3IFlvcmsxEjAQBgNVBAcTCVJvY2hl # c3RlcjEaMBgGA1UEChMRSHVkZGxlZE1hc3Nlcy5vcmcxHjAcBgNVBAsTFUNlcnRp # ZmljYXRlIEF1dGhvcml0eTErMCkGA1UEAxMiSm9lbCBCZW5uZXR0IENlcnRpZmlj # YXRlIEF1dGhvcml0eTEnMCUGCSqGSIb3DQEJARYYSmF5a3VsQEh1ZGRsZWRNYXNz # ZXMub3JnMB4XDTA4MDcwMjAzNTA1OVoXDTA5MDcwMjAzNTA1OVowgcAxCzAJBgNV # BAYTAlVTMREwDwYDVQQIEwhOZXcgWW9yazESMBAGA1UEBxMJUm9jaGVzdGVyMRow # GAYDVQQKExFIdWRkbGVkTWFzc2VzLm9yZzEuMCwGA1UECxMlaHR0cDovL0h1ZGRs # ZWRNYXNzZXMub3JnL0NvZGVDZXJ0LmNydDEVMBMGA1UEAxMMSm9lbCBCZW5uZXR0 # MScwJQYJKoZIhvcNAQkBFhhKYXlrdWxASHVkZGxlZE1hc3Nlcy5vcmcwggIiMA0G # CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXuceXJZYARJbSTU4hoh91goVp2POx # 6Mz/QZ6D5jcT/JNhdW2GwYQ9YUxNj8jkhXg2Ixbgb1djRGMFC/ekgRkgLxyiuhRh # NrVE1IdV4hT4as3idqnvWOi0S3z2R2EGdebqwm2mrRmq9+DbY+FGxuNwLboWZx8Z # roGlLLHRPzt9pabQq/Nu/FIFO+4JzZ8S5ZnEaKTm4dpD0g6j653OWYVvNXJbS/W4 # Dis5aRkHT1q1Gp02dYHh3NTKrpv1nus9BTDlJRwmU/FgGLNQIvnRwqVoBh+I7tVq # NIRnI1RpDTGyFEohbH8mRlwq3z4ijtb6j9boUJEqd8hQshzUMcALoTIR1tN/5APX # u2j4OqGFESM/OG0i2hLKbnP81u581aZT1BfVfQxvDuWrFiurMxllVGY1NvKkXwc8 # aOZktqMQWbWAs2bxZqERbOILXOmkL/mvPdy+e5yQveriHAhrDONu7a79ylreMHBR # XrmYJTK2G/aHvB5vrXjMPw0TBeph0sM2BN2eVzenAAMsIiGlXPXvtKrpKRiBdx5f # 9SV5dyUG2tR8ANDuc2AMB8FKICuMUd8Sx96p4FOBQhXhvF/RZcWZIW5o+A4sHvYE # /s4oiX7LxGrQK2abNiCVs9BDLI/EcSs/TP+ZskBqu7Qb+AVeevoY3T7skihuyC/l # h7EwqjfNpVQ9UwIDAQABo4G0MIGxMB0GA1UdDgQWBBTgB9XYJV/kJAvnkWmKDHsh # 7Cn3PzAfBgNVHSMEGDAWgBQ+5x4ah0JG0o4iUj0TebNd4MCVxTAJBgNVHRMEAjAA # MBEGCWCGSAGG+EIBAQQEAwIEEDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDAzALBgNV # HQ8EBAMCBsAwLAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRp # ZmljYXRlMA0GCSqGSIb3DQEBBQUAA4ICAQAw8B6+s48CZZo5h5tUeKV7OWNXKRG7 # xkyavMkXpEi58BSLutmE3O7smc3uvu3TdCXENNUlGrcq/KQ8y2eEI8QkHgT99VgX # r+v5xu2KnJXiOOIxi65EZybRFFFaGJNodTcrK8L/tY6QLF02ilOlEgfcc1sV/Sj/ # r60JS1iXIMth7nYZVjtWeYXOrsd+I+XwJuoVNJlELNdApOU4ZVNrPEuV+QRNMimj # lqIOv2tn9TDdNGUqaOCI0w+a1XQvapEPWETfQK+o9pvYINTswGDjNeb7Xz8ar2JB # 9IVs2xtxDohHB75kyRrlY1hkoY5j12ZhWOlm0L9Ks6XvmMtXJIjj0/m9Z+3s+9p6 # U7IYjz5NnzmDvtNUn2y9zxB/rUx/JqoUO3BWRKiLX0lvGRWJlzFr9978kH2SXxAD # rsKfzB7YZzMh9hZkGNlJf4T+HTB/OXG1jyfkyqQvhNB/tDAaq+ejDtKNBF4hMS7K # Z0B4vagIxFwMuTiei4UaOjrGzeCfT9w1Bmj6uLJme5ydQVM0V7z3Z6jR3LVq4c4s # Y1dfPmYlw62cbyV9Kb/H2hYw5K0OMX60LfLQZOzIPzAeRJ87NufwZnC1afxsSCmU # bvSx4kCMgRZMXw+d1SHRhh7z+06YTQjnUMmtTGt7DtUkU6I8LKEWF/mAzF7sq/7P # AyhPsbu91X5FuzGCA3YwggNyAgEBMIHUMIHGMQswCQYDVQQGEwJVUzERMA8GA1UE # CBMITmV3IFlvcmsxEjAQBgNVBAcTCVJvY2hlc3RlcjEaMBgGA1UEChMRSHVkZGxl # ZE1hc3Nlcy5vcmcxHjAcBgNVBAsTFUNlcnRpZmljYXRlIEF1dGhvcml0eTErMCkG # A1UEAxMiSm9lbCBCZW5uZXR0IENlcnRpZmljYXRlIEF1dGhvcml0eTEnMCUGCSqG # SIb3DQEJARYYSmF5a3VsQEh1ZGRsZWRNYXNzZXMub3JnAgkAqkNFUy2/QuowCQYF # Kw4DAhoFAKB4MBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZIhvcNAQkD # MQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwIwYJ # KoZIhvcNAQkEMRYEFIav5gxrUCeM18gHLn9rvM7Y9bSfMA0GCSqGSIb3DQEBAQUA # BIICAClTS+mIW7vAIsYB+MvbqD6oR5BW1TRXq5CAfPLK+XveUmYczvs4Ujx7TBAp # twJm4rR/nz9cEi+yI12R5YbYmVcfa2gxreXkp3BKWOvhYvfPggh07VssBc7Ik4q+ # ppqdD8tbh1lln8atkGaTfNm3h50es5KADSkMSErXlM+eMNAttnDElKzYszDlLkn4 # VTUrvqorx5kLpk7soOb7NdkqG4FnIBjGgpsCGcfkBZNzdIjJnnaXje5DF6MwLLKv # kBBXkmLXa4c+NpzDW9BhVa4VvfVPNpEMuOoJ9LxIXp4hWOcD4oAYGYbuqNpTzhsc # nrgebPHh1RmMbyShYCHIilMeLKJUgJqS7yCp+qAlxfKmtVKUJOMxJXZahDwLVImq # a89OiBDjsDtE2sKdlfVu+rFOa/itWa0NvMX6Qn5+jo/D//3EddYTPIUQnPjYcdo2 # RveOsun6apOo749M7WSTSCzvkwR86TpQU9sYyrhCMdOPdhDrqRgGwXpjUhzjG4Wl # Xk18XlpuqAMA7nQlcZ2SSIu7hgEXRR3zP/rXWvjcxan42qai3pFt9JBshieWveE2 # VveewNAv4ltAjE+80DXGf81q92uBB9ym3g9vbRRJY42J/4MG5Z9lL0SbDY54LiJh # BA/Z0IU5PGgpt5PEpejJqx4o/URH7bZTI5x16NWXhvQDJJyb # SIG # End signature block
combined_dataset/train/non-malicious/3954.ps1
3954.ps1
function Test-ExpressRoutePortsLocationRead { $vExpressRoutePortsLocationList = Get-AzExpressRoutePortsLocation Assert-NotNull $vExpressRoutePortsLocationList Assert-True { $vExpressRoutePortsLocationList.Count -gt 0 } Assert-NotNull $vExpressRoutePortsLocationList[0].Address Assert-NotNull $vExpressRoutePortsLocationList[0].Contact Assert-NotNull $vExpressRoutePortsLocationList[0].AvailableBandwidths Assert-True { $vExpressRoutePortsLocationList[0].AvailableBandwidths.Count -eq 0 } $vExpressRoutePortsLocation = Get-AzExpressRoutePortsLocation -LocationName "Cheyenne-ERDirect" Assert-NotNull $vExpressRoutePortsLocation Assert-NotNull $vExpressRoutePortsLocation.Address Assert-NotNull $vExpressRoutePortsLocation.Contact Assert-NotNull $vExpressRoutePortsLocation.AvailableBandwidths Assert-True { $vExpressRoutePortsLocation.AvailableBandwidths.Count -eq 1 } }
combined_dataset/train/non-malicious/sample_29_75.ps1
sample_29_75.ps1
@(echo off) > $null if #ftw NEQ '' goto :init ($true){ $Error.clear(); } # Copyright (c) Microsoft Corporation. # Licensed under the MIT License. # wrapper script for vcpkg # this is intended to be dot-sourced and then you can use the vcpkg() function # Workaround for $IsWindows not existing in Windows PowerShell if (-Not (Test-Path variable:IsWindows)) { $IsWindows = $true } function download($url, $path) { $wc = New-Object net.webclient Write-Host "Downloading '$url' -> '$path'" $wc.DownloadFile($url, $path); $wc.Dispose(); if( (get-item $path).Length -ne $wc.ResponseHeaders['Content-Length'] ) { throw "Download of '$url' failed. Check your internet connection." } if (-Not $IsWindows) { chmod +x $path } return $path } # Determine VCPKG_ROOT if (Test-Path "$PSScriptRoot/.vcpkg-root") { $env:VCPKG_ROOT = "$PSScriptRoot" } elseif (-Not (Test-Path env:VCPKG_ROOT)) { $env:VCPKG_ROOT = "$HOME/.vcpkg" } $VCPKG = Join-Path $env:VCPKG_ROOT vcpkg if ($IsWindows) { $VCPKG += '.exe' } $SCRIPT:VCPKG_VERSION_MARKER = Join-Path $env:VCPKG_ROOT vcpkg-version.txt $SCRIPT:VCPKG_INIT_VERSION = '2024-01-11' function bootstrap-vcpkg { if (-Not ($VCPKG_INIT_VERSION -eq 'latest') ` -And (Test-Path $VCPKG_VERSION_MARKER) ` -And ((Get-Content -Path $VCPKG_VERSION_MARKER -Raw).Trim() -eq $VCPKG_INIT_VERSION)) { return $True } Write-Host "Installing vcpkg to $env:VCPKG_ROOT" New-Item -ItemType Directory -Force $env:VCPKG_ROOT | Out-Null if ($IsWindows) { download https://github.com/microsoft/vcpkg-tool/releases/download/2024-01-11/vcpkg.exe $VCPKG } elseif ($IsMacOS) { download https://github.com/microsoft/vcpkg-tool/releases/download/2024-01-11/vcpkg-macos $VCPKG } elseif (Test-Path '/etc/alpine-release') { download https://github.com/microsoft/vcpkg-tool/releases/download/2024-01-11/vcpkg-muslc $VCPKG } else { download https://github.com/microsoft/vcpkg-tool/releases/download/2024-01-11/vcpkg-glibc $VCPKG } & $VCPKG bootstrap-standalone if(-Not $?) { Write-Error "Bootstrap failed." return $False } Write-Host "Bootstrapped vcpkg: $env:VCPKG_ROOT" return $True } if(-Not (bootstrap-vcpkg)) { throw "Unable to install vcpkg." } # Export vcpkg to the current shell. New-Module -name vcpkg -ArgumentList @($VCPKG) -ScriptBlock { param($VCPKG) function vcpkg() { # setup the postscript file # Generate 31 bits of randomness, to avoid clashing with concurrent executions. $env:Z_VCPKG_POSTSCRIPT = Join-Path ([System.IO.Path]::GetTempPath()) "VCPKG_tmp_$(Get-Random -SetSeed $PID).ps1" & $VCPKG @args # dot-source the postscript file to modify the environment if (Test-Path $env:Z_VCPKG_POSTSCRIPT) { $postscr = Get-Content -Raw $env:Z_VCPKG_POSTSCRIPT if( $postscr ) { iex $postscr } Remove-Item -Force -ea 0 $env:Z_VCPKG_POSTSCRIPT,env:Z_VCPKG_POSTSCRIPT } } } | Out-Null if ($args.Count -ne 0) { return vcpkg @args } return <# :init :: If the first line of this script created a file named $null, delete it IF EXIST $null DEL $null :: Figure out where VCPKG_ROOT is IF EXIST "%~dp0.vcpkg-root" ( SET VCPKG_ROOT=%~dp0 ) IF "%VCPKG_ROOT:~-1%"=="\" ( SET VCPKG_ROOT=%VCPKG_ROOT:~0,-1% ) IF "%VCPKG_ROOT%"=="" ( SET VCPKG_ROOT=%USERPROFILE%\.vcpkg ) :: Call powershell which may or may not invoke bootstrap if there's a version mismatch SET Z_POWERSHELL_EXE= FOR %%i IN (pwsh.exe powershell.exe) DO ( IF EXIST "%%~$PATH:i" ( SET Z_POWERSHELL_EXE=%%~$PATH:i GOTO :gotpwsh ) ) :gotpwsh "%Z_POWERSHELL_EXE%" -NoProfile -ExecutionPolicy Unrestricted -Command "iex (get-content \"%~dfp0\" -raw)#" IF ERRORLEVEL 1 ( :: leak VCPKG_ROOT SET Z_POWERSHELL_EXE= EXIT /B 1 ) SET Z_POWERSHELL_EXE= :: Install the doskey DOSKEY vcpkg="%VCPKG_ROOT%\vcpkg-cmd.cmd" $* :: If there were any arguments, also invoke vcpkg with them IF "%1"=="" GOTO fin CALL "%VCPKG_ROOT%\vcpkg-cmd.cmd" %* :fin EXIT /B #> # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDlrFEfQ4/UJQ7c # es1EhWoOv9UxIu72ZUEiJAAzsUgLE6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH9o # 5jIm/f4FUd8YVMokIkamDyBdZ4pdaArVelUDLZ/XMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAIQUvyCErcs7Cmo2xQ5Mjd0ky5xGjvqMVI/s/ # kAmsXZ6OQVhz8qJdH0VHVnppAvPtTZBjAosyBl6F73wx1RGHsqKRCwuZ/RlSjmqI # oDE1xS1JIWDcV8YEWSSCOaqcJFSy0+5FCEoSQdE7wBOtTBLNxXSpkv/IqXNqjue7 # V81OrZCKgF3Gr232rYkOQadxQ14EgDs2wZKWMTpSwFVchwmyMZD9+M0p3Pq3OoqO # KCHNos+k4axXL4MS93VTMTFyqkdqjZt+426VM8onm0DVWemAd7se5oq05sopVfq1 # t+WNsD/TpOouRcReU9dGe7jGslGMzSp+Xm+V+pfCzyjqe/PW4aGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDTTeETj60DYVoeJWpMF3Bxevx6Zl0yKgXy # cYQktKd9ngIGZXsWaqwzGBMyMDI0MDExMTAyNTkxNi4zNzRaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAAB # AAAB1DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzA1MjUxOTEyMjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybW # cSAbu8FLwTEtOvw3uXMpa1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4 # CpXB1Hwn1YYovuYujoQV9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyyS # vjwPvZuxH8RNcOOB8ABDhJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1 # F3lt7Ni47pJMGMLqZQCK7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQ # P/7c7oPJPDFgpbGB2HRJaE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1Ls # JmFWJHbqGr6o0irW7IqDkf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBk # rmil0H/tv3HYyE6A490ZFEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/ # ZGHJ2cbuIer9umQYu/Fz1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qm # YRymjDmpfzZvfvGBGUbOpx+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuN # X1Tpz4KZLM8GlzZLje3aHfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/ # wHCt4HyXW4WgTGPizyExTQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6 # EoB5Hedcsru0DHZJMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdR # hYlZ9Bk4/bLzLOzq+wcC7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL # 4PizKnStLDBsWT+ds1hayNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04 # PGjcFhH1gGRphz+tcDNK/CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcT # V9W13cm2FD5F/XWO37Ti+G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40 # YIkTNnuco6ny7vEBmWFjcr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rv # EQ/PUJi3popYsrQKuogphdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHh # eQNd/a3X/2zpSwEROOcy1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+R # XUB4A6UL1E1Xjtzr/b9qz9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYA # TVI2lwL9QDSEt8F0RW6LekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71Hyil # telaMhRUsNVkaKzAJrUoESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy # 3vUDJpjUTYLtaTWkQtz6UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQAtM12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6UnVATAi # GA8yMDI0MDExMTAyNDYyNVoYDzIwMjQwMTEyMDI0NjI1WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpSdUBAgEAMAoCAQACAgssAgH/MAcCAQACAhM9MAoCBQDpSyaB # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAM5TzyE/eIVqJ4COUAAL+0uC # g8JDTMPAV1S4yC7O4SQYNj3pYTUpcan5uApmnIqGXktxK/x/GZFY7arO70qLArqk # ETA/FpwDhze08qlUG3PBGo0mm1Rap4HBaYac8nVWf/6epWnU9CD5sEnAGesbCJKI # TPo3ecHNhcDE3Y65LRD4+pfmCW6IBB3CBrneEaE4tCRsKYQ82RkW3VUYScTztVVK # 2MwQvUfpxZG12/2503H93BrBBBJz1VJCeEKf+wNCkHTZPASM+PJfhXzVhbI1HSLP # LHef5amcP9NDYkz92ykB8DKmMQVLEibtALyMetqb+s4o4scgVEuvNF6fefHUn/wx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AdTk6QMvwKxprAABAAAB1DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDoNMKuv7HUEvFlGv8TleE3 # NfilRQDFnjgJYxHQXuarijCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzq # h/rYFKXOlzvWS5xCtPi9aU+fBUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQgxnyf # hcnF4knItJJINT/OE2Iu5QMRrm9pyS33jTzIP5AwDQYJKoZIhvcNAQELBQAEggIA # Nado2lPQ84KAAE1sWZgJ6PgsPmttorIahCn7gM7iQMJWgQ/silDLCLhnJTybONiC # dGSby8Ju0l5tN8g+DrNRMRPKQp3YHpZUXPeWDL8i9LAQme0MtuyEf6d4bJcI9Oa1 # +yYcz1k9YUJsaQrRRlNf4U1gGl6pAEef8RLotCHDhN5GKc9WItAFOhZxnrUY9IiO # nGKpj9cmzCbPvhyP279BRypSn821CJWJjYaFS3PRXwIQdZJIN+bYreqP38P3HyjX # JyLVSr4ducjiUj++mBpouLI/3L6sq4wfzT3HTl+UsglreZnXMF0TeeA3638t2ItY # XStx/+qlMucDDQNLpOeZGjKgtAbH9vNHNmvkvSCgXjNAMkUsIt47ENujTFEmjiRE # TvYXyEqKp8Mr/VtsGTsVTSrGcAhgEvbS4x+WnqcSFe1SS7g350fOQlE1aSY9MGgw # SyuUBDj9+O3+pQZTvMtFE0tQk3SNVeg/kH0C/U4uGu/IoIm4FBXA3pQlCMq+w2ME # hQ161gnq7Wpif/mATVijy8THJE+VKKOqzZzH43lI0kr5BMzjaNRFaftWWBBCmrWR # XdhDr+Kxc66eKNLVfuDY0/a0zIqSFA+OIKlizw5Ls1vd6u+P/DY7EI5hKL2EENQP # t35boAgokf+odHA4kxYkmg0mZzm+OFrzeUZcj6QkXuU= # SIG # End signature block