full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/1415.ps1
1415.ps1
function Convert-CXmlFile { [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Mandatory=$true)] [string] $Path, [Parameter(Mandatory=$true,ParameterSetName='ByXdtFile')] [string] $XdtPath, [Parameter(Mandatory=$true,ParameterSetName='ByXdtXml')] [xml] $XdtXml, [Parameter(Mandatory=$true)] [string] $Destination, [string[]] $TransformAssemblyPath = @(), [Switch] $Force ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not (Test-Path -Path $Path -PathType Leaf)) { Write-Error ("Path '{0}' not found." -f $Path) return } if( $PSCmdlet.ParameterSetName -eq 'ByXdtXml' ) { $xdtPathForInfoMsg = '' $xdtPathForShouldProcess = 'raw XDT XML' $XdtPath = 'Carbon_Convert-XmlFile_{0}' -f ([IO.Path]::GetRandomFileName()) $XdtPath = Join-Path $env:TEMP $XdtPath $xdtXml.Save( $XdtPath ) } else { if( -not (Test-Path -Path $XdtPath -PathType Leaf) ) { Write-Error ("XdtPath '{0}' not found." -f $XdtPath) return } $XdtPath = Resolve-CFullPath -Path $XdtPath $xdtPathForShouldProcess = $XdtPath $xdtPathForInfoMsg = 'with ''{0}'' ' -f $XdtPath } $Path = Resolve-CFullPath -Path $Path $Destination = Resolve-CFullPath -Path $Destination $TransformAssemblyPath = $TransformAssemblyPath | ForEach-Object { Resolve-CFullPath -path $_ } if( $TransformAssemblyPath ) { $badPaths = $TransformAssemblyPath | Where-Object { -not (Test-Path -Path $_ -PathType Leaf) } if( $badPaths ) { $errorMsg = "TransformAssemblyPath not found:`n * {0}" -f ($badPaths -join "`n * ") Write-Error -Message $errorMsg -Category ObjectNotFound return } } if( $Path -eq $Destination ) { $errorMsg = 'Can''t transform Path {0} onto Destination {1}: Path is the same as Destination. XDT is designed to transform an XML file from a known state to a new XML file. Please supply a new, unique path for the Destination XML file.' -f ` $Path,$Destination Write-Error -Message $errorMsg -Category InvalidOperation -RecommendedAction 'Set Destination parameter to a unique path.' return } if( -not $Force -and (Test-Path -Path $Destination -PathType Leaf) ) { $errorMsg = 'Can''t transform ''{0}'': Destination ''{1}'' exists. Use the -Force switch to overwrite.' -f $Path,$Destination Write-Error $errorMsg -Category InvalidOperation -RecommendedAction 'Use the -Force switch to overwrite.' return } $scriptBlock = { param( [Parameter(Position=0)] [string] $CarbonBinDir, [Parameter(Position=1)] [string] $Path, [Parameter(Position=2)] [string] $XdtPath, [Parameter(Position=3)] [string] $Destination, [Parameter(Position=4)] [string[]] $TransformAssemblyPath ) Add-Type -Path (Join-Path -Path $CarbonBinDir -ChildPath "Microsoft.Web.XmlTransform.dll") Add-Type -Path (Join-Path -Path $CarbonBinDir -ChildPath "Carbon.Xdt.dll") if( $TransformAssemblyPath ) { $TransformAssemblyPath | ForEach-Object { Add-Type -Path $_ } } function Convert-CXmlFile { [CmdletBinding()] param( [string] $Path, [string] $XdtPath, [string] $Destination ) [Microsoft.Web.XmlTransform.XmlTransformation]$xmlTransform = $null [Microsoft.Web.XmlTransform.XmlTransformableDocument]$document = $null try { $document = New-Object Microsoft.Web.XmlTransform.XmlTransformableDocument $document.PreserveWhitespace = $true $document.Load($Path) $logger = New-Object Carbon.Xdt.PSHostUserInterfaceTransformationLogger $PSCmdlet.CommandRuntime $xmlTransform = New-Object Microsoft.Web.XmlTransform.XmlTransformation $XdtPath,$logger $success = $xmlTransform.Apply($document) if($success) { $document.Save($Destination) } } finally { if( $xmlTransform ) { $xmlTransform.Dispose() } if( $document ) { $document.Dispose() } } } $PsBoundParameters.Remove( 'CarbonBinDir' ) $PSBoundParameters.Remove( 'TransformAssemblyPath' ) Convert-CXmlFile @PSBoundParameters } try { if( $PSCmdlet.ShouldProcess( $Path, ('transform with {0} -> {1}' -f $xdtPathForShouldProcess,$Destination) ) ) { $argumentList = $carbonAssemblyDir,$Path,$XdtPath,$Destination,$TransformAssemblyPath if( $PSVersionTable.CLRVersion.Major -ge 4 ) { Invoke-Command -ScriptBlock $scriptBlock -ArgumentList $argumentList } else { Invoke-CPowerShell -Command $scriptBlock -Args $argumentList -Runtime 'v4.0' } } } finally { if( $PSCmdlet.ParameterSetName -eq 'ByXdtXml' ) { Remove-Item -Path $XdtPath } } }
combined_dataset/train/non-malicious/778.ps1
778.ps1
enum PsesLogLevel { Diagnostic Verbose Normal Warning Error } enum PsesLogMessageType { Log Exception HandledException Request Response Notification } enum PsesNotificationSource { Unknown Client Server } class PsesLogMessage { [string]$Data [int]$DataSize PsesLogMessage([string]$Data) { $this.Data = $Data $this.DataSize = $Data.Length } [string] ToString() { $ofs = '' $ellipsis = if ($this.Data.Length -ge 100) { "..." } else { "" } return "$($this.Data[0..99])$ellipsis, DataSize: $($this.Data.Length)" } } class PsesJsonRpcMessage { [string]$Name [int]$Id [psobject]$Data [int]$DataSize PsesJsonRpcMessage([string]$Name, [int]$Id, [psobject]$Data, [int]$DataSize) { $this.Name = $Name $this.Id = $Id $this.Data = $Data $this.DataSize = $DataSize } [string] ToString() { return "Name: $($this.Name) Id: $($this.Id), DataSize: $($this.DataSize)" } } class PsesNotificationMessage { [string]$Name [PsesNotificationSource]$Source [psobject]$Data [int]$DataSize PsesNotificationMessage([string]$Name, [PsesNotificationSource]$Source, [psobject]$Data, [int]$DataSize) { $this.Name = $Name $this.Source = $Source $this.Data = $Data $this.DataSize = $DataSize } [string] ToString() { if (($this.Name -eq '$/cancelRequest') -and ($this.Data -ne $null)) { return "Name: $($this.Name) Source: $($this.Source), Id: $($this.Data.params.id)" } return "Name: $($this.Name) Source: $($this.Source), DataSize: $($this.DataSize)" } } class PsesLogEntry { [int]$Index [DateTime]$Timestamp [string]$TimestampStr [PsesLogLevel]$LogLevel [int]$ThreadId [string]$Method [string]$File [int]$LineNumber [PsesLogMessageType]$LogMessageType [psobject]$Message PsesLogEntry( [int] $Index, [DateTime] $Timestamp, [string] $TimestampStr, [PsesLogLevel] $LogLevel, [int] $ThreadId, [string] $Method, [string] $File, [int] $LineNumber, [PsesLogMessageType] $LogMessageType, [psobject] $Message) { $this.Index = $Index $this.Timestamp = $Timestamp $this.TimestampStr = $TimestampStr $this.LogLevel = $LogLevel $this.ThreadId = $ThreadId $this.Method = $Method $this.File = $File $this.LineNumber = $LineNumber $this.LogMessageType = $LogMessageType $this.Message = $Message } } class PsesLogEntryElapsed { [int]$Index [DateTime]$Timestamp [string]$TimestampStr [int]$ElapsedMilliseconds [PsesLogLevel]$LogLevel [int]$ThreadId [string]$Method [string]$File [int]$LineNumber [PsesLogMessageType]$LogMessageType [psobject]$Message PsesLogEntryElapsed([PsesLogEntry]$LogEntry, [int]$ElapsedMilliseconds) { $this.Index = $LogEntry.Index $this.Timestamp = $LogEntry.Timestamp $this.TimestampStr = $LogEntry.TimestampStr $this.LogLevel = $LogEntry.LogLevel $this.ThreadId = $LogEntry.ThreadId $this.Method = $LogEntry.Method $this.File = $LogEntry.File $this.LineNumber = $LogEntry.LineNumber $this.LogMessageType = $LogEntry.LogMessageType $this.Message = $LogEntry.Message $this.ElapsedMilliseconds = $ElapsedMilliseconds } }
combined_dataset/train/non-malicious/552.ps1
552.ps1
function Get-SPOSolutionId { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$solutionName ) $fileUrl = Join-SPOParts -Separator '/' -Parts $clientContext.Site.ServerRelativeUrl, "/_catalogs/solutions/", $solutionName $solution = $clientContext.Site.RootWeb.GetFileByServerRelativeUrl($fileUrl) $clientContext.Load($solution.ListitemAllFields) $clientContext.ExecuteQuery() return $solution.ListItemAllFields.Id }
combined_dataset/train/non-malicious/574.ps1
574.ps1
function Get-SPOPrincipal { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string]$username ) $principal = $clientContext.Web.EnsureUser($username) $clientContext.Load($principal) $clientContext.ExecuteQuery() return $principal }
combined_dataset/train/non-malicious/sample_17_33.ps1
sample_17_33.ps1
@{ RootModule = 'PSModule.psm1' ModuleVersion = '2.2.5' GUID = '1d73a601-4a6c-43c5-ba3f-619b18bbb404' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' Description = 'PowerShell module with commands for discovering, installing, updating and publishing the PowerShell artifacts like Modules, DSC Resources, Role Capabilities and Scripts.' PowerShellVersion = '3.0' FormatsToProcess = 'PSGet.Format.ps1xml' FunctionsToExport = @( 'Find-Command', 'Find-DSCResource', 'Find-Module', 'Find-RoleCapability', 'Find-Script', 'Get-CredsFromCredentialProvider', 'Get-InstalledModule', 'Get-InstalledScript', 'Get-PSRepository', 'Install-Module', 'Install-Script', 'New-ScriptFileInfo', 'Publish-Module', 'Publish-Script', 'Register-PSRepository', 'Save-Module', 'Save-Script', 'Set-PSRepository', 'Test-ScriptFileInfo', 'Uninstall-Module', 'Uninstall-Script', 'Unregister-PSRepository', 'Update-Module', 'Update-ModuleManifest', 'Update-Script', 'Update-ScriptFileInfo') VariablesToExport = 'PSGetPath' AliasesToExport = @('inmo', 'fimo', 'upmo', 'pumo') FileList = @('PSModule.psm1', 'PSGet.Format.ps1xml', 'PSGet.Resource.psd1') RequiredModules = @(@{ModuleName = 'PackageManagement'; ModuleVersion = '1.4.4' }) PrivateData = @{ "PackageManagementProviders" = 'PSModule.psm1' "SupportedPowerShellGetFormatVersions" = @('1.x', '2.x') PSData = @{ Tags = @('Packagemanagement', 'Provider', 'PSEdition_Desktop', 'PSEdition_Core', 'Linux', 'Mac') ProjectUri = 'https://go.microsoft.com/fwlink/?LinkId=828955' LicenseUri = 'https://go.microsoft.com/fwlink/?LinkId=829061' ReleaseNotes = @' ### 2.2.5 - Security patch for code injection bug ### 2.2.4.1 - Remove catalog file ### 2.2.3 - Update `HelpInfoUri` to point to the latest content (#560) - Improve discovery of usable nuget.exe binary (Thanks bwright86!) (#558) ### 2.2.2 Bug Fix - Update casing of DscResources output ### 2.2.1 Bug Fix - Allow DscResources to work on case sensitive platforms (#521) - Fix for failure to return credential provider when using private feeds (#521) ## 2.2 Bug Fix - Fix for prompting for credentials when passing in -Credential parameter when using Register-PSRepository ## 2.1.5 New Features - Add and remove nuget based repositories as a nuget source when nuget client tool is installed (#498) Bug Fix - Fix for 'Failed to publish module' error thrown when publishing modules (#497) ## 2.1.4 - Fixed hang while publishing some packages (#478) ## 2.1.3 New Features - Added -Scope parameter to Update-Module (Thanks @lwajswaj!) (#471) - Added -Exclude parameter to Publish-Module (Thanks @Benny1007!) (#191) - Added -SkipAutomaticTags parameter to Publish-Module (Thanks @awickham10!) (#452) Bug Fix - Fixed issue with finding modules using macOS and .NET Core 3.0 ## 2.1.2 New Feature - Added support for registering repositories with special characters ## 2.1.1 - Fix DSC resource folder structure ## 2.1.0 Breaking Change - Default installation scope for Update-Module and Update-Script has changed to match Install-Module and Install-Script. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times. For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser. (#421) Bug Fixes - Update-ModuleManifest no longer clears FunctionsToExport, AliasesToExport, nor NestModules (#415 & #425) (Thanks @pougetat and @tnieto88!) - Update-Module no longer changes repository URL (#407) - Update-ModuleManifest no longer preprends 'PSGet_' to module name (#403) (Thanks @ThePoShWolf) - Update-ModuleManifest now throws error and fails to update when provided invalid entries (#398) (Thanks @pougetat!) - Ignore files no longer being included when uploading modules (#396) New Features - New DSC resource, PSRepository (#426) (Thanks @johlju!) - Piping of PS respositories (#420) - utf8 support for .nuspec (#419) ## 2.0.4 Bug Fix * Remove PSGallery availability checks (#374) ## 2.0.3 Bug fixes and Improvements * Fix CommandAlreadyAvailable error for PackageManagement module (#333) * Remove trailing whitespace when value is not provided for Get-PSScriptInfoString (#337) (Thanks @thomasrayner) * Expanded aliases for improved readability (#338) (Thanks @lazywinadmin) * Improvements for Catalog tests (#343) * Fix Update-ScriptInfoFile to preserve PrivateData (#346) (Thanks @tnieto88) * Import modules with many commands faster (#351) New Features * Tab completion for -Repository parameter (#339) and for Publish-Module -Name (#359) (Thanks @matt9ucci) ## 2.0.1 Bug fixes - Resolved Publish-Module doesn't report error but fails to publish module (#316) - Resolved CommandAlreadyAvailable error while installing the latest version of PackageManagement module (#333) ## 2.0.0 Breaking Change - Default installation scope for Install-Module, Install-Script, and Install-Package has changed. For Windows PowerShell (version 5.1 or below), the default scope is AllUsers when running in an elevated session, and CurrentUser at all other times. For PowerShell version 6.0.0 and above, the default installation scope is always CurrentUser. ## 1.6.7 Bug fixes - Resolved Install/Save-Module error in PSCore 6.1.0-preview.4 on Ubuntu 18.04 OS (WSL/Azure) (#313) - Updated error message in Save-Module cmdlet when the specified path is not accessible (#313) - Added few additional verbose messages (#313) ## 1.6.6 Dependency Updates * Add dependency on version 4.1.0 or newer of NuGet.exe * Update NuGet.exe bootstrap URL to https://aka.ms/psget-nugetexe Build and Code Cleanup Improvements * Improved error handling in network connectivity tests. Bug fixes - Change Update-ModuleManifest so that prefix is not added to CmdletsToExport. - Change Update-ModuleManifest so that parameters will not reset to default values. - Specify AllowPrereleseVersions provider option only when AllowPrerelease is specified on the PowerShellGet cmdlets. ## 1.6.5 New features * Allow Pester/PSReadline installation when signed by non-Microsoft certificate (#258) - Whitelist installation of non-Microsoft signed Pester and PSReadline over Microsoft signed Pester and PSReadline. Build and Code Cleanup Improvements * Splitting of functions (#229) (Thanks @Benny1007) - Moves private functions into respective private folder. - Moves public functions as defined in PSModule.psd1 into respective public folder. - Removes all functions from PSModule.psm1 file. - Dot sources the functions from PSModule.psm1 file. - Uses Export-ModuleMember to export the public functions from PSModule.psm1 file. * Add build step to construct a single .psm1 file (#242) (Thanks @Benny1007) - Merged public and private functions into one .psm1 file to increase load time performance. Bug fixes - Fix null parameter error caused by MinimumVersion in Publish-PackageUtility (#201) - Change .ExternalHelp link from PSGet.psm1-help.xml to PSModule-help.xml in PSModule.psm1 file (#215) - Change Publish-* to allow version comparison instead of string comparison (#219) - Ensure Get-InstalledScript -RequiredVersion works when versions have a leading 0 (#260) - Add positional path to Save-Module and Save-Script (#264, #266) - Ensure that Get-AuthenticodePublisher verifies publisher and that installing or updating a module checks for approprite catalog signature (#272) - Update HelpInfoURI to 'http://go.microsoft.com/fwlink/?linkid=855963' (#274) ## 1.6.0 New features * Prerelease Version Support (#185) - Implemented prerelease versions functionality in PowerShellGet cmdlets. - Enables publishing, discovering, and installing the prerelease versions of modules and scripts from the PowerShell Gallery. - [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/PrereleaseModule) * Enabled publish cmdlets on PWSH and Nano Server (#196) - Dotnet command version 2.0.0 or newer should be installed by the user prior to using the publish cmdlets on PWSH and Windows Nano Server. - Users can install the dotnet command by following the instructions specified at https://aka.ms/dotnet-install-script. - On Windows, users can install the dotnet command by running *Invoke-WebRequest -Uri 'https://dot.net/v1/dotnet-install.ps1' -OutFile '.\dotnet-install.ps1'; & '.\dotnet-install.ps1' -Channel Current -Version '2.0.0'* - Publish cmdlets on Windows PowerShell supports using the dotnet command for publishing operations. Breaking Change - PWSH: Changed the installation location of AllUsers scope to the parent of $PSHOME instead of $PSHOME. It is the SHARED_MODULES folder on PWSH. Bug fixes - Update HelpInfoURI to 'https://go.microsoft.com/fwlink/?linkid=855963' (#195) - Ensure MyDocumentsPSPath path is correct (#179) (Thanks @lwsrbrts) ## 1.5.0.0 New features * Added support for modules requiring license acceptance (#150) - [Documentation](https://docs.microsoft.com/en-us/powershell/gallery/psget/module/RequireLicenseAcceptance) * Added version for REQUIREDSCRIPTS (#162) - Enabled following scenarios for REQUIREDSCRIPTS - [1.0] - RequiredVersion - [1.0,2.0] - Min and Max Version - (,1.0] - Max Version - 1.0 - Min Version Bug fixes * Fixed empty version value in nuspec (#157) ## 1.1.3.2 * Disabled PowerShellGet Telemetry on PS Core as PowerShell Telemetry APIs got removed in PowerShell Core beta builds. (#153) * Fixed for DateTime format serialization issue. (#141) * Update-ModuleManifest should add ExternalModuleDependencies value as a collection. (#129) ## 1.1.3.1 New features * Added `PrivateData` field to ScriptFileInfo. (#119) Bug fixes ## 1.1.2.0 Bug fixes ## 1.1.1.0 Bug fixes ## 1.1.0.0 * Initial release from GitHub. * PowerShellCore support. ## For full history of release notes see changelog: https://github.com/PowerShell/PowerShellGet/blob/master/CHANGELOG.md '@ } } HelpInfoURI = 'http://go.microsoft.com/fwlink/?linkid=2113539' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCRNShWem0qs5De # OoNTMpUMZmnlgRrJHCT4bl+44h9Jy6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN08RC17KKEUhfMSj3scTYcg # x1d7sFH+JkR037Tslb3+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbcxqITK5v1Ot2pnljbqyQCO2WlIMS4WojH/TYVqDWsg9xWhj7mOsCjEW # F28L7N8RC32euTTft3Ucnvf02t+DSCc8TbuJMGZM0T6qSTh0Kkg76AC8k0jprbfV # nupgErySLUIyCfeNfyPE1Bm5PA4yMohBBl4d0KkAXrTNA7gdtjS9sI3u2DxHCiR5 # 87hL2m8hWTRh1apZz9OvehGLtIpjq15HE0W/4RVx8YPUblTcHq32Z9J2973d+4eB # IEJFa2YbeO37hF0htreZ+y+QtdXDPr2qALjKNLNmKQSORzkRg/0eERW9H1ZAcqHZ # nDEawRWYVc8CA5srPfAUF8MCZPDBhaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBmLpPXZd9q8vtvKs7ublRpx4IDJUKdyqAz+80RAaUQDwIGZbqj1zJP # GBMyMDI0MDIxNDIxMDAyNy4xMDhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl3lHMwIhgPMjAyNDAyMTUwMzM1MTVaGA8yMDI0MDIxNjAzMzUxNVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XeUcwIBADAKAgEAAgID+AIB/zAHAgEAAgITJjAK # AgUA6Xjl8wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEPF8M/MNoD45ZGB # Kw0xpPIu9NsrfUH8ac6df880DomsAtv729JUMLYmLY5us8mDxazuqtXiGgpQz5rk # 955j/vZbbx0OpN4lcUoRPLo20Rl1IhiDihXTtUJJPCw3qVOZGE6noa64svoiAf1/ # gO1CiHFWYlVaioymlvwueb8U+5i5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQggFSrHQepNwGpiZ/KPctH6DA6CcfMIWvxY0FnCIu+LBswgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH # 9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 5Y9qwPM9tAujAAEAAAHlMCIEILVnBgmprI+GG6P8gyh9eD5dz8rCkLZBc+6WmC4Q # VECoMA0GCSqGSIb3DQEBCwUABIICAE8gL+OJZq73LvewYdmSxbFD003CbzrugG8p # 3v937EBNnL8zN3pOm9Itb1LfIbtbPy4LkiiTU8viQy5Y/7zEZ1jJbCNCX8Kb+JRR # g4jme1z7WPfcLRPKyZQom0dleKF5f3NefMhaVce/wdIWrjwbyfl5QUNl+9PYFeTA # jRMGN3MOUu876KaZg90qMvn9mMvk4lRDT9Zw790P/AAdFA8VnoPDBnVVphqEGXAV # ZYNJQV8v7FkVN81PkLkwevlamzCuoTW4mAOipGDl59tT+8JjAbPJTeW+AvpDMke3 # SYZhuf9iex80cf7CBlBlJ7/qWWskMiTspqoDRguvpHYJip6i/wkMpNwxbLq8Lw82 # 1JM2CXo65pIuRP9QV7ickIZ0urdaDXt+993fpUZemdaVOyb3gsz0o1uj3xq1OUWY # nI9WTvWg0B2zt506na4js1Sv5lxUh9o5dheJZ04yyaCTSJwKW6+KgTJV1B5hP3BW # tI+L9foqaC99XAXsPdSVLFz26gx9iPujHGrX6HLdcvXpNbX7Y1Yes+1ljKN+st3Q # Ab6aGnOoEJ0Vov9EeNwDVz0z5+13e5Oii4DhVhDZcDd7Dk0C3JNVbw4KBNJuPTyd # dgYm4frgHtkOv0pf0awO+823ZRLXjWG8PEKcUigG+4tbMkZYaL1SXQJud4gCFPvM # WnIkSENY # SIG # End signature block
combined_dataset/train/non-malicious/Binary Clock_1.ps1
Binary Clock_1.ps1
function get-binary($number,$words=1+(1*[int]($number -gt 255))) { # Takes the passed numerical value and converts to a Binary word. # Pads 0 to the left to make it a proper set of 8 or 16 # # If you use this function outside of the clock, it is automatically # designed to generate a 16 bit output padded if the value is greater # than 255 return [convert]::tostring($number,2).padleft(8*$words,"0") } Clear-Host Do { # Get the Current Date/Time $Current=GET-DATE #Build a String with the Hours, Minutes and Seconds in Binary $output=(Get-Binary $current.hour)+":"+(get-binary $Current.minute)+":"+(Get-Binary $Current.Second) # Remember our location $location=$Host.UI.RawUI.CursorPosition # Send output to the screen Write-Host $output # The Position back $Host.UI.RawUI.CursorPosition=$location # Take a nap for a second Start-sleep 1 } until ($FALSE) # Do it over and over and over since $FALSE will never be $TRUE
combined_dataset/train/non-malicious/Get-TwitterReply.ps1
Get-TwitterReply.ps1
# Its a modification from the version in http://blogs.technet.com/jamesone/archive/2009/02/16/how-to-drive-twitter-or-other-web-tools-with-powershell.aspx # usees https and gets all replies Function Get-TwitterReply { param ($username, $password) if ($WebClient -eq $null) {$Global:WebClient=new-object System.Net.WebClient } $WebClient.Credentials = (New-Object System.Net.NetworkCredential -argumentList $username, $password) $page = 0 $ret = @() do { $Page ++ $replies = ([xml]$webClient.DownloadString("https://twitter.com/statuses/replies.xml?page=$Page") ).statuses.status $ret += $replies Write-host $replies.count } while ($replies.count -gt 0 ) # sometimes I get less than 20 $ret write-host $ret.count # Returns the 20 most recent @replies for the authenticating user. #page: Optional. Retrieves the 20 next most recent replies #since. Optional. Narrows the returned results to just those replies created after the specified HTTP-formatted date, up to 24 hours old. #since_id. Optional. Returns only statuses with an ID greater than (that is, more recent than) the specified ID. Ex: http://twitter.com/statuses/replies.xml?since_id=12345 }
combined_dataset/train/non-malicious/sample_41_6.ps1
sample_41_6.ps1
ZНевозможно выполнить метод, если хранилище с несколькими моментальными снимками отключено.’Запрос был ограничен из-за слишком большого числа инициированных пользователем запросов на обновление источника данных за короткий период времени.gНедостаточно разрешений для обновления таблицы Direct Lake. Обратитесь к создателю этого набора данных.Невозможно сохранить метаданные моментального снимка базы. Для предотвращения их несогласованности база данных будет исключена.ßВосстановить резервную копию набора данных сейчас невозможно из-за нехватки памяти для выполнения операции. Используйте параметр /ForceRestore для восстановления набора данных при выгрузке и отключении существующего набора.kВосстановить резервную копию набора данных сейчас невозможно из-за нехватки памяти для выполнения операции.þОперация не разрешена. Попросите администратора емкости Power BI Premium включить в ее параметрах поддержку чтения и записи XMLA, затем повторите попытку. Для получения дополнительных сведений см. "Поддержка чтения и записи XMLA" в документации продукта.ãКоличество групп строк в исходной разностной таблице "%{ccon_deltaTableName/}" превышает ограничение текущего SKU (%u{rowgroupCount/}). Оптимизируйте свою разностную таблицу или перейдите на серверный SKU более высокого уровня.®Размер данных столбца "%{ccon_deltaColumnName/}" в исходной разностной таблице "%{ccon_deltaTableName/}" превышает ограничение текущего SKU (%I64u{columnFootprintLimit/} МБ).¹Число файлов Parquet в исходной дельта-таблице "%{ccon_deltaTableName/}" превышает текущий предел SKU (%u{fileCount/}). Оптимизируйте дельта-таблицу или обновите сервер до большего SKU.uСумма размера данных для всех разностных таблиц превышает ограничение текущего SKU (%I64u{columnFootprintLimit/} МБ).JНедопустимый временный путь abf для повторной публикации Power BI Premium.ÖСтолбец "%{ccon_columnname/}" с двоичным типом данных не допустим в таблице Direct Lake "%{ccon_TableName/}". Удалите столбец. Дополнительные сведения см. по ссылке: https://go.microsoft.com/fwlink/?linkid=2215281.IJНевозможно использовать режим Direct Lake вместе с другими режимами хранения в той же модели. Составная модель не поддерживает режим Direct Lake. Удалите неподдерживаемые таблицы или переключите их в режим Direct Lake. Дополнительные сведения см. по ссылке: https://go.microsoft.com/fwlink/?linkid=2215281.ĞВсе таблицы Direct Lake должны ссылаться на один и тот же источник данных. Проверьте источники данных своих таблиц Direct Lake и убедитесь, что все таблицы используют один и тот же источник данных. Дополнительные сведения см. на странице https://go.microsoft.com/fwlink/?linkid=2215281.
combined_dataset/train/non-malicious/1674.ps1
1674.ps1
function Get-Powercfg { $schemes = powercfg /l | ? {$_ -match ':'} | % { $split = $_ -split ':|\s{2}' | % {$_.trim()} $guid = $split[1] $name = $split[2] $active = $name.endswith('*') if ($active) { $name = $name.substring(1, $name.length - 4) } else { $name = $name.substring(1, $name.length - 2) } [pscustomobject]@{ GUID = $guid Name = $name Active = $active } } $props = New-Object System.Collections.ArrayList $props.AddRange(@( 'GUID' 'Name' 'Active' 'SubGUID' 'SubName' 'SubAlias' 'SettingGUID' 'SettingName' 'SettingAlias' )) $results = foreach ($scheme in $schemes) { $settings = powercfg /q $scheme.guid $settings = $settings.trim() $hash = @{ GUID = $scheme.GUID Name = $scheme.Name Active = $scheme.Active } $start = $setsubguid = $subguid = $setsettingalias = 0 foreach ($line in $settings) { if ($line.startswith('Subgroup GUID')) { $start = 1 $split = $line -split ':|\s{2}' | % {$_.trim()} $hash.Add('SubGUID', $split[1]) if ($split[2]) { $hash.Add('SubName', $split[2].substring(1, $split[2].length - 2)) } $subguid = 1 $setsubguid = 1 } elseif ($line.StartsWith('GUID Alias') -and $subguid -eq 1) { $hash.Add('SubAlias', $line.Split(':', 2)[1].trim()) $subguid = 0 } elseif ($line.StartsWith('Power Setting GUID')) { if (!$setsubguid) { $i = $back = 0 while ($hash.Keys -notcontains 'SubGUID' -and $i -ge 0) { $back++ $i = $settings.IndexOf($line) - $back $ln = $settings[$i] if ($ln.startswith('Subgroup GUID')) { $split = $ln -split ':|\s{2}' | % {$_.trim()} $hash.Add('SubGUID', $split[1]) if ($split[2]) { $hash.Add('SubName', $split[2].substring(1, $split[2].length - 2)) } $setsubguid = 1 $ln = $settings[$i + 1] if ($ln.StartsWith('GUID Alias')) { $hash.Add('SubAlias', $ln.Split(':', 2)[1].trim()) } } } } $split = $line -split ':|\s{2}' | % {$_.trim()} $hash.Add('SettingGUID', $split[1]) if ($split[2]) { $hash.Add('SettingName', $split[2].substring(1, $split[2].length - 2)) } } elseif ($line.StartsWith('GUID Alias')) { if (!$start) { continue } $hash.Add('SettingAlias', $line.Split(':', 2)[1].trim()) $setsettingalias = 1 } elseif ($line -match ':') { if (!$setsettingalias) { $setsettingalias = 1 continue } $split = $line.Split(':', 2).trim() $split[0] = $split[0].Replace(' ', '') $num = 0 $new = $split[0] + $num while ($hash.Keys -contains $new) { $num++ $new = $split[0] + $num } $hash.Add($new, $split[1]) if (!$props.Contains($new)) { $props.Add($new) | Out-Null } } else { [pscustomobject]$hash $hash = @{ GUID = $scheme.GUID Name = $scheme.Name Active = $scheme.Active } $setsubguid = 0 } } } $results | select $props }
combined_dataset/train/non-malicious/280.ps1
280.ps1
$groupId = " FILL ME IN " $newGatewayId = " FILL ME IN " $datasetId = " FILL ME IN " $clientId = " FILL ME IN " function GetAuthToken { if(-not (Get-Module AzureRm.Profile)) { Import-Module AzureRm.Profile } $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://analysis.windows.net/powerbi/api" $authority = "https://login.microsoftonline.com/common/oauth2/authorize"; $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $authResult = $authContext.AcquireToken($resourceAppIdURI, $clientId, $redirectUri, "Auto") return $authResult } $token = GetAuthToken $authHeader = @{ 'Content-Type'='application/json' 'Authorization'=$token.CreateAuthorizationHeader() } $sourceGroupsPath = "" if ($groupId -eq "me") { $sourceGroupsPath = "myorg" } else { $sourceGroupsPath = "myorg/groups/$groupId" } $postParams = @{ "gatewayObjectId" = "$newGatewayId" } $jsonPostBody = $postParams | ConvertTo-JSON $uri = "https://api.powerbi.com/v1.0/$sourceGroupsPath/datasets/$datasetId/BindToGateway" try { Invoke-RestMethod -Uri $uri -Headers $authHeader -Method POST -Body $jsonPostBody -Verbose } catch { $result = $_.Exception.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($result) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); If(($responseBody).Contains("DMTS_CanNotFindMatchingDatasourceInGatewayError")) { Write-Host "Error: No data source available in gateway." } elseif($_.Exception.Response.StatusCode.value__ -eq "401") { Write-Host "Error: No access to app workspace." } elseif($_.Exception.Response.StatusCode.value__ -eq "404") { Write-Host "Error: Dataset may be owned by someone else. Call take over API to assume ownership and try again. For more information, see https://msdn.microsoft.com/en-us/library/mt784651.aspx." } else { Write-Host "StatusCode:" $_.Exception.Response.StatusCode.value__ Write-Host "StatusDescription:" $_.Exception.Response.StatusDescription Write-Host "StatusBody:" $responseBody } }
combined_dataset/train/non-malicious/sample_53_2.ps1
sample_53_2.ps1
# Localized 12/03/2020 06:20 PM (GMT) 303:4.80.0411 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Sí PromptNoString=&No BundleFound=Agrupación encontrada: {0} PackageFound=Paquete encontrado: {0} EncryptedBundleFound=Se ha encontrado un conjunto cifrado: {0} EncryptedPackageFound=Se ha encontrado un paquete cifrado: {0} CertificateFound=Certificado encontrado: {0} DependenciesFound=Paquetes de dependencia encontrados: GettingDeveloperLicense=Adquiriendo licencia de desarrollador... InstallingCertificate=Instalando certificado... InstallingPackage=\nInstalando la aplicación... AcquireLicenseSuccessful=Se ha adquirido correctamente una licencia de desarrollador. InstallCertificateSuccessful=El certificado se ha instalado correctamente. Success=\nCorrecto: la aplicación se instaló correctamente. WarningInstallCert=\nEstá a punto de instalar un certificado digital en el almacén de certificados de personas de confianza de su equipo. Esta operación entraña un riesgo de seguridad importante, por lo que solo deberá realizarla si confía en el emisor de este certificado digital.\n\nCuando termine de usar la aplicación, deberá quitar manualmente el certificado digital asociado. Aquí encontrará instrucciones para realizar esta operación: http://go.microsoft.com/fwlink/?LinkId=243053\n\n¿Está seguro de que desea continuar?\n\n ElevateActions=\nAntes de instalar esta aplicación, es necesario realizar lo siguiente: ElevateActionDevLicense=\t- Adquiera una licencia de desarrollador ElevateActionCertificate=\t- Instale el certificado de firma ElevateActionsContinue=Se requieren credenciales de administrador para continuar. Acepte la solicitud de UAC e indique su contraseña de administrador si así se le solicita. ErrorForceElevate=Debe indicar las credenciales de administrador para continuar. Ejecute este script sin el parámetro -Force o desde una ventana PowerShell elevada. ErrorForceDeveloperLicense=La adquisición de una licencia de desarrollador requiere la interacción del usuario. Vuelva a ejecutar el script sin el parámetro -Force. ErrorLaunchAdminFailed=Error: no se puede iniciar un nuevo proceso como administrador. ErrorNoScriptPath=Error: debe iniciar este script desde un archivo. ErrorNoPackageFound=Error: no se encontró ningún paquete o agrupación en el directorio del script. Asegúrese de que el paquete o agrupación que desea instalar se encuentre en el mismo directorio que este script. ErrorManyPackagesFound=Error: se encontró más de un paquete o agrupación en el directorio del script. Asegúrese de que solo el paquete o agrupación que desea instalar se encuentre en el mismo directorio que este script. ErrorPackageUnsigned=Error: el paquete o agrupación no tiene signatura digital o la signatura está dañada. ErrorNoCertificateFound=Error: no se encuentran certificados en el directorio del script. Asegúrese de que el certificado usado para firmar el paquete o agrupación que está instalando se encuentre en el mismo directorio que este script. ErrorManyCertificatesFound=Error: se encontró más de un certificado en el directorio del script. Asegúrese de que solo el certificado usado para firmar el paquete o agrupación que está instalando se encuentre en el mismo directorio que este script. ErrorBadCertificate=Error: el archivo "{0}" no es un certificado digital válido. CertUtil devolvió el código de error {1}. ErrorExpiredCertificate=Error: el certificado de desarrollador "{0}" ha expirado. Una causa posible es que el reloj del sistema no esté establecido en la fecha y la hora correctas. Si la configuración del sistema es correcta, póngase en contacto con el propietario de la aplicación para volver a crear un paquete o agrupación con un certificado válido. ErrorCertificateMismatch=Error: el certificado no coincide con el que se usó para firmar el paquete o agrupación. ErrorCertIsCA=Error: el certificado no puede ser una entidad de certificación. ErrorBannedKeyUsage=Error: el certificado no puede tener el siguiente uso de clave: {0}. El uso de clave no debe estar especificado, o debe ser igual a "DigitalSignature". ErrorBannedEKU=Error: el certificado no puede tener el siguiente uso mejorado de clave: {0}. Solo se permiten los EKU Firma de código y Firma de vigencia. ErrorNoBasicConstraints=Error: no se encuentra la extensión de restricciones básicas del certificado. ErrorNoCodeSigningEku=Error: no se encuentra el uso mejorado de clave de Firma de código. ErrorInstallCertificateCancelled=Error: se canceló la instalación del certificado. ErrorCertUtilInstallFailed=Error: no se puede instalar el certificado. CertUtil devolvió el código de error {0}. ErrorGetDeveloperLicenseFailed=Error: no se puede adquirir una licencia de desarrollador. Para obtener más información, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Error: no se puede instalar el certificado. Estado: {0}. Para obtener más información, consulte http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Error: no se puede instalar la aplicación. ErrorAddPackageFailedWithCert=Error: no se puede instalar la aplicación. para garantizar la seguridad, considere desinstalar el certificado de signatura hasta que pueda instalar la aplicación. Encontrará instrucciones al respecto aquí:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@ # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDvGsxAW2FcI0uK # XEdJ/9j86x2U/kKoLH3LFgUKKovBUKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/+c/NaF/VXl6sms7adeW5X # 2RdkBqS/SOPnImXqCizIMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAuZ+Xy1Q2DOEeRVoj3STCbWfFuQzuvDb0Rkj3Yr/Ed+I/VFEcBa+wyEkc # R/WNKiVcyB95pkWK+J67vPevqyuupGd1tiSELmqeDEKDwbdRa3hMEMjKQdRr7FnD # GXiw4tmztQdAItN/1nQibzoOA70PJ9O+U8NLzNsIRYu7Wt1ZU9lug7C17ZEklRtR # erXNNEAGLGiChRFFDdDdS72peHunEaYm5qOUBlKjm3e/1T75kEeaPj8Dz8aiLj96 # B+x4NW5kN8qWrO9jrvsr647+xfDW8jEx5BoLDGTNLNLWAgPab6zJCZU5QR8cDTv6 # ZcGorHCzcqPk1DQLijC4vwNs6CQB4KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCChEUPY5ru09tbtcraGpn8vZ7oBG60HS+2xnf0+ggjEGQIGZfxrYDui # GBIyMDI0MDQwNDIwNDIyMS45M1owBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1 # RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # Ee0wggcgMIIFCKADAgECAhMzAAAB74k/VqFYzKjaAAEAAAHvMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDU0 # OFoXDTI1MDMwNTE4NDU0OFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAKMLWOKfDOAfCE5qRmrLXugTgEgEqybmRfgNSYIFYjSU # VWkSIrmZnYqHn2ygvieznamEUxBgYbmTKkKKm6eDA/02hvhUZUTpqgyjmFn03K1d # HllGBv1nw1HoSYsogJGEPiyiM8yD9GcZFNx1/v9Ni/IzXSMuOYvIoR6Awd+8jA+Y # z4A/uHNAt8TEN2oIna7rgZ3leWesU6S7lT2Ms4qTXLvRz5PC3Tj9Euqu6/V8Y/wu # Zia0e+sHhNwGwANdKZwWOHRWBCRfjNcXCqcgbyuBj7MOolhA1k/w7VijiRJyQdPj # dcLSgzjTJ7b72X+tNiIMUzeeVl7aOG06QYI7oaqJOnnTEj0hOkleLS8R6TwB6NPg # 8owQ7Zs/FTrenre5luN03kv6WAhwI0wI0jRIiilLiBpVHhLL8igO/W8Nal74jbz8 # rLyNZN553Q7cfE8kxmpfhAHcjoOfBmseIqfqgTfy2AFMIIAq8Shg5ODuvaUXQi5u # 3/f5U+8q1MJRtk8U4byNm32roAWh2W9Ce2KiVghi2pKsvJcBAiVcaFniA1y/h2/V # gCKWdtYD0KydiH44oQWv/jDgzr2Uj7Jqhncv+39R9elP/7JzuFL8WiVyasYUlMFi # VLicTVy4puXBn9Q4bbpIuEM41ZcZkMowko3neg4tJKTiV1HQeWxtPiF4uVaU4SUl # AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU7UxaooXCsJu2vD0/wDrdsBVInMswHwYD # VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw # VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc # BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0 # cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD # VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC # B4AwDQYJKoZIhvcNAQELBQADggIBABgZlrdoIO51uT0RV2Q/zFxAZm4gAg9HH0rU # IDu5HMG3zR8LRpaS5hiFAy8cclEdShtIzhTDfM3t8cQ3yGFoENv01FoacVZ20fGY # n14zPommfoqIjKL1Tk6DtAJNkyXXufbDh512rm+2TitFY5W+mIMEYkBEqJdYH27a # LHRYfYQwUYeqMiGNZReE+BHgLo0oU1ce9a9d5wnZZesme+9AZcB80kYRMlkalHjW # dQ3eKN+IJKMUPFqYY+zLmJi73Tge/265Jdh3mbQnF/ZY0lJeQ8aU2Gs7buk/GBPX # XWbIBHrVLdLaFznvbM33KgkQ5sT3xXLkoQzdlfndwt583zUXUL2n9wAqQTq71Xqv # LKX+pKDG7VSp45kK0b+JodIoyjEzsyrhIwWw9P/yJ453AKVilzDQKNl7koHHbEtr # gHWd4WJvwnz+BKiyMx0XeceLIfHVh51kO3FJKB6B4myLR9tSB3OxUwli+pXDnZap # A27QZELv1m5Wt5RUp0ImZQwEcGlOnpUWikvQl/hKuCD7NEP2LBtz25muf7z2h2ki # dvOdiuc8oeI7bqp7V6Q3CX93uujYi0/+WCHPQOgPuQQZ6KQolYd22jt5UmgmGStR # xqdO5QfTyD41jAbpL4+MFIH83I0Xpsdr/FH5x4BiFyPHSIGK/3QyfQmIZ+cDb+Eu # Pl6+FNwCMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG # 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy # MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw # MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az # /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2 # 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa # ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN # yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K # MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf # NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU # HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY # WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5 # C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8 # FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS # BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1 # Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw # UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG # CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB # hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO # mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w # a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr # BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3 # DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz # tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW # AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G # 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye # ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9 # 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j # dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ # KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB # Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP # Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp # e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw # ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw # JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAEtw # jzWDFt5rUTHaYVtfHtyT7SD/oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpuV5aMCIYDzIwMjQwNDA0MTcxNDAy # WhgPMjAyNDA0MDUxNzE0MDJaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOm5XloC # AQAwCgIBAAICA/sCAf8wBwIBAAICExQwCgIFAOm6r9oCAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAD2rCdS157ZG8dVzAgziechw9TJt5dAteXVphoap3siBJ # fJZQ+D3JHFfMceG3g5iOuhbTZfOUaEadg9z8G9lFyKsaSCfDFPqHjsqUQf7C8NiS # NM7ghN7VA00I3FgnNFKpihwp/5uLH9vvaYUtHqZTyQWXpTUSZiD6OB1XgIPJAkZL # zo485rVymKB3Zh5sWh2unNGCUkmtXZWr2qfjL3v6blyxiLY5FPZia1gIjf8XVpL+ # fTe3Il9CL+qqiEvzvx1Sljjd+Mv8gxsFHaYQNfBqDIYDnjb02fPwrQdDD/+ZBdQD # fwDjGHLp6EgM52XbidtmJQF3r52e46RVUvsLLlR1HzGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB74k/VqFYzKjaAAEAAAHv # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIO84RRq/tInjiNKXYEIZ0Vp/CLHRyYSRiNYyyfblUy5/ # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg8GEoRbgWjfBTPT01DHZrQNtx # 2xfyOi8zkuLMeafJf6MwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAe+JP1ahWMyo2gABAAAB7zAiBCA8pZLg0gwrNZbno7Mhsik9Em9X # EhhkntTRT1MJMreIzDANBgkqhkiG9w0BAQsFAASCAgA2bqhj+Og8fMlRd+w9q7lc # BDMgW9kammXCMlsaMGRs6WJkWDmxBDji1TKdjgsLqpiaci1D6Sz12snZEAQMKn/3 # qAmdLgEgYz8raoaQe47/0r85spmjrGDV4cISorVN9skoYUdH6dJ3fFvgi7NdUuLc # CwSCjr7TYO9LEjuHsmRvPRDOK8DvMWZtmmwICUqPUQGbEkiz5SYy1XvcPbGNUk1/ # XzsB89V7o/5aHML9EFIeWA0zKlFOjT8OmqjgbHBjBhQ9eIH1rvgd0N3GmBWwqmRo # ei/1dRp2s2IpCr32Ama17jVUBmDeftUJahc0PbwTRYu1yrAlnwMCzAUFPxYnwhH1 # 4Ngr5d7hc0OgyrfhHQLrPi1ZkbHjFaEJ8Krs7e2j4cm2wKTA48WTLb5+9dpmDw/G # 89syQ5hfHksDl8U/EapCD4HJfmsK19K4OjDy0s5ik/e6QgaZgJNZz/TdUm0l9z02 # lNAodrW8Cn7CvWNJ57U2cQDm024unEMiAfLOkmBODaetLm85j2SI/CqRqoiEIjP+ # tbVBiNf6FKQO1IWYaO4pTqwTELpb5yx4umatLys0Sw5JBUDDW79t0P5vrdvxC06A # VyzCRzdADZxtSkzMFttv1OiE1MTyaucTrw0O1innimfaWci1AAdHbGBhzFW5X+w6 # LqA+EKvPPWPRzU+82MjDZA== # SIG # End signature block
combined_dataset/train/non-malicious/New-ArgsTestExe.ps1
New-ArgsTestExe.ps1
Add-Type -Type @" using System; internal class ArgsTest { private static void Main(string[] args) { Console.WriteLine(); /* I've commented this out because (at least in C#) it is the same as Environment.GetCommandLineArgs() Except that GetCommandLineArgs shows parameter 0 as the executable path */ // Console.WriteLine("Using args:"); // Console.WriteLine(); // for (int i = 0; i < args.Length; i++) // { // Console.WriteLine(" Arg {0} is: {1}", i, args[i]); // } // Console.WriteLine(); // Console.WriteLine(); Console.WriteLine("CommandLine:"); Console.WriteLine(); Console.WriteLine(" " + Environment.CommandLine); Console.WriteLine(); Console.WriteLine(); Console.WriteLine("CommandLineArgs:"); Console.WriteLine(); string[] arguments = Environment.GetCommandLineArgs(); for (int i = 0; i < arguments.Length; i++) { Console.WriteLine(" Arg {0} is: {1}", i, arguments[i]); } Console.WriteLine(); Console.WriteLine(); System.Threading.Thread.Sleep(10000); } } "@ -OutputAssembly ArgsTest.exe -OutputType ConsoleApplication
combined_dataset/train/non-malicious/sample_46_95.ps1
sample_46_95.ps1
# # Module manifest for module 'OCI.PSModules.Networkfirewall' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Networkfirewall.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6a784c1a-dca2-489e-beb9-d910537df35b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Networkfirewall Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkfirewall.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINetworkfirewall', 'Get-OCINetworkfirewallAddressList', 'Get-OCINetworkfirewallAddressListsList', 'Get-OCINetworkfirewallApplication', 'Get-OCINetworkfirewallApplicationGroup', 'Get-OCINetworkfirewallApplicationGroupsList', 'Get-OCINetworkfirewallApplicationsList', 'Get-OCINetworkfirewallDecryptionProfile', 'Get-OCINetworkfirewallDecryptionProfilesList', 'Get-OCINetworkfirewallDecryptionRule', 'Get-OCINetworkfirewallDecryptionRulesList', 'Get-OCINetworkfirewallMappedSecret', 'Get-OCINetworkfirewallMappedSecretsList', 'Get-OCINetworkfirewallPoliciesList', 'Get-OCINetworkfirewallPolicy', 'Get-OCINetworkfirewallSecurityRule', 'Get-OCINetworkfirewallSecurityRulesList', 'Get-OCINetworkfirewallService', 'Get-OCINetworkfirewallServiceList', 'Get-OCINetworkfirewallServiceListsList', 'Get-OCINetworkfirewallServicesList', 'Get-OCINetworkfirewallsList', 'Get-OCINetworkfirewallUrlList', 'Get-OCINetworkfirewallUrlListsList', 'Get-OCINetworkfirewallWorkRequest', 'Get-OCINetworkfirewallWorkRequestErrorsList', 'Get-OCINetworkfirewallWorkRequestLogsList', 'Get-OCINetworkfirewallWorkRequestsList', 'Invoke-OCINetworkfirewallApplyNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallBulkUploadAddressLists', 'Invoke-OCINetworkfirewallBulkUploadApplicationGroups', 'Invoke-OCINetworkfirewallBulkUploadApplications', 'Invoke-OCINetworkfirewallBulkUploadDecryptionProfiles', 'Invoke-OCINetworkfirewallBulkUploadDecryptionRules', 'Invoke-OCINetworkfirewallBulkUploadMappedSecrets', 'Invoke-OCINetworkfirewallBulkUploadSecurityRules', 'Invoke-OCINetworkfirewallBulkUploadServiceLists', 'Invoke-OCINetworkfirewallBulkUploadServices', 'Invoke-OCINetworkfirewallBulkUploadUrlLists', 'Invoke-OCINetworkfirewallCloneNetworkFirewallPolicy', 'Invoke-OCINetworkfirewallMigrateNetworkFirewallPolicy', 'Move-OCINetworkfirewallCompartment', 'Move-OCINetworkfirewallPolicyCompartment', 'New-OCINetworkfirewall', 'New-OCINetworkfirewallAddressList', 'New-OCINetworkfirewallApplication', 'New-OCINetworkfirewallApplicationGroup', 'New-OCINetworkfirewallDecryptionProfile', 'New-OCINetworkfirewallDecryptionRule', 'New-OCINetworkfirewallMappedSecret', 'New-OCINetworkfirewallPolicy', 'New-OCINetworkfirewallSecurityRule', 'New-OCINetworkfirewallService', 'New-OCINetworkfirewallServiceList', 'New-OCINetworkfirewallUrlList', 'Remove-OCINetworkfirewall', 'Remove-OCINetworkfirewallAddressList', 'Remove-OCINetworkfirewallApplication', 'Remove-OCINetworkfirewallApplicationGroup', 'Remove-OCINetworkfirewallDecryptionProfile', 'Remove-OCINetworkfirewallDecryptionRule', 'Remove-OCINetworkfirewallMappedSecret', 'Remove-OCINetworkfirewallPolicy', 'Remove-OCINetworkfirewallSecurityRule', 'Remove-OCINetworkfirewallService', 'Remove-OCINetworkfirewallServiceList', 'Remove-OCINetworkfirewallUrlList', 'Stop-OCINetworkfirewallWorkRequest', 'Update-OCINetworkfirewall', 'Update-OCINetworkfirewallAddressList', 'Update-OCINetworkfirewallApplication', 'Update-OCINetworkfirewallApplicationGroup', 'Update-OCINetworkfirewallDecryptionProfile', 'Update-OCINetworkfirewallDecryptionRule', 'Update-OCINetworkfirewallMappedSecret', 'Update-OCINetworkfirewallPolicy', 'Update-OCINetworkfirewallSecurityRule', 'Update-OCINetworkfirewallService', 'Update-OCINetworkfirewallServiceList', 'Update-OCINetworkfirewallUrlList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkfirewall' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2301.ps1
2301.ps1
param ([string]$Computername,[string]$GroupName,[string]$Username) $group = [ADSI]"WinNT://$Computername/$GroupName,group" $group.Add("WinNT://$Computername/$Username,user")
combined_dataset/train/non-malicious/Out-DataTable.ps1
Out-DataTable.ps1
####################### <# .SYNOPSIS Creates a DataTable for an object .DESCRIPTION Creates a DataTable based on an objects properties. .INPUTS Object Any object can be piped to Out-DataTable .OUTPUTS System.Data.DataTable .EXAMPLE $dt = Get-Alias | Out-DataTable This example creates a DataTable from the properties of Get-Alias and assigns output to $dt variable .NOTES Adapted from script by Marc van Orsouw see link Version History v1.0 - Chad Miller - Initial Release .LINK http://thepowershellguy.com/blogs/posh/archive/2007/01/21/powershell-gui-scripblock-monitor-script.aspx #> function Out-DataTable { [CmdletBinding()] param([Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [PSObject[]]$InputObject) Begin { $dt = new-object Data.datatable $First = $true } Process { foreach ($object in $InputObject) { $DR = $DT.NewRow() $object.PsObject.get_properties() | foreach { if ($first) { $Col = new-object Data.DataColumn $Col.ColumnName = $_.Name.ToString() $DT.Columns.Add($Col) } if ($_.IsArray) { $DR.Item($_.Name) =$_.value | ConvertTo-XML -AS String -NoTypeInformation -Depth 1 } else { $DR.Item($_.Name) = $_.value } } $DT.Rows.Add($DR) $First = $false } } End { Write-Output @(,($dt)) } } #Out-DataTable
combined_dataset/train/non-malicious/sample_62_99.ps1
sample_62_99.ps1
/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.49.0(383fdf3fc0e1e1a024068b8d0fd4f3dcbae74d04) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/ define("vs/basic-languages/powershell/powershell", ["require","require"],(require)=>{ "use strict";var moduleExports=(()=>{var o=Object.defineProperty;var r=Object.getOwnPropertyDescriptor;var i=Object.getOwnPropertyNames;var l=Object.prototype.hasOwnProperty;var c=(n,e)=>{for(var t in e)o(n,t,{get:e[t],enumerable:!0})},g=(n,e,t,a)=>{if(e&&typeof e=="object"||typeof e=="function")for(let s of i(e))!l.call(n,s)&&s!==t&&o(n,s,{get:()=>e[s],enumerable:!(a=r(e,s))||a.enumerable});return n};var p=n=>g(o({},"__esModule",{value:!0}),n);var u={};c(u,{conf:()=>d,language:()=>m});var d={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\#%\^\&\*\(\)\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\?\s]+)/g,comments:{lineComment:"#",blockComment:["<#","#>"]},brackets:[["{","}"],["[","]"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"',notIn:["string"]},{open:"'",close:"'",notIn:["string","comment"]}],surroundingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],folding:{markers:{start:new RegExp("^\\s*#region\\b"),end:new RegExp("^\\s*#endregion\\b")}}},m={defaultToken:"",ignoreCase:!0,tokenPostfix:".ps1",brackets:[{token:"delimiter.curly",open:"{",close:"}"},{token:"delimiter.square",open:"[",close:"]"},{token:"delimiter.parenthesis",open:"(",close:")"}],keywords:["begin","break","catch","class","continue","data","define","do","dynamicparam","else","elseif","end","exit","filter","finally","for","foreach","from","function","if","in","param","process","return","switch","throw","trap","try","until","using","var","while","workflow","parallel","sequence","inlinescript","configuration"],helpKeywords:/SYNOPSIS|DESCRIPTION|PARAMETER|EXAMPLE|INPUTS|OUTPUTS|NOTES|LINK|COMPONENT|ROLE|FUNCTIONALITY|FORWARDHELPTARGETNAME|FORWARDHELPCATEGORY|REMOTEHELPRUNSPACE|EXTERNALHELP/,symbols:/[=><!~?&%|+\-*\/\^;\.,]+/,escapes:/`(?:[abfnrtv\\"'$]|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/,tokenizer:{root:[[/[a-zA-Z_][\w-]*/,{cases:{"@keywords":{token:"keyword.$0"},"@default":""}}],[/[ \t\r\n]+/,""],[/^:\w*/,"metatag"],[/\$(\{((global|local|private|script|using):)?[\w]+\}|((global|local|private|script|using):)?[\w]+)/,"variable"],[/<#/,"comment","@comment"],[/#.*$/,"comment"],[/[{}()\[\]]/,"@brackets"],[/@symbols/,"delimiter"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float"],[/0[xX][0-9a-fA-F_]*[0-9a-fA-F]/,"number.hex"],[/\d+?/,"number"],[/[;,.]/,"delimiter"],[/\@"/,"string",'@herestring."'],[/\@'/,"string","@herestring.'"],[/"/,{cases:{"@eos":"string","@default":{token:"string",next:'@string."'}}}],[/'/,{cases:{"@eos":"string","@default":{token:"string",next:"@string.'"}}}]],string:[[/[^"'\$`]+/,{cases:{"@eos":{token:"string",next:"@popall"},"@default":"string"}}],[/@escapes/,{cases:{"@eos":{token:"string.escape",next:"@popall"},"@default":"string.escape"}}],[/`./,{cases:{"@eos":{token:"string.escape.invalid",next:"@popall"},"@default":"string.escape.invalid"}}],[/\$[\w]+$/,{cases:{'$S2=="':{token:"variable",next:"@popall"},"@default":{token:"string",next:"@popall"}}}],[/\$[\w]+/,{cases:{'$S2=="':"variable","@default":"string"}}],[/["']/,{cases:{"$#==$S2":{token:"string",next:"@pop"},"@default":{cases:{"@eos":{token:"string",next:"@popall"},"@default":"string"}}}}]],herestring:[[/^\s*(["'])@/,{cases:{"$1==$S2":{token:"string",next:"@pop"},"@default":"string"}}],[/[^\$`]+/,"string"],[/@escapes/,"string.escape"],[/`./,"string.escape.invalid"],[/\$[\w]+/,{cases:{'$S2=="':"variable","@default":"string"}}]],comment:[[/[^#\.]+/,"comment"],[/#>/,"comment","@pop"],[/(\.)(@helpKeywords)(?!\w)/,{token:"comment.keyword.$2"}],[/[\.#]/,"comment"]]}};return p(u);})(); return moduleExports; });
combined_dataset/train/non-malicious/sample_2_48.ps1
sample_2_48.ps1
[dynamic, provider("dcismprovider"), Association] class DCIM_CLPServiceServiceDependency : DCIM_RBAServiceServiceDependency { [ Description ("Dependent represents the object that is dependent on the Antecedent."), Override ("Dependent"), Required ] CIM_Service REF Dependent; [ Description ("Antecedent represents the independent object in this association."), Override ("Antecedent"), Required ] CIM_Service REF Antecedent; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDXTLD3qZej2Qz1 */ /* j3QOMNztKuoATAxodUCcHwx4lnS4Z6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCqKAifIIBv */ /* djABq4KSOWWnIA+D4KstoPdr938mydyLIDBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYAZf73oIPDh5aihjZh8BvBdwF5BH78UKS7FRc28rBTdXinA */ /* IXot9GkFqiez1d3RKCIsdJmhFe6NASvuG+R58kRjhYXDH/BNWz39KjrjinNFbTOd */ /* W+VqwNPosPfb+dc8spPruYanI6EIY+1ZNwPHn2Lu6tYQ3DcQ/vzBjd22ETDFsEfm */ /* DToq7vcXBWVHahn6bH+07SwwKy7FBHsTq2HoJXnlrv5eVTyHFXhYffFtYCGWY7vZ */ /* YYf/kFhTaYa0nGZ4WBxG4Pgj+ZWUWXqifiY9XwTvw/5hqVCzqBBszkA6F/EjuvSI */ /* 7rbqzxFIQsMpWM11rjtXweMLNgGnAobo/+36NCEeX2AfbAPvCEknPnI6ggMMg0Xu */ /* IvdfrKamn/bOXppr9Lq7GR9JU+GBRzrICzRXcq8vPcyqg84l1/7F5cbEiMLnzmox */ /* 8Ux2CyWddPVjKQpbrdOcpEmMad0RlLzT9F0Tg1OE6eEEulo5OlWhXZGUQHNE7AB7 */ /* AKhxbxYnM4pkNHumSt+hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQg2jFVFM0fnBuL */ /* Oqw9j0nbgndeskgr2W01rpjP0b6VzzYCEAYf0aShYrfZb0ws+BXYkWcYDzIwMjQw */ /* OTIwMDcwMDM4WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMDM4WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQgzyDCRmoetKoiaXDPXMC/rqz+LxFZFinyyoaW */ /* L2tzrzowNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIADhHwtv+0ZNszUJFd5HdU */ /* 6hAfqxRZfyVlaasOW5DIgQJy3iq7W2L75w8zb2F4mdRHM6KZvHojpCKL+79UK+uY */ /* sYOCcMS6U5WRC88+ux19OqjqDoaxGhzI93VAblloupi4oEj51pS23Wcbom2gMf5h */ /* PAj4mlU5AkPkM1W8zqocTa7aJ7k6Jp4DLFedGwpIYR1P6IEZhlpNfoMycJC7bfs4 */ /* wN2jEMIwPZLWYQn+7wn5KIRQmLsFM4zwvlTmvlBAXXJtgs/t5ZQtsVJLKO8xV4Yn */ /* +i9VZ9Z9QcYN16n4c+7t/2Xq7YDj4spXT/aU/QW0IdooRkPnJC7xkmCJaLrteXFC */ /* +/dcMvon4QD9pZc7KhiWACM2/tY27f88G/1tgDzruuc+OrWFNOtfviiO+2phBAqR */ /* /vTcqSQdN7PukyOHgqu9CSwrUAF2QqRkNI8Aib97aHGASdPbb7Nc4RZLCVxgR9xK */ /* zXbyLB0AQEVMXLOkzkj1X/cITVuhWXCZsWW6xeFgHWd2dxBuVoK6RgcaBjBjti/Z */ /* +MpKJ8sEbLDaDqumk/d8WX5kw5C0beLvNlO/9SbAWaj7G6m9bVPod8KBkahxX2W6 */ /* fn3XTvoojEBIILMKN7Dw6M6KfjU+V2IlhyL8qOHawS6atOFg1lLHpXOpd0nYr1kC */ /* jEIqr40S+5Ck/8CYDP9plCU= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/ASPX Mailbox (5 of 6).ps1
ASPX Mailbox (5 of 6).ps1
<%@ Page Language="C#" AutoEventWireup="true" CodeFile="MailboxTaskResults.aspx.cs" Inherits="MailboxTaskResults" %> <%@ Reference Page="~/MailboxConfirm.aspx" %> <%@ PreviousPageType VirtualPath="~/MailboxConfirm.aspx" %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" > <head id="Head1" runat="server"> <title> Domain Mailbox Task Results</title> </head> <body> <form id="frmMailboxTaskResults" runat="server"></form> </body> </html>
combined_dataset/train/non-malicious/VMware guest information.ps1
VMware guest information.ps1
# vminfo.ps1 # # Give this a VMware guest and it will attempt to dump all the information available. # # Example: .\\vminfo.ps1 "guestname" # # This scripts assumes that you have already connected to a VirtualCenter server. # # This was developed and tested using VMware vSphere PowerCLI version 4.1.1.2816 # on an ESXi 4.1 build 381591 cluster Param($guest) #################################################################### # ProcessObject - This recursive function does the bulk of the work. # #Input Parameters # # $xobj - Object to dump info on # $pref - Prefix to use on print lines # # When an object is encountered then we recursively call ourselves to # process that object after first updating the prefix. # # Snapshot objects can point to both a parent and a child. Dumping both # Parent and Child objects results in an endless loop. Therefore dump only # Child objects. function ProcessObject ($xobj, $pref){ $plen = $pref.length $pad = $width - $plen If ($pad -lt 0){$pad = 0} # Get information on all of the members of this object because what is done with a member is # dependent on whether the member is an object or is a data item and if it is a data item # what kind of data item is it $xom = $xobj | get-member -membertype property foreach ($ent in $xom){ $xnam = $ent.name #write-host ">>>>>>>Processing entry" $ent.name $xnlen = $xnam.length $strs = $ent.Definition.split(" ") # process 1st level simple things like strings and numbers including simple arrays # There are some fields in a VMware guest "Get-View" description we will ignore # because they are obsolete and have either had their descriptive names changed # or a new cmdlet is now available and it is the preferred method for finding # out about the object. # # The following "objects" may be encountered but will be ignored. These are legacy objects # from ESX 3.5 but were promoted to having their own cmdlets in ESX 4. Therefore we will # ignore them when found as members of some other object prefering to examine them using the # new cmdlets. # # legacy guest objects # # CDDrives == Get-CDDrives # FloppyDrives == Get-FloppyDrive # HardDisk == Get-HardDisk # NetworkAdapters == Get-NetworkAdapter # UsbDevices == Get-UsbDevice # # legacy host objects # # ConsoleNic == Get-VMHostNetworkAdapter # PhysicalNic == Get-VMHostNetworkAdapter # VirtualNic == Get-VMHostNetworkAdapter # VirtualSwitch == Get-VirtualSwitch # ScsiLun == Get-ScsiLun # # if ($xnam -match "^(CDDrives|FloppyDrives|HardDisks|NetworkAdapters|UsbDevices)$" ){ "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", "== skipping legacy device object ==" #| Out-File -FilePath $reportfile -Append } elseif ($xnam -match "^(ConsoleNic|PhysicalNic|ScsiLun|VirtualNic|VirtualSwitch)$" ){ #Write-Host "****** skipping legacy Network Adapter object- $xnam" "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", "== skipping legacy Network Adapter object ==" #| Out-File -FilePath $reportfile -Append } # The following are obsolete identifiers in ESX 3.5 that have new names as of ESX version 4.x # We will ignore all old identifiers and only display the new identifiers. # # Description - replaced by Notes # Host is replaced by VMHost # HostId is replaced by VMHostId # State == ConnectionState # VirtualMachineId == VMId elseif ($xnam -match "^(Description|Host|HostId|State|VirtualMachineId)$" ){ "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", "== skipping obsolete identifier ==" #| Out-File -FilePath $reportfile -Append } # Examining the following will result in recursive loops threrfore we will skip them. # # Parent # VM # VMHost elseif ($xnam -match "^(VMHost)$" ){ "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", "== skipping object to avoid infinite loop ==" #| Out-File -FilePath $reportfile -Append } elseif ($strs[0] -match "^System.String\\[\\]" ){ if (!$xobj.$xnam.count) { $res = $xobj.$xnam #Write-Host "=== single entry array name =" $xnam "result" $res "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", $xobj.$xnam #| Out-File -FilePath $reportfile -Append } else { $count = $xobj.$xnam.count for ($i=0; $i -lt $count; $i++){ $namlen = $xnam.length $ipad = $pad - 2 - $namlen If ($i -gt 9){$ipad--} If ($ipad -lt 1){$ipad = 1} "{0,-$plen}{1,-1}{2,-$namlen}{3,1}{4,1}{5,-$ipad}{6,-2}{7,-30}" -f $pref, ".", $xnam, "[", $i, "]", ":", $xobj.$xnam[$i] #| Out-File -FilePath $reportfile -Append } } } elseif ($strs[0] -match "^System.(String|Int|Nullable|Boolean|DateTime|Double)" ){ # If this is a "value__" then show the number and the symbolic name if ($xnam -eq "value__"){ $vpad = $pad + 3 "{0,-$plen}{1,$vpad}{2,-2}{3,-2}{4,-30}" -f $pref, ": ", $xobj.$xnam, "-", $xobj #| Out-File -FilePath $reportfile -Append } else { "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", $xobj.$xnam #| Out-File -FilePath $reportfile -Append } } elseif ($strs[0] -match "^VMware.Vim(.|Automation.Types|Automation.ViCore)"){ # Hack to avoid closed loop when crawling snapshot structures # Each child points back to its parent and each parent points to its children # hence and endless loop. Therefore do not process parents if ($xnam -match "^(Parent|ParentSnapshot|VM)$"){ $pad = $width-$plen If ($pad -lt 0){$pad = 0} "{0,-$plen}{1,-1}{2,-$pad}{3,-2}" -f $pref, ".", $xnam, ": == skipping $xnam to avoid infinite loop ==" #| Out-File -FilePath $reportfile -Append } else { $pad = $width-$plen If ($pad -lt 0){$pad = 0} $yobj = $xobj.$xnam $newp = $pref + "." + $xnam if (!$yobj){ "{0,-$plen}{1,-1}{2,-$pad}{3,-2}" -f $pref, ".", $xnam, ": =undefined=" #| Out-File -FilePath $reportfile -Append } else{ if (!$yobj.count){ ProcessObject $yobj $newp } else { $lc = $yobj.count for ($z = 0; $z -lt $lc; $z++){ $zobj = $yobj[$z] $zperf = $newp + "[" + $z + "]" ProcessObject $zobj $zperf } } } } } elseif ($strs[0] -match "^System.(Collections)" ){ Foreach ($entry in $xobj.$xnam){ $newpref = $pref + "." + $xnam $cpad = $pad - $xnam.length - 1 If ($cpad -lt 0){$cpad = 0} "{0,-$plen}{1,-1}{2,-$Cpad}{3,-2}{4,-30}" -f $newpref, ".", $entry.Key, ":", $entry.value #$strs[0] #| Out-File -FilePath $reportfile -Append } } else { "{0,-$plen}{1,-1}{2,-$pad}{3,-2}{4,-30}" -f $pref, ".", $xnam, ":", $ent.Definition #$strs[0] #| Out-File -FilePath $reportfile -Append } } } function POLauncher ($xobj, $pref){ if (!$xobj.count){ ProcessObject $xobj $pref } else { $lc = $xobj.count for ($z = 0; $z -lt $lc; $z++){ $zobj = $xobj[$z] $zperf = $pref + "[" + $z + "]" ProcessObject $zobj $zperf } } } # end function ProcessObject $reportfile = "vminfo-rpt.txt" $first = 20 $width = 70 $xvm = get-vm -name $guest $prefix = $xvm.name + " Get-VM" POLauncher $xvm $prefix # Display information about virtual devices attached to the guest # Process devices CDDrives|Harddisk|FloppyDrives|NetworkAdapters|UsbDevices $dvm = get-HardDisk -vm $xvm $prefix = $xvm.name + " Get-HardDisk" POLauncher $dvm $prefix $cdvm = get-CDDrive -vm $xvm $prefix = $xvm.name + " Get-CDDrive" POLauncher $cdvm $prefix $flpvm = get-FloppyDrive -vm $xvm $prefix = $xvm.name + " Get-FloppyDrive" POLauncher $flpvm $prefix $netvm = get-NetworkAdapter -vm $xvm $prefix = $xvm.name + " Get-NetworkAdapter" POLauncher $netvm $prefix $usbvm = get-UsbDevice -vm $xvm $prefix = $xvm.name + " Get-UsbDevice" POLauncher usbvm $prefix #Get-View return more information than Get-Vm $xview = $xvm | get-view $prefix = $xvm.name + " Get-View" POLauncher $xview $prefix # Return information about any snapshots. $snap = get-snapshot $xvm if ($snap){ $prefix = $xvm.name + " Get-Snapshot" POLauncher $snap $prefix } #Tell ua about the host we are running on $vmhost = $xvm.VMHost $prefix = $vmhost.name + " Get-VMHost" POLauncher $vmhost $prefix # probably don't want to do this one unless you want to be buried in data #$vmhostv = Get-View $vmhost #$prefix = $vmhostv.name + " Get-View" #POLauncher $vmhostv $prefix #Dump information about the Host's devices $nics = Get-VMHostNetworkAdapter $vmhost foreach ($nic in $nics){ $prefix = $vmhost.name + " " + $nic.Name POLauncher $nic $prefix } $vmguest = get-vmguest $xvm $prefix = $xvm.name + " Get-VMGuest" #POLauncher $vmguest $prefix $vmdatastore = get-datastore -vm $xvm $prefix = $xvm.name + " Get-Datastore" POLauncher $vmdatastore $prefix $dc = Get-Datacenter -vm $xvm $prefix = $xvm.name + " Get-Datacenter" #POLauncher $dc $prefix
combined_dataset/train/non-malicious/sample_22_17.ps1
sample_22_17.ps1
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved. Function Invoke-AMTPowerManagement { <# .Synopsis Invokes an Intel Active Management Technology power control command .Description This CmdLet invokes an Intel Active Management Technology (AMT) power control operations (Power On, Power Off, and Power Reset) from clients that have Intel AMT firmware version 3.0 or higher. .Notes Supported AMT Firmware Versions: 3.0 and higher The valid parameters for –Operation are {PowerOn, PowerOff, Reset, Sleep, Hibernate, GracefulOff, GracefulReset, NMI} AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This Cmdlet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Invoke-AMTPowerManagement -computer:vproclient.vprodemo.com -TLS -CertificateName "myCertificate" -Operation:PowerOn ComputerName Port Operation Status ------------ ---- --------- ------ vproclient.vprodemo.com 16993 PowerOn Successful .Example Invoke-AMTPowerManagement vproclient -Operation:Reset -Username:amtuser Will prompt for digest username password. ComputerName Port Operation Status ------------ ---- --------- ------ vproclient 16992 Reset Successful .Example Invoke-AMTPowerManagement vproclient.vprodemo.com -Operation PowerOff -Username:vprodemo\ITHelpDesk Will prompt for Kerberos username password. ComputerName Port Operation Status ------------ ---- --------- ------ vproclient.vprodemo.com 16992 PowerOff Successful .Example Invoke-AMTPowerManagement -ComputerName:vproclient.vprodemo.com -Operation:PowerOff -credential $AMTCredential -TLS ComputerName Port Operation Status ------------ ---- --------- ------ vproclient.vprodemo.com 16993 PowerOff Successful .Example Invoke-AMTPowerManagement -ComputerName computer1.vprodemo.com,doesnotexist.vprodemo.com -TLS -Operation Reset | Where {$_.Status -eq "Failed"} Will perform the power operation on every AMT client in the list, but only display the ones that failed. ComputerName Port Operation Status ------------ ---- --------- ------ doesnotexist.vprodemo.com 16993 Reset Failed .Example Get-Content computers.txt | Invoke-AMTPowerManagement -Port:16993 -Operation:PowerOn Will pull the list of amt clients from a text file and pipe them in the Invoke-AMTPowerManagement Cmdlet ComputerName Port Operation Status ------------ ---- --------- ------ computer1.vprodemo.com 16993 PowerOn Successful computer2.vprodemo.com 16993 PowerOn Successful computer3.vprodemo.com 16993 PowerOn Successful .Example Get-SomeDataFromOtherCMDLet | Invoke-AMTPowerManagement Get-SomeDataFromOtherCMDLet is a custom script that has an output of ComputerName, Port, and Operation. Results are piped into CMDLet. ComputerName Port Operation Status ------------ ---- --------- ------ computer1.vprodemo.com 16993 PowerOn Successful computer2.vprodemo.com 16993 PowerOn Successful computer3.vprodemo.com 16993 PowerOn Successful .Example Get-SomeDataFromOtherCMDLet | Select ComputerName | Invoke-AMTPowerManagement -TLS -Operation PowerOn Get-SomeDataFromOtherCMDLet is a custom script that has an output of ComputerName, Port, and Operation; however, you only select ComputerName. Remaining parameters are manually provided. ComputerName Port Operation Status ------------ ---- --------- ------ computer1.vprodemo.com 16993 PowerOn Successful computer2.vprodemo.com 16993 PowerOn Successful computer3.vprodemo.com 16993 PowerOn Successful #> [CmdletBinding()] Param ( [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Valid Operations are PowerOn, PowerOff, Reset, Sleep, Hibernate, GracefulOff, GracefulReset, NMI")][ValidateSet("PowerOn", "PowerOff", "Reset", "Sleep", "Hibernate", "GracefulOff" , "GracefulReset", "NMI")] [String] $Operation, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) PROCESS { try{ $Results = @() $Obj = new-object psobject #create a connection object $Connection = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $Connection.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $Connection.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $Connection.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port.Length -lt 1) { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } if($CertificateName.Length -gt 0) { $Connection.Options.SetClientCertificateByCertificateName($CertificateName) } switch ($Operation) { "PowerOn" {$PowerInt = 2} "Sleep" {$PowerInt = 4} "Reset" {$PowerInt = 5} "Hibernate" {$PowerInt = 7} "PowerOff" {$PowerInt = 8} "NMI" {$PowerInt = 11} "GracefulOff" {$PowerInt = 12} "GracefulReset" {$PowerInt = 14} } ForEach ($Comp in $ComputerName) { try { #Attempt Connection with Client $Connection.SetHost($Comp, $Port) #Get a reference to the ManagedSystem (User of the Service) $UserRef = $Connection.NewReference("SELECT * from CIM_ComputerSystem WHERE Name='ManagedSystem'") #Get the Instance of CIM_AssociatedPowerManagmentService for the ManagedSystem $ObjRef = $Connection.NewReference("CIM_AssociatedPowerManagementService"); $ObjRef.AddSelector("UserOfService",$userRef); $AssociatedObj = $ObjRef.Get() #Now Assoctate to the Provider of the Service (CIM_PowerManagementService) $ServiceRef = $AssociatedObj.GetProperty("ServiceProvided").Ref #Now invoke the RequestPowerStateChange $InputObj = $ServiceRef.CreateMethodInput("RequestPowerStateChange") $InputObj.SetProperty("PowerState", "$PowerInt") $InputObj.SetProperty("ManagedElement", $UserRef) $OutObj = $ServiceRef.InvokeMethod($InputObj); #Note Return Status $ReturnValue = $OutObj.GetProperty("ReturnValue").ToString() #Add Member to Object. Include Computer Name and Operation sucess $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value $Port $Obj | Add-Member -MemberType noteproperty -Name Operation -value $Operation if ($ReturnValue -eq 0) { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful" } else { $Obj | Add-Member -MemberType noteproperty -Name Status -value "Failed" } } catch { if($_.ToString().Contains("Unauthorized")) { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value "" $Obj | Add-Member -MemberType noteproperty -Name Operation -value "" $Obj | Add-Member -MemberType noteproperty -Name Status -value "Unauthorized" } else { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value "" $Obj | Add-Member -MemberType noteproperty -Name Operation -value "" $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message } } $Results += $Obj } } catch { $Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp $Obj | Add-Member -MemberType noteproperty -Name Port -value "" $Obj | Add-Member -MemberType noteproperty -Name Operation -value "" $Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect" $Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message $Results += $Obj } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCCztJEA5tluNLO # jNrqa/AYNAAEMrVZpFolZZHS0IPHIKCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgD9r+L9aOhnjkwvMh # O6dMdMlpeHl4xVT1zqyEDO5grFowDQYJKoZIhvcNAQEBBQAEggGAVJSO8/l5DYZi # S+J/LMo6DRu1c6r4nQQHyZSP6L5Cdosw/RC3zAr2HsP9sav5oKjVfw7nVOk0Dt1r # 5lkvE5sg+pyp+zuK1YnWteGxMNQBeHEYqaFC8iCnR9uQqkmnVNlgFc2JOAuqYKRA # jvTFq+QO+d4RvJjC8B5zIl2vJo3YncYMQ5pI1DI/2Ng5nRkUlua/FFKSMu1yQgN4 # /avB5iYR80zpVYK6vT5MeKqUTuZRwJWL4Q5xxQ2vQTf/mUCGsr2j9fi8zWd4u080 # sCJcak/suvDfzpSHGT7OUz204Q6gcjw48vLF70XUJeFuLnpxALioyc/KoAA3H+mu # GZPAJzdVmxDcx49eMvHlLsL3MEiWEStZcx2DIzNF/NrY6+Bk9XcQEzR+1wtJJ0eJ # 1aLgQGhAjnmpdKHU/aPACLyYGzlQ/jJaneVTLmDoh7RAT4XTIcfxIkTcJh91XihN # eaMN+FYJyogLPyplku0B4q30IB5IZVO9v1t4QskeGV36mH+TqNxaoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIFN6H1vzgp96fqVoyuSTP00UixpOe/z11c9w # 5m9b9peSAhR0SQ2UZp2M3sN9wc1v+5w+r4cSzRgPMjAyMTA3MTkxNjMwMjdaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjEwNzE5MTYzMDI3WjA/BgkqhkiG9w0BCQQxMgQw+0T1rv/B8+RK # Q4LbChXLvKMeqsGn2Ai01BLnNUQxbSI6fudb62muOo/Pgj6pL+bFMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICABVa4mVZIVWIz7gu0AcXuBlQ9BYpipuc1GU5+mG0cA73Qq/fvpX6 # DSGjlfnxCNV9SvBAIxrBtzEFggm/U8kPJJvsvMZ5hAGFv9k9IXn37bHy9tt2VHP8 # vwVK5MkUbzqB2cjjpsg4HnmxmTpy3ZfofYt1+1TW9F1a8beIcgD0DJBI00lsRvI+ # BrJEQD56ePZHzuE1kGUTK9kNl6KSfVwTqpirHIAyvfkoOrC2In32Z4F1nH8erCco # OjJPwhWWm8R1DlGYOpoFwnkJlg2WYYxiCJpvZCz79+0lqQhxdj706QnsKjniIHP0 # IVvzA03sb/IUd53FJb5BGp+WQ4Te+gOLD5uxlyarF/qi7Pq8qJ04hLSKCtJDYfTI # gCtbr58dcDL2pKcnZJdqYisSd+XVPz1QSXN07MaA2BRV4UJ1toy13Kw+ArK6H6fo # Gm4us1hFuynmOHMFB3DiP2BhEOr1O2F0DMQ76Go3YjAdQcNG901dbXJg51A7U+5e # YUfTNGG6DX942N1Oji+CZ7jx0yjr82l6OLpREfUXKQJjAFrS2FZ51FLhMfbCLAax # 24Ryl4+D0tQQpoW0m8aLIRng0k7PNGcVlPFTCWUNNrpi3Zt34OVPFCgsyGavI7YL # KGkiraTw5/DcdWiK6SxRkDdd3bHAxjkzQHWCzqFAEXpY6MB3H5xxWeWk # SIG # End signature block
combined_dataset/train/non-malicious/sample_28_14.ps1
sample_28_14.ps1
# # Module manifest for module 'OCI.PSModules.Recovery' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Recovery.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Recovery Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase', 'Get-OCIRecoveryProtectedDatabasesList', 'Get-OCIRecoveryProtectionPoliciesList', 'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet', 'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest', 'Get-OCIRecoveryWorkRequestErrorsList', 'Get-OCIRecoveryWorkRequestLogsList', 'Get-OCIRecoveryWorkRequestsList', 'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration', 'Move-OCIRecoveryProtectedDatabaseCompartment', 'Move-OCIRecoveryProtectionPolicyCompartment', 'Move-OCIRecoveryServiceSubnetCompartment', 'New-OCIRecoveryProtectedDatabase', 'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet', 'Remove-OCIRecoveryProtectedDatabase', 'Remove-OCIRecoveryProtectionPolicy', 'Remove-OCIRecoveryServiceSubnet', 'Update-OCIRecoveryProtectedDatabase', 'Update-OCIRecoveryProtectionPolicy', 'Update-OCIRecoveryServiceSubnet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/WPFDiskSpace.ps1
WPFDiskSpace.ps1
#Usage: Get-WmiObject -computername Z002 Win32_LogicalDisk -filter "DriveType=3" | ./WPFDiskSpace.ps1 #Note: Requires .NET 3.5, Visifire Charts (tested on v2.1.0), Powerboots (tested on v0.1) $libraryDir = Convert-Path (Resolve-Path "$ProfileDir\\Libraries") [Void][Reflection.Assembly]::LoadFrom( (Convert-Path (Resolve-Path "$libraryDir\\WPFVisifire.Charts.dll")) ) if (!(Get-PSSnapin | ?{$_.name -eq 'PoshWpf'})) { Add-PsSnapin PoshWpf } New-BootsWindow -Async { $chart = New-Object Visifire.Charts.Chart $chart.Height = 500 $chart.Width = 800 $chart.watermark = $false $chart.Theme = "Theme2" $chart.View3D = $true $chart.BorderBrush = [System.Windows.Media.Brush]"Gray" $chart.CornerRadius = [System.Windows.CornerRadius]5 $chart.BorderThickness = [System.Windows.Thickness]0.5 $chart.AnimationEnabled = $false $ds1 = New-Object Visifire.Charts.DataSeries $ds1.RenderAs = [Visifire.Charts.RenderAs]"StackedBar" $ds1.LegendText = "UsedSpace" $ds1.LabelEnabled = $true #$ds1.LabelText = "#YValue" $ds2 = New-Object Visifire.Charts.DataSeries $ds2.RenderAs = [Visifire.Charts.RenderAs]"StackedBar" $ds2.LegendText = "FreeSpace" $ds2.LabelEnabled = $true #$ds2.LabelText = "#YValue" $ds2.RadiusX = 5 $ds2.RadiusY = 5 foreach ($disk in $input) { $pFree = $([int](([double]$disk.FreeSpace/[double]$disk.Size) * 100)) $pUsed = $([int]((([double]$disk.Size - [double]$disk.FreeSpace)/[double]$disk.Size) * 100)) $dp1 = new-object Visifire.Charts.DataPoint $dp1.AxisXLabel = ($disk.Name) $dp1.YValue = ([math]::round((([double]$disk.Size - [double]$disk.FreeSpace)/1GB),2)) $dp1.LabelText = "$pUsed" $ds1.DataPoints.Add($dp1) $dp2 = new-object Visifire.Charts.DataPoint $dp2.YValue = ([math]::round(($disk.FreeSpace/1GB),2)) $dp2.LabelText = "$pFree" $ds2.DataPoints.Add($dp2) } $chart.Series.Add($ds1) $chart.Series.Add($ds2) $chart } -Title "Disk Space"
combined_dataset/train/non-malicious/AD attributes.ps1
AD attributes.ps1
<%@ Language=VBScript %> <% StartTime = Timer %> <!--#include file = "global.inc"--> <html> <head><title><%=strCompany%> - Search List</title> </head> <body> <!--#include file="default.htm"--> <link rel="stylesheet" href="/server/default.css" TYPE="text/css" media="screen"> <% Dim MyVariable MyVariable=Request.Form("name") MyVariable =Replace(MyVariable,"'","''") 'the request.form gets the info within the boxes of the form actioned 'from the previous HTML/ASP gotname = Request.form("name") %> <% Dim objRootDSE, objConnection, objRecordSet, objCommand Dim strDomainLDAP, intPage, i, j, strTRbgColor, strTemp Const ADS_SCOPE_SUBTREE = 2 Set objRootDSE = GetObject("GC://RootDSE") strDomainLDAP = objRootDSE.Get("DefaultNamingContext") Set objRootDSE = Nothing response.write("Display Name that was searched for: <h3>" & gotname) Set objConnection = CreateObject("ADODB.Connection") Set objRecordSet = Server.CreateObject("ADODB.Recordset") Set objCommand = Server.CreateObject("ADODB.Command") objConnection.Provider = "ADsDSOObject" objConnection.Open "Active Directory Provider" Set objCommand.ActiveConnection = objConnection objCommand.Properties("Page Size") = 10000 objCommand.Properties("Searchscope") = ADS_SCOPE_SUBTREE objCommand.Properties("Size Limit") = 10000 objCommand.CommandText = "SELECT mail, l, title, Displayname, msds-PrincipalName" & _ " FROM 'GC://windows2008DC' WHERE objectCategory='user' AND homemdb='*' AND UserAccountControl='512' AND objectclass='User' AND displayname= '*" & myvariable & "*' ORDER BY Name" objRecordSet.Open objCommand.CommandText, objConnection,1,1 objRecordSet.PageSize = Cint(RowsPerPage) If Request.QueryString("page") = "" Then intPage = 1 Else intPage = Request.QueryString("page") End If If objRecordSet.EOF Then Response.Write "<h3>No search term entered or search term not found</h3>" & vbCrLf Response.End Else Response.Write "<center><h3>" & strCompany & " - Searchlist </h3>" & vbCrLf objRecordSet.AbsolutePage = intPage Response.Write "<table align=center border=1>" & vbNewLine Response.Write " <tr align=center>" & vbNewLine For i = 0 To objRecordSet.Fields.Count - 1 Response.Write " <th>" & objRecordSet.Fields(i).Name & "</th>" & vbNewLine Next Response.Write " </tr>" & vbNewLine rem Response.Write objRecordSet.RecordCount For j = 1 To objRecordSet.RecordCount rem objRecordSet.PageSize Response.Write " <tr bgColor='" strTRbgColor = RowOddColor If j Mod 2 = 0 Then strTRbgColor = RowEvenColor Response.Write strTRbgColor If RowMoveColor <> "" Then Response.Write "' onmouseover=this.bgColor='" & RowMoveColor & "' onmouseout=this.bgColor='" & strTRbgColor End If Response.Write "'>" & vbCrLf If objRecordSet.Fields(0).Value <> "" Then strTemp = objRecordSet.Fields(0).Value Response.Write " <td>winnt://" & strTemp & "</td>" & vbNewLine For i = 1 To objRecordSet.Fields.Count - 1 strTemp = "<font color=" & strTRbgColor & ">-</font>" If objRecordSet.Fields(i).Value <> "" Then strTemp = objRecordSet.Fields(i).Value Response.Write " <td>" & strTemp & "</td>" & vbNewLine Next Response.Write " </tr>" & vbNewLine objRecordSet.MoveNext Next Response.Write "</table>" & vbNewLine Response.Write "<br><br>" & vbNewLine objRecordSet.Close Set objRecordSet = Nothing Set objConnection = Nothing End If %> </body> </html> <% Private Function TrimServerVariable(strString) Dim temp 'As String If inStr(strString,"&") <> 0 Then arr = Split(strString, "&") strString = "" For i = 0 To UBound(arr) - 1 temp = Left(arr(i), InStr(arr(i), "=")) If InStr(strString, temp) = 0 Then strString = strString & arr(i) & "&" End If Next strString = Left(strString, Len(strString) - 1) End If TrimServerVariable = strString End Function %> <% EndTime = Timer Response.Write "<!-- Page rendered in " & (EndTime-StartTime) & " -->" & vbNewLine %>
combined_dataset/train/non-malicious/SearchZIP_3.psm1 .ps1
SearchZIP_3.psm1 .ps1
function SearchZIPfiles { <# .SYNOPSIS Search for (filename) strings inside compressed ZIP or RAR files (V2.4). .DESCRIPTION In any directory containing a large number of ZIP/RAR compressed Web Page files this procedure will search each individual file name for simple text strings, listing both the source RAR/ZIP file and the individual file name containing the string. The relevant RAR/ZIP can then be subsequently opened in the usual way. Using the '-Table' (or alias '-GridView') switch will show the results with the Out-GridView display. .EXAMPLE extract -find 'library' -path d:\\scripts Searching for 'library' - please wait... (Use CTRL+C to quit) [Editor.zip] File: Windows 7 Library Procedures.mht [Editor.rar] File: My Library collection from 1974 Idi Amin.html [Test2.rar] File: Playlists from library - Windows 7 Forums.mht [Test3.rar] File: Module library functions UserGroup.pdf Folder 'D:\\Scripts' contains 4 matches for 'library' in 4 file(s). .EXAMPLE extract -find 'backup' -path desktop Searching for 'backup' - please wait... (Use CTRL+C to quit) [Web.zip] File: How To Backup User and System Files.mht [Pages.rar] File: Create an Image Backup.pdf Folder 'D:\\Scripts' contains 2 matches for 'backup' in 2 file(s). .EXAMPLE extract pdf desk Searching for 'pdf' - please wait... (Use CTRL+C to quit) [Test1.rar] File: VirtualBox_ Guest Additions package.pdf [Test2.rar] File: W8 How to Install Windows 8 in VirtualBox.pdf [Test2.rar] File: W8 Install Windows 8 As a VM with VirtualBox.pdf Folder 'C:\\Users\\Sam\\desktop' contains 3 matches for 'pdf' in 2 file(s). This example uses the 'extract' alias to find all 'pdf' files on the desktop. .NOTES The first step will find any lines containing the selected pattern (which can be anywhere in the line). Each of these lines will then be split into 2 headings: Source and Filename. Note that there may be the odd occasion where a 'non-readable' character in the returned string slips through the net! .LINK Web Address Http://www.SeaStarDevelopment.BraveHost.com #> [CmdletBinding()] param([string][string][Parameter(Mandatory=$true)]$Find, [string][ValidateNotNullOrEmpty()]$path = $pwd, [switch][alias("GRIDVIEW")]$table) Set-StrictMode -Version 2 [int]$count = 0 if ($path -like 'desk*') { $path = Join-Path $home 'desktop\\*' } else { $xpath = Join-Path $path '*' -ea 0 if (!($?) -or !(Test-Path $path)) { Write-Warning "Path '$path' is invalid - resubmit" return } $path = $xpath } Get-ChildItem $path -include '*.rar','*.zip' | Select-String -SimpleMatch -Pattern $find | foreach-Object ` -begin { $container = @{} $folder = $path.Replace('*','') $lines = @{} $regex = '(?s)^(?<zip>.+?\\.(?:zip|rar)):(?:\\d+):.*\\\\(?<file>.*\\.(mht|html?|pdf))(.*)$' Write-Host "Searching for '$find' - please wait... (Use CTRL+C to quit)" } ` -process { $_ = $_ -replace '/','\\' if ( $_ -match $regex ) { if ($container.keys -contains $matches.zip) { $container[$matches.zip] +=1 #Record the number in each. } else { $container[$matches.zip] = 1 } $source = $matches.zip -replace [regex]::Escape($folder) $file = $matches.file $file = $file -replace '\\p{S}|\\p{Cc}',' ' #Some 'Dingbats'. $file = $file -replace '\\s+',' ' #Single space words. if ($table) { $key = "{0:D4}" -f $count $lines["$key $source"] = $file #Create a unique key. } else { Write-Host "[$source] File: $file" } $count++ } } ` -end { $total = "in $($container.count) file(s)." $title = "Folder '$($path.Replace('\\*',''))' contains $($count) matches for '$find' $total" if ($table -and $count -gt 0) { $lines.GetEnumerator() | Select-Object @{name = 'Source';expression = {$_.Key.SubString(5)}}, @{name = 'File' ;expression = {$_.Value}} | Sort-Object File | Out-GridView -Title $title } else { if ($count -eq 0) { $title = "Folder '$($path.Replace('\\*',''))' contains no matches for '$find'." } Write-Host $title } } } #End function. New-Alias extract SearchZIPfiles -Description 'Find Web files inside ZIP/RAR' Export-ModuleMember -Function SearchZIPfiles -Alias Extract
combined_dataset/train/non-malicious/sample_32_38.ps1
sample_32_38.ps1
# # Module manifest for module 'OCI.PSModules.Audit' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Audit.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Audit Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList', 'Update-OCIAuditConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3538.ps1
3538.ps1
$location = "southeastasia" $resourceGroupName = "pstestFSRG1bca8f8e" $vaultName = "PSTestFSRSV1bca8f8e" $fileShareFriendlyName = "pstestfs1bca8f8e" $fileShareName = "AzureFileShare;pstestfs1bca8f8e" $saName = "pstestsa1bca8f8e" $saRgName = "pstestFSRG1bca8f8e" $targetSaName = "pstestsa3rty7d7s" $targetFileShareName = "pstestfs3rty7d7s" $targetFolder = "pstestfolder3rty7d7s" $folderPath = "pstestfolder1bca8f8e" $filePath = "pstestfolder1bca8f8e/pstestfile1bca8f8e.txt" $skuName="Standard_LRS" $policyName = "AFSBackupPolicy" $newPolicyName = "NewAFSBackupPolicy" function Test-AzureFSItem { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName Enable-Protection $vault $fileShareFriendlyName $saName $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -ProtectionStatus Healthy; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -ProtectionState IRPending; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -Name $fileShareFriendlyName ` -ProtectionStatus Healthy; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -Name $fileShareFriendlyName ` -ProtectionState IRPending; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -ProtectionState IRPending ` -ProtectionStatus Healthy; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Policy $policy; Assert-True { $items.Name -contains $fileShareName } $items = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles ` -Name $fileShareFriendlyName ` -ProtectionState IRPending ` -ProtectionStatus Healthy; Assert-True { $items.Name -contains $fileShareName } } finally { Cleanup-Vault $vault $items $container } } function Test-AzureFSBackup { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $item = Enable-Protection $vault $fileShareFriendlyName $saName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName $backupJob = Backup-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Item $item | Wait-AzRecoveryServicesBackupJob -VaultId $vault.ID Assert-True { $backupJob.Status -eq "Completed" } } finally { Cleanup-Vault $vault $item $container } } function Test-AzureFSProtection { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $policy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $policyName $enableJob = Enable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Policy $Policy ` -Name $fileShareFriendlyName ` -StorageAccountName $saName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName $item = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles Assert-True { $item.Name -contains $fileShareName } Assert-True { $item.LastBackupStatus -eq "IRPending" } Assert-True { $item.ProtectionPolicyName -eq $policyName } $newPolicy = Get-AzRecoveryServicesBackupProtectionPolicy ` -VaultId $vault.ID ` -Name $newPolicyName $enableJob = Enable-AzRecoveryServicesBackupProtection ` -VaultId $vault.ID ` -Policy $newPolicy ` -Item $item $item = Get-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -Container $container ` -WorkloadType AzureFiles Assert-True { $item.Name -contains $fileShareName } Assert-True { $item.LastBackupStatus -eq "IRPending" } Assert-True { $item.ProtectionPolicyName -eq $newPolicyName } } finally { Cleanup-Vault $vault $item $container } } function Test-AzureFSGetRPs { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $item = Enable-Protection $vault $fileShareFriendlyName $saName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName $backupJob = Backup-Item $vault $item $backupStartTime = $backupJob.StartTime.AddMinutes(-1); $backupEndTime = $backupJob.EndTime.AddMinutes(1); $recoveryPoint = Get-AzRecoveryServicesBackupRecoveryPoint ` -VaultId $vault.ID ` -StartDate $backupStartTime ` -EndDate $backupEndTime ` -Item $item; Assert-NotNull $recoveryPoint[0]; Assert-True { $recoveryPoint[0].Id -match $item.Id }; $recoveryPointDetail = Get-AzRecoveryServicesBackupRecoveryPoint ` -VaultId $vault.ID ` -RecoveryPointId $recoveryPoint[0].RecoveryPointId ` -Item $item; Assert-NotNull $recoveryPointDetail; } finally { Cleanup-Vault $vault $item $container } } function Test-AzureFSFullRestore { try { $vault = Get-AzRecoveryServicesVault -ResourceGroupName $resourceGroupName -Name $vaultName $item = Enable-Protection $vault $fileShareFriendlyName $saName $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType AzureStorage ` -Status Registered ` -FriendlyName $saName $backupJob = Backup-Item $vault $item $backupStartTime = $backupJob.StartTime.AddMinutes(-1); $backupEndTime = $backupJob.EndTime.AddMinutes(1); $recoveryPoint = Get-AzRecoveryServicesBackupRecoveryPoint ` -VaultId $vault.ID ` -StartDate $backupStartTime ` -EndDate $backupEndTime ` -Item $item; Assert-ThrowsContains { Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -TargetStorageAccountName $targetSaName ` -TargetFolder $targetFolder } ` "Provide TargetFileShareName for Alternate Location restore or remove TargetStorageAccountName for Original Location restore" Assert-ThrowsContains { Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -TargetFileShareName $targetFileShareName ` -TargetFolder $targetFolder } ` "Provide TargetStorageAccountName for Alternate Location restore or remove TargetFileShareName for Original Location restore" Assert-ThrowsContains { Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -SourceFileType File } ` "Provide SourceFilePath for File restore or remove SourceFileType for file share restore" Assert-ThrowsContains { Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -SourceFilePath $filePath } ` "Provide SourceFileType for File restore or remove SourceFilePath for file share restore" $restoreJob1 = Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -SourceFilePath $folderPath ` -SourceFileType Directory ` -TargetStorageAccountName $targetSaName ` -TargetFileShareName $targetFileShareName ` -TargetFolder $targetFolder | ` Wait-AzRecoveryServicesBackupJob -VaultId $vault.ID Assert-True { $restoreJob1.Status -eq "Completed" } $restoreJob2 = Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -TargetStorageAccountName $targetSaName ` -TargetFileShareName $targetFileShareName ` -TargetFolder $targetFolder | ` Wait-AzRecoveryServicesBackupJob -VaultId $vault.ID Assert-True { $restoreJob2.Status -eq "Completed" } $restoreJob3 = Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite ` -SourceFilePath $filePath ` -SourceFileType File | ` Wait-AzRecoveryServicesBackupJob -VaultId $vault.ID Assert-True { $restoreJob3.Status -eq "Completed" } $restoreJob4 = Restore-AzRecoveryServicesBackupItem ` -VaultId $vault.ID ` -VaultLocation $vault.Location ` -RecoveryPoint $recoveryPoint[0] ` -ResolveConflict Overwrite | ` Wait-AzRecoveryServicesBackupJob -VaultId $vault.ID Assert-True { $restoreJob4.Status -eq "Completed" } } finally { Cleanup-Vault $vault $item $container } }
combined_dataset/train/non-malicious/sample_50_23.ps1
sample_50_23.ps1
# # Module manifest for module 'OCI.PSModules.Marketplace' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplace.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b7f90e90-3cc1-4fca-9773-f27b90f7945b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplace Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplace.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIMarketplaceListing', 'Get-OCIMarketplaceAcceptedAgreement', 'Get-OCIMarketplaceAcceptedAgreementsList', 'Get-OCIMarketplaceAgreement', 'Get-OCIMarketplaceAgreementsList', 'Get-OCIMarketplaceCategoriesList', 'Get-OCIMarketplaceLaunchEligibility', 'Get-OCIMarketplaceListing', 'Get-OCIMarketplaceListingsList', 'Get-OCIMarketplacePackage', 'Get-OCIMarketplacePackagesList', 'Get-OCIMarketplacePublication', 'Get-OCIMarketplacePublicationPackage', 'Get-OCIMarketplacePublicationPackagesList', 'Get-OCIMarketplacePublicationsList', 'Get-OCIMarketplacePublishersList', 'Get-OCIMarketplaceReportsList', 'Get-OCIMarketplaceReportTypesList', 'Get-OCIMarketplaceTaxesList', 'Get-OCIMarketplaceThirdPartyPaidListingEligibility', 'Get-OCIMarketplaceWorkRequest', 'Get-OCIMarketplaceWorkRequestErrorsList', 'Get-OCIMarketplaceWorkRequestLogsList', 'Get-OCIMarketplaceWorkRequestsList', 'Invoke-OCIMarketplaceSearchListings', 'Move-OCIMarketplacePublicationCompartment', 'New-OCIMarketplaceAcceptedAgreement', 'New-OCIMarketplacePublication', 'Remove-OCIMarketplaceAcceptedAgreement', 'Remove-OCIMarketplacePublication', 'Update-OCIMarketplaceAcceptedAgreement', 'Update-OCIMarketplacePublication' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplace' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Test-TCPPort_2.ps1
Test-TCPPort_2.ps1
function Test-TCPPort { param ( [parameter(Mandatory=$true)] [string] $ComputerName, [parameter(Mandatory=$true)] [string] $Port ) try { $TimeOut = 5000 $IsConnected = $false $Addresses = [System.Net.Dns]::GetHostAddresses($ComputerName) | ? {$_.AddressFamily -eq 'InterNetwork'} $Address = [System.Net.IPAddress]::Parse($Addresses) $Socket = New-Object System.Net.Sockets.TCPClient $Connect = $Socket.BeginConnect($Address, $Port, $null, $null) $Wait = $Connect.AsyncWaitHandle.WaitOne($TimeOut, $false) if ( $Socket.Connected ) { $IsConnected = $true $Socket.Close() } else { $IsConnected = $false } } catch { Write-Debug $_ $IsConnected = $false } finally { return $IsConnected } }
combined_dataset/train/non-malicious/sample_12_57.ps1
sample_12_57.ps1
@{ GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" NestedModules="Microsoft.PowerShell.Commands.Management.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' FunctionsToExport = @() AliasesToExport = @("gcb", "gtz", "scb") CmdletsToExport=@("Add-Content", "Clear-Content", "Clear-ItemProperty", "Join-Path", "Convert-Path", "Copy-ItemProperty", "Get-ChildItem", "Get-Clipboard", "Set-Clipboard", "Get-Content", "Get-ItemProperty", "Get-ItemPropertyValue", "Move-ItemProperty", "Get-Location", "Set-Location", "Push-Location", "Pop-Location", "New-PSDrive", "Remove-PSDrive", "Get-PSDrive", "Get-Item", "New-Item", "Set-Item", "Remove-Item", "Move-Item", "Rename-Item", "Copy-Item", "Clear-Item", "Invoke-Item", "Get-PSProvider", "New-ItemProperty", "Split-Path", "Test-Path", "Get-Process", "Stop-Process", "Wait-Process", "Debug-Process", "Start-Process", "Test-Connection", "Remove-ItemProperty", "Rename-ItemProperty", "Resolve-Path", "Set-Content", "Set-ItemProperty", "Get-TimeZone", "Stop-Computer", "Restart-Computer") } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7VSKADi66xWJM # 6HEA1fH30eG2InNZKlDJZkesFZvWeqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5sRkkqFV4tm2L8Ww9Nazk # vwEuj6sw3rJoUClckmtaMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAftJ0y9FE2HpIQD9xro9Z8KzXtHYEIZIzdWJV70WBnD7z9uV/ITLhuztC # 6Z1Iggth2pKcuV8yNI0ELI8uqYLAtNvUC/9GHnSBOBVJgfq2+nEoMD4Y8Y3dQn/a # fNFNh1lqACo3yh23OBAyImbgTR0A/4pPQVmNwTPayuLdBgSEwVHs5Op1KmfaVllW # oUoRwlcFoBVDE/+KsbBXWia55NvsOY3kMQ0diPXW34usqPZNCGkNuAlCeEn3v1h/ # gNcSF+m+R2XCdVzc4CPPmTFSguzbYG7fyexDciO4DmgFE8DOyiGGoQ82qNCZxHtz # YNrVia10yGe/fTOUivamw15vXNwft6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAdrfn0uSosF8mSfj6yWwsTPc4nuYTm7UjXGBKbcNbd+AIGZwf/oHmD # GBMyMDI0MTAxNjE1MjgzMy45NTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rm93DAiGA8yMDI0MTAxNjA0MjE0 # OFoYDzIwMjQxMDE3MDQyMTQ4WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqub3c # AgEAMAoCAQACAhWPAgH/MAcCAQACAhNyMAoCBQDquw9cAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBACbJPRmIdE3WH1e57OYJ8eFfsWWTi/YXUdV83U5CZtOS # AT6Fp/tIe3Npo2sHXIHAV7q5+deIIsTzIppKrue349SQ7W2wwNggNLY+MMJpRyT7 # Z5w/WpEgAzZCZQMOzH9TrEs1QQiNQxMNip/ArKuiZydCnN2lpno6WR8AFUB4sBDI # r/lyChJEjnNFXJZv1n2yX3o9vKtBiCQLrdf/M+1MhxBX3eTDKBsmIleEC7Vwmu/W # BmiYgoraqVWsojYgmuUo2M+OGVOTyamb1Tq3BZll3I1vcySiHyHMHQfZM3cN1Mw/ # eMNII+HFu/eW1ZN6PlO+Z1enQzzQ3CfW1MCcEEoK6rYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDRIZBY8mrZ6u0bGsg2V0bkhAdQcs1GF2HTzDnHqm6T # nDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQg63C7e/ZiDyhwIXuZIZxhp/gw # jbHP1Li08qLFXSPFeH4wDQYJKoZIhvcNAQELBQAEggIAUls9HlJZS/NSWrjdSQcn # FuEB+JSOV/D+bcUkkjDyGCGaJ2+nFSPU2b3zUAN+PMcWZROkR9fpnQjLqPs0zndj # PBmrbqb/NUMHV5Z9kM+cBJG6ze2cmnIirbJkZ7tsrUf6eJFsHmj11Vi5H3Y2ZPZ2 # 5gciVWQoJTUKvaMy+z5sva9DS1BPLH0QbyROCaAwexwnMc6r+VSbj8RNUgHcZizT # r+tU95woZ24oY91ahgEiGNvERyZ2atftlGLbsHAqUckJthMHIzyHYhpghfNO9v3B # I9u649MhoKoszlQ8vCH/akMvn1U9NMKDZt1MtpPbYzYP4Os54wQrz+KTPCfQCVVG # zjA0cz71bM24UCE3u7h++BcDTm4OmkcsfvgdR8fhgc2Y5QAVuFUxNFfEQXg4iPrV # kK+2rHwnZ7ozjprk4Yka9l5SMuyremcargdyEzCY03nDKvvBK9GtRxOg0SwMviK4 # FhIbfFZXbrMw/1vKGF+JILevkacvBWBgvYn3PzG5jh0D9HxVAwHc8IG3N0ACSVFa # ZMBn0LRyNjsQXLMHwvSaFHktWSXKdth910BRy8zFYz3hjOTyQnzg/fhSDni7sQSd # j2c96eCmi/3iXJtuhQzMFPBijG5fEHz2r9qVhMwsUq/sD38rpUH6HImKU571eKO/ # kikOJDBo7TanR2H5Hz9HXyk= # SIG # End signature block
combined_dataset/train/non-malicious/2863.ps1
2863.ps1
function FormatTaskName { [CmdletBinding()] param( [Parameter(Mandatory = $true)] $format ) $psake.context.Peek().config.taskNameFormat = $format }
combined_dataset/train/non-malicious/860.ps1
860.ps1
function Start-MapReduce { $ErrorActionPreference = "Stop" $context = Get-AzContext if ($context -eq $null) { Connect-AzAccount } $context $clusterName = Read-Host -Prompt "Enter the HDInsight cluster name" $creds=Get-Credential -Message "Enter the login for the cluster" $outputPath="/example/wordcountoutput" $activity="C Write-Progress -Activity $activity -Status "Getting cluster information..." $clusterInfo = Get-AzHDInsightCluster -ClusterName $clusterName $resourceGroup = $clusterInfo.ResourceGroup $storageActArr=$clusterInfo.DefaultStorageAccount.split('.') $storageAccountName=$storageActArr[0] $storageType=$storageActArr[1] $jobDef=New-AzHDInsightStreamingMapReduceJobDefinition ` -Files "/mapper.exe","/reducer.exe" ` -Mapper "mapper.exe" ` -Reducer "reducer.exe" ` -InputPath "/example/data/gutenberg/davinci.txt" ` -OutputPath $outputPath Write-Progress -Activity $activity -Status "Starting MapReduce job..." $job=Start-AzHDInsightJob ` -ClusterName $clusterName ` -JobDefinition $jobDef ` -HttpCredential $creds Write-Progress -Activity $activity -Status "Waiting for the job to complete..." Wait-AzHDInsightJob ` -ClusterName $clusterName ` -JobId $job.JobId ` -HttpCredential $creds Write-Progress -Activity $activity -Completed if($storageType -eq 'azuredatalakestore') { $filePath=$clusterInfo.DefaultStorageRootPath + $outputPath + "/part-00000" Export-AzDataLakeStoreItem ` -Account $storageAccountName ` -Path $filePath ` -Destination output.txt } else { $container=$clusterInfo.DefaultStorageContainer $storageAccountKey=(Get-AzStorageAccountKey ` -Name $storageAccountName ` -ResourceGroupName $resourceGroup)[0].Value $context = New-AzStorageContext ` -StorageAccountName $storageAccountName ` -StorageAccountKey $storageAccountKey Get-AzStorageBlobContent ` -Blob 'example/wordcountoutput/part-00000' ` -Container $container ` -Destination output.txt ` -Context $context } }
combined_dataset/train/non-malicious/1474.ps1
1474.ps1
function Assert-ModuleVersion { param( [Parameter(Mandatory=$true)] [string] $ManifestPath, [string[]] $AssemblyPath, [string] $ReleaseNotesPath, [string] $NuspecPath, [string[]] $ExcludeAssembly ) Set-StrictMode -Version 'Latest' $errorsAtStart = $Error.Count $manifest = Test-ModuleManifest -Path $ManifestPath if( -not $manifest ) { return } $version = $manifest.Version Write-Verbose -Message ('Checking that {0} module is at version {1}.' -f $manifest.Name,$version) $badAssemblies = Invoke-Command { $manifest.RequiredAssemblies | ForEach-Object { if( -not [IO.Path]::IsPathRooted($_) ) { Join-Path -Path (Split-Path -Parent -Path $manifest.Path) -ChildPath $_ } else { $_ } } if( $AssemblyPath ) { $AssemblyPath } } | Where-Object { foreach( $exclusion in $ExcludeAssembly ) { if( (Split-Path -Leaf -Path $_) -like $exclusion ) { return $false } } return $true } | Get-Item | Where-Object { -not ($_.VersionInfo.FileVersion.ToString().StartsWith($version.ToString())) -or -not ($_.VersionInfo.ProductVersion.ToString().StartsWith($version.ToString())) } | ForEach-Object { ' * {0} (FileVersion: {1}; ProductVersion: {2})' -f $_.Name,$_.VersionInfo.FileVersion,$_.VersionInfo.ProductVersion } if( $badAssemblies ) { Write-Error -Message ('The following assemblies are not at version {0}.{1}{2}' -f $version,([Environment]::NewLine),($badAssemblies -join ([Environment]::NewLine))) } if( $ReleaseNotesPath ) { $foundFirstVersion = $false $releaseNotesVersion = Get-Content -Path $ReleaseNotesPath | ForEach-Object { if( -not $foundFirstVersion -and $_ -match '^ { $foundFirstVersion = $true return [Version]$Matches[1] } } if( -not $releaseNotesVersion ) { Write-Error -Message ('Version {0} not found in release notes ({1}).' -f $version,$ReleaseNotesPath) } } if( $NuspecPath ) { $nuspec = [xml](Get-Content -Raw -Path $NuspecPath) if( $nuspec ) { $nuspecVersion = [Version]($nuspec.package.metadata.version) if( $nuspecVersion ) { if( $version -ne $nuspecVersion ) { Write-Error -Message ('Nuspec file ''{0}'' is at version {1}, but should be at version {2}..' -f $NuspecPath,$nuspecVersion,$version) } } else { Write-Error -Message ('Nuspec file ''{0}'' contains an invalid version.' -f $NuspecPath) } } else { Write-Error -Message ('Nuspec file ''{0}'' does not contain valid XML.' -f $NuspecPath) } } return (($Error.Count - $errorsAtStart) -eq 0) }
combined_dataset/train/non-malicious/sample_21_65.ps1
sample_21_65.ps1
# # Module manifest for module 'OCI.PSModules.Generativeai' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Generativeai.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '88627585-5bbc-41e3-a1a5-15e5194ce97a' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Generativeai Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Generativeai.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIGenerativeaiDedicatedAiCluster', 'Get-OCIGenerativeaiDedicatedAiClustersList', 'Get-OCIGenerativeaiEndpoint', 'Get-OCIGenerativeaiEndpointsList', 'Get-OCIGenerativeaiModel', 'Get-OCIGenerativeaiModelsList', 'Get-OCIGenerativeaiWorkRequest', 'Get-OCIGenerativeaiWorkRequestErrorsList', 'Get-OCIGenerativeaiWorkRequestLogsList', 'Get-OCIGenerativeaiWorkRequestsList', 'Move-OCIGenerativeaiDedicatedAiClusterCompartment', 'Move-OCIGenerativeaiEndpointCompartment', 'Move-OCIGenerativeaiModelCompartment', 'New-OCIGenerativeaiDedicatedAiCluster', 'New-OCIGenerativeaiEndpoint', 'New-OCIGenerativeaiModel', 'Remove-OCIGenerativeaiDedicatedAiCluster', 'Remove-OCIGenerativeaiEndpoint', 'Remove-OCIGenerativeaiModel', 'Update-OCIGenerativeaiDedicatedAiCluster', 'Update-OCIGenerativeaiEndpoint', 'Update-OCIGenerativeaiModel' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Generativeai' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3255.ps1
3255.ps1
class Stream { [object[]]$Debug = @() [object[]]$Error = @() [object[]]$Information = @() [object[]]$Verbose = @() [object[]]$Warning = @() }
combined_dataset/train/non-malicious/sample_48_6.ps1
sample_48_6.ps1
[CmdletBinding()] param ( [string]$ACLPath, [string]$TargetPath ) # Get the ACL from the source folder $acl = Get-Acl -Path $ACLPath $acl | fl # Split the target path into individual folder names $folders = $targetPath.Split('\') # Initialize the folder variable into empty string $folder = "" # Loop through each folder in the target path foreach ($subFolder in $folders) { # Concatenate the current folder with the subfolder #initialize folder with first subfolder during 1st iteration of loop if (-not $folder) { $folder = $subFolder } else { $folder = Join-Path -Path $folder -ChildPath $subFolder $folder } # Check if the folder exists if (-not (Test-Path -Path $folder -PathType Container)) { # Create the folder if it doesn't exist try { New-Item -Path $folder -ItemType Directory -Force -ErrorAction Stop # Apply the same ACL as the source folder Set-Acl -Path $folder -AclObject $acl Get-Acl -Path $folder | fl } catch { break } } }
combined_dataset/train/non-malicious/2513.ps1
2513.ps1
$Error.Clear() $erroractionpreference = "SilentlyContinue" $a = New-Object -comobject Excel.Application $a.visible = $True $b = $a.Workbooks.Add() $c = $b.Worksheets.Item(1) $c.Cells.Item(1,1) = "Machine Name" $c.Cells.Item(1,2) = "SNMP Updated" $d = $c.UsedRange $d.Interior.ColorIndex = 19 $d.Font.ColorIndex = 11 $d.Font.Bold = $True $intRow = 2 foreach ($strComputer in get-content C:\MachineList.Txt) { $c.Cells.Item($intRow,1) = $strComputer.ToUpper() $ping = new-object System.Net.NetworkInformation.Ping $Reply = $ping.send($strComputer) if($Reply.status -eq "success") { $reg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine', $strComputer) $regKey= $reg.OpenSubKey("SYSTEM\\CurrentControlSet\\Services\\SNMP\\Parameters\\ValidCommunities",$true) $regKey.SetValue('ipm0nitoR','4','DWORD') $regKey.DeleteValue('public') If($Error.Count -eq 0) { $c.Cells.Item($intRow,2).Interior.ColorIndex = 4 $c.Cells.Item($intRow,2) = "Yes" } Else { $c.Cells.Item($intRow,2).Interior.ColorIndex = 3 $c.Cells.Item($intRow,2) = "No" $Error.Clear() } } Else { $c.Cells.Item($intRow,2).Interior.ColorIndex = 3 $c.Cells.Item($intRow,2) = "Not Pingable" } $Error.Clear() $Reply = "" $pwage = "" $intRow = $intRow + 1 } $d.EntireColumn.AutoFit() cls
combined_dataset/train/non-malicious/Dumping COM.ps1
Dumping COM.ps1
$arr = @() $key = "HKLM:\\SOFTWARE\\Classes\\CLSID" foreach ($i in (gci $key)) { $des = $key + "\\" + $i.PSChildName + "\\ProgID" Write-Progress "Dumping. Please, standby..." $des foreach ($a in (gp -ea 0 $des)."(default)") { $arr += $a } } [array]::Sort([array]$arr) $arr | Out-File -file C:\\logs\\COMnames.txt -enc UTF8
combined_dataset/train/non-malicious/Get-DiskUsage_4.ps1
Get-DiskUsage_4.ps1
Function Get-DiskUsage { <# .SYNOPSIS A tribute to the excellent Unix command DU. .DESCRIPTION This command will output the full path and the size of any object and it's subobjects. Using just the Get-DiskUsage command without any parameters will result in an output of the directory you are currently placed in and it's subfolders. .PARAMETER Path If desired a path can be specified with the Path parameter. In no path is specified $PWD will be used. .PARAMETER h the -h paramater is the same as -h in Unix. It will list the folders and subfolders in the most appropriate unit depending on the size (i.e. Human Readable). .PARAMETER l The -l paramater will add the largest file to the end of the output. .PARAMETER Sort Allows you to sort by Folder or Size. If none i specified the default of Folder will be used. .PARAMETER Depth Depth will allow you to specify a maximum recursion depth. A depth of 1 would return the immediate subfolders under the root. .PARAMETER Force Works the same way as Get-ChildItem -force. .PARAMETER Descending Works the same way as Sort-Object -descending. .LINK http://www.donthaveasite.nu .NOTES Author: Jonas Hallqvist Developed with Powershell v3 #> [CmdletBinding( SupportsShouldProcess=$True )] param ( [String]$Path=$PWD, [Switch]$h, [Switch]$l, [String]$Sort="Folder", [Int]$Depth, [Switch]$Force, [Switch]$Descending ) $ErrorActionPreference = "silentlycontinue" function HumanReadable { param ($size) switch ($size) { {$_ -ge 1PB}{"{0:#'P'}" -f ($size / 1PB); break} {$_ -ge 1TB}{"{0:#'T'}" -f ($size / 1TB); break} {$_ -ge 1GB}{"{0:#'G'}" -f ($size / 1GB); break} {$_ -ge 1MB}{"{0:#'M'}" -f ($size / 1MB); break} {$_ -ge 1KB}{"{0:#'K'}" -f ($size / 1KB); break} default {"{0}" -f ($size) + "B"} } } function LargestFolder { if ($h) { $large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize -HideTableHeaders Write-host "Largest Folder is:" -NoNewline $large } else { $large = ($results | Sort-Object -Property Size -Descending)[0] | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize -HideTableHeaders Write-host "Largest Folder is:" -NoNewline $large } } function Max-Depth { param( [String]$Path = '.', [String]$Filter = '*', [Int]$Level = 0, [Switch]$Force, [Switch]$Descending, [int]$i=0 ) $results=@() $root = (Resolve-Path $Path).Path if ($root -notmatch '\\\\$') {$root += '\\'} if (Test-Path $root -PathType Container) { do { [String[]]$_path += $root + "$Filter" $Filter = '*\\' + $Filter $i++ } until ($i -eq $Level) $dirs=Get-ChildItem -directory $_path -Force:$Force foreach ($dir in $dirs) { $size = 0 $size += (gci $dir.Fullname -recurse | Measure-Object -Property Length -Sum).Sum $results += New-Object psobject -Property @{Folder=$dir.fullname;Size=$size} } if ($h) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize } if ($l) { LargestFolder } if (($h -eq $false) -and ($l -eq $false)) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize } } } if ($Depth) { Max-Depth -Path $Path -Level $Depth -Force:$Force -Descending:$Descending } else { $results = @() $dirs=Get-ChildItem -directory $Path -Force:$Force -Recurse foreach ($dir in $dirs) { $size = 0 $size += (gci $dir.FullName -Recurse | Measure-Object -Property Length -Sum).Sum $results+= New-Object psobject -Property @{Folder=$dir.FullName;Size=$size} } if ($h) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={HumanReadable $_.Size};Align="Right"},Folder -AutoSize } if ($l) { LargestFolder } if (($h -eq $false) -and ($l -eq $false)) { $results | Sort-Object $Sort -Descending:$Descending | Format-Table @{Label="Size";Expression={"$($_.Size)B"};Align="Right"},Folder -AutoSize } } } <# Copyright (c) 2013, Jonas Hallqvist All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #>
combined_dataset/train/non-malicious/1272.ps1
1272.ps1
function Remove-CDotNetAppSetting { [CmdletBinding(SupportsShouldProcess=$true, DefaultParameterSetName='All')] param( [Parameter(Mandatory=$true)] [string] $Name, [Switch] $Framework, [Switch] $Framework64, [Switch] $Clr2, [Switch] $Clr4 ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState if( -not ($Framework -or $Framework64) ) { Write-Error "You must supply either or both of the Framework and Framework64 switches." return } if( -not ($Clr2 -or $Clr4) ) { Write-Error "You must supply either or both of the Clr2 and Clr4 switches." return } $runtimes = @() if( $Clr2 ) { $runtimes += 'v2.0' } if( $Clr4 ) { $runtimes += 'v4.0' } $runtimes | ForEach-Object { $params = @{ FilePath = (Join-Path $CarbonBinDir 'Remove-DotNetAppSetting.ps1' -Resolve); ArgumentList = @( (ConvertTo-CBase64 -Value $Name) ); Runtime = $_; ExecutionPolicy = [Microsoft.PowerShell.ExecutionPolicy]::RemoteSigned; } if( $Framework ) { Invoke-CPowerShell @params -x86 } if( $Framework64 ) { Invoke-CPowerShell @params } } }
combined_dataset/train/non-malicious/1256.ps1
1256.ps1
function Get-CTrustedHost { [CmdletBinding()] param( ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState $trustedHosts = (Get-Item $TrustedHostsPath -Force).Value if( $trustedHosts ) { return $trustedHosts -split ',' } } Set-Alias -Name 'Get-TrustedHosts' -Value 'Get-CTrustedHost'
combined_dataset/train/non-malicious/sample_27_47.ps1
sample_27_47.ps1
# # Module manifest for module 'Az.SecurityInsights' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.SecurityInsights.psm1' # Version number of this module. ModuleVersion = '3.1.2' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '453d4fb9-65ec-4cf1-8358-6a0fbd995d19' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: SecurityInsights cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'SecurityInsights.Autorest/bin/Az.SecurityInsights.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'SecurityInsights.Autorest\Az.SecurityInsights.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('SecurityInsights.Autorest/Az.SecurityInsights.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzSentinelAlertRule', 'Get-AzSentinelAlertRuleAction', 'Get-AzSentinelAlertRuleTemplate', 'Get-AzSentinelAutomationRule', 'Get-AzSentinelBookmark', 'Get-AzSentinelBookmarkRelation', 'Get-AzSentinelDataConnector', 'Get-AzSentinelEnrichment', 'Get-AzSentinelEntity', 'Get-AzSentinelEntityActivity', 'Get-AzSentinelEntityInsight', 'Get-AzSentinelEntityQuery', 'Get-AzSentinelEntityQueryTemplate', 'Get-AzSentinelEntityRelation', 'Get-AzSentinelEntityTimeline', 'Get-AzSentinelIncident', 'Get-AzSentinelIncidentAlert', 'Get-AzSentinelIncidentBookmark', 'Get-AzSentinelIncidentComment', 'Get-AzSentinelIncidentEntity', 'Get-AzSentinelIncidentRelation', 'Get-AzSentinelMetadata', 'Get-AzSentinelOnboardingState', 'Get-AzSentinelSetting', 'Get-AzSentinelThreatIntelligenceIndicator', 'Get-AzSentinelThreatIntelligenceIndicatorMetric', 'Invoke-AzSentinelThreatIntelligenceIndicatorQuery', 'New-AzSentinelAlertRule', 'New-AzSentinelAlertRuleAction', 'New-AzSentinelAutomationRule', 'New-AzSentinelBookmark', 'New-AzSentinelBookmarkRelation', 'New-AzSentinelDataConnector', 'New-AzSentinelEntityQuery', 'New-AzSentinelIncident', 'New-AzSentinelIncidentComment', 'New-AzSentinelIncidentRelation', 'New-AzSentinelIncidentTeam', 'New-AzSentinelOnboardingState', 'Remove-AzSentinelAlertRule', 'Remove-AzSentinelAlertRuleAction', 'Remove-AzSentinelAutomationRule', 'Remove-AzSentinelBookmark', 'Remove-AzSentinelBookmarkRelation', 'Remove-AzSentinelDataConnector', 'Remove-AzSentinelEntityQuery', 'Remove-AzSentinelIncident', 'Remove-AzSentinelIncidentComment', 'Remove-AzSentinelIncidentRelation', 'Remove-AzSentinelOnboardingState', 'Test-AzSentinelDataConnectorCheckRequirement', 'Update-AzSentinelAlertRule', 'Update-AzSentinelAlertRuleAction', 'Update-AzSentinelAutomationRule', 'Update-AzSentinelBookmark', 'Update-AzSentinelBookmarkRelation', 'Update-AzSentinelDataConnector', 'Update-AzSentinelEntityQuery', 'Update-AzSentinelIncident', 'Update-AzSentinelIncidentComment', 'Update-AzSentinelIncidentRelation', 'Update-AzSentinelSetting' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','SecurityInsights' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAAHr+GWEsDFsL8 # txIdrPubIx/y4kvQxbovKs5SPOOhwaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEqSxLs9yI6ZUlsw6bf6wQcv # bBZfobjoa+R1aJ87KouSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAThcadtWMH554FPrn44Do4HkK3bs52pNbvQhLyRKm7RQ5ECnbLXUdKiG/ # 5lyKnVugNX6NoCzhStWxmPe5k+6d5payHzJN+b+7EUNHotOBXXMLv25sDkq0YMay # UvHAt2QRObR2W42QeD8MCdUTFG12ccJ2bTU0S5ZdO2tcsZEmnVuB47SscbPtPCBp # +78g7G9HZsd0V7zEkYT4fS4pWGga0mHefS2GhCiblV26XRCZGaCd2uo/2Gu0rv7H # mzQseaAfwqM9dnEO9sZwxPU6N61iw/D8/YDGq4IJlpNsq0LOhlXEFy1MYqMfe9I2 # 8salQQM5hmD/x/gC9fYa8MMk1f2KsKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA+6YDamXYZnQ27+EuHIYP2Rwl6voFY583W3Appo3o7RgIGZiAgt1OA # GBMyMDI0MDQyMzE0MTExNi44NDhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgR6OowxAUu2pp+zoeSFyF8G2PMX//s3mQOIch3AJPEIIwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICADLmW8uVh3JSNezbBfarF33afPp8xfoHOQWa # lHAHflQN6SVYDyrqBGwoM4WNRHhcCeBlbPYh5uvFj6RRZ6LlZqJ7VUxkZhG8Pffh # bllPneU7huP1tIc7KLIrAejujODTzlRoqv4js+rn651D05q3lPe/YEQlk9CpeQdg # ZcO09a4kA9XHaPDnIbw2mwMt0fnwfvSMd2LkhW73HC2qiipL81hGGMiIEdxAtF2x # 1BfVk3pVG3oAPcEF5JeXmmqgf2CYJgnmSNkf/ESboix7gXhZSb+HOqXXKYJC8R1X # oA3WR3xc+ihEBGx2c+LEZdmlDCYjPHIs0OqoxEoULhN5wQ96v0u3JasTLfzix94G # CSanbp4RnPQqUZDjkOGpevwH8yk+a58JGgjVBtxfMARw5QOCtQ0A/aGf9Zv4FjPu # KOrcEM3lHuR/H9YfS/jmxLFaY9TefM4dh73CqKbtgK29b0ZgSuKcrC5EA0mnSW3J # o8ShJ0HeLfzexL17amTFzzbZ2XYK0GM6/WJ1R2P/KFcYPMYUWE+nfUUgw5aBMs/j # yLJfOF1cE43/ZgKXnwVxrxWp4NPazTtYpydo+Doj//obP3FxmR9hIK6B9Gn+4I0d # RMpvDwlQ75IlY8jDxMpRgdr7soSZtxs1L6jmvUtq7QWSmMcAm/DBcfvVAY1i8oYP # 6MiYNaVZ # SIG # End signature block
combined_dataset/train/non-malicious/3522.ps1
3522.ps1
function Test-AzDtlVMsPerLabPolicy { $policy = Set-AzDtlVMsPerLabPolicy -MaxVMs 5 -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlVMsPerLabPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "5" $x.Threshold } } function Test-AzDtlVMsPerUserPolicy { $policy = Set-AzDtlVMsPerUserPolicy -MaxVMs 5 -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlVMsPerUserPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "5" $x.Threshold } } function Test-AzDtlAllowedVMSizesPolicy { $policy = Set-AzDtlAllowedVMSizesPolicy -Enable -LabName $labName -ResourceGroupName $rgname -VmSizes Standard_A3, Standard_A0 $readBack = Get-AzDtlAllowedVMSizesPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual '["Standard_A3","Standard_A0"]' $x.Threshold } } function Test-AzDtlAutoShutdownPolicy { $policy = Set-AzDtlAutoShutdownPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlAutoShutdownPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.DailyRecurrence.Time } } function Test-AzDtlAutoStartPolicy { $policy = Set-AzDtlAutoStartPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname $readBack = Get-AzDtlAutoStartPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.WeeklyRecurrence.Time } $policy = Set-AzDtlAutoStartPolicy -Time "13:30:00" -LabName $labName -ResourceGroupName $rgname -Days Monday, Tuesday $readBack = Get-AzDtlAutoStartPolicy -LabName $labName -ResourceGroupName $rgname Invoke-For-Both $policy $readBack ` { Param($x) Assert-AreEqual "Enabled" $x.Status Assert-AreEqual "1330" $x.WeeklyRecurrence.Time Assert-AreEqualArray ([System.DayOfWeek]::Monday, [System.DayOfWeek]::Tuesday) $x.WeeklyRecurrence.Weekdays } }
combined_dataset/train/non-malicious/sample_43_62.ps1
sample_43_62.ps1
# # Module manifest for module 'Az.HealthcareApis' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.HealthcareApis.psm1' # Version number of this module. ModuleVersion = '2.0.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'de3f478d-0227-4782-85cf-62fb649b685a' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: HealthcareApis cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'HealthcareApis.Autorest/bin/Az.HealthcareApis.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'HealthcareApis.Autorest\Az.HealthcareApis.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('HealthcareApis.Autorest/Az.HealthcareApis.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzHealthcareApisService', 'Get-AzHealthcareApisWorkspace', 'Get-AzHealthcareDicomService', 'Get-AzHealthcareFhirDestination', 'Get-AzHealthcareFhirService', 'Get-AzHealthcareIotConnector', 'Get-AzHealthcareIotConnectorFhirDestination', 'New-AzHealthcareApisService', 'New-AzHealthcareApisWorkspace', 'New-AzHealthcareDicomService', 'New-AzHealthcareFhirService', 'New-AzHealthcareIotConnector', 'New-AzHealthcareIotConnectorFhirDestination', 'Remove-AzHealthcareApisService', 'Remove-AzHealthcareApisWorkspace', 'Remove-AzHealthcareDicomService', 'Remove-AzHealthcareFhirService', 'Remove-AzHealthcareIotConnector', 'Remove-AzHealthcareIotConnectorFhirDestination', 'Test-AzHealthcareServiceNameAvailability', 'Update-AzHealthcareApisService', 'Update-AzHealthcareApisWorkspace', 'Update-AzHealthcareDicomService', 'Update-AzHealthcareFhirService', 'Update-AzHealthcareIotConnector' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','HealthcareApis','HealthCare','FhirService' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC8vgsszNNX6fDV # dIgBRQsDG/rW2z0OeoYwPCfC6SR+F6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICrlLXwp64DfXS9VmKUaSK/G # 6E4syodgd2EF1w8GCVy5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGLLDLA9l7HAWa+6MKDfddy7pAmAMkw6KpZXQmWbD27QPeIz57p4FfmTM # Ww8vRGNJGfMbnzyFNfIeJ76at2TLyw/XN/bxebezIycVTtSNu/TrUzx/PsXFCBEK # h9Bg1xaYK0gne547EF6myWOM2WpRZ4J/v/XDpHwCs/g8396bzV1MOxDvnrBhOuoe # rLouudbQTg5KDhIle00j3W65CSruMSZRkYJvTyg11gOgd7dgc706iUYgWnltpyFV # m6NDoSNH4EU9AwR8+ID0Z7ygpx0mg6z5ANdTgP0gwvFxAkAlhgpuMeYqQrTPhGrn # nuczpT6GqLZwfO75lgxpoR3z+/J6/qGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBYShg5zLl4bjg3WbMHyX04uKDWVt1FrMgi95AiHkVeZQIGZh+4jL7S # GBMyMDI0MDQyMzE0MTExNy41ODZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA # 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x # gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq # +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf # y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgPHi4TdmKGSaiAib8t4e8R+RQ89FKUO25AkTcKloSGfEwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J # MA0GCSqGSIb3DQEBCwUABIICACIK0ekcwSD0m1twBcGsGAfisPyRELplanjm060G # 28cY4remxPmIpE3uGDDYQd8ZbwBSBBTx3uNLe80kwSAcXWc1QpVC/mR+r0swvx8s # ygv9xhbitueWBF3LK0bB57e2p2RXkT0hko1wL7R1HlN52h73bee7o015+NXCta+9 # qt6NYOy2ZJsEwcdkTBChRVrdWGDKrBbgRrWVyga0CNNjQ5C4Gy7SSBmCoeDaAxEs # go6lpY/9kBKTIG//Lsen6BlSmnIMGOXDb4EPDiMX4lHdAp2T4qCVKYpnHxykmcPP # XY+jk2rv0L4w+mVKwl9IVcYXkUputQkmkzS7ROy3l5EEnpOYjKI1HyGZPlpkQmyL # 4UhkVE1VdEsrIFUXYwYuFTKhboY4CcNqHuomy9iZAzyo9pP4wnBPj86OPYqBjjj9 # bkZOcMIf5HO3AI31x1iMf2KDFo/BGvPWN4rE8YQoEZ1VPAPV3hgNdIqnQy03rDpz # usmaEloX3ZzAwi44RSc8HmIZui5lzqn15qa3GHA54ys3E2uMNgIZWBCiDiT/YswY # l8SaSVzMljZYet+KxuGHTvr3U2XYMCloe7lt3B4/eWPuImqC+n6pl4Avpz2WdD7e # +VyNO7EofnPxdnhxdn9zhIlCeChe/ZNdyOIbsxutvRPjNdJd0tDd5vgbdvJyrRqH # pQ2Z # SIG # End signature block
combined_dataset/train/non-malicious/sample_23_25.ps1
sample_23_25.ps1
ConvertFrom-StringData @' IPAddressDisplayNameFormat=IP アドレス: {0} NetworkNameDisplayNameFormat=名前: {0} NetworkNameOfflineDisplayNameFormat=IP アドレス: "{0}" 上のアドレス CreateClusterProgressValidationStart=フェールオーバー クラスターに対するサーバーの適合性を検証しています。 CreateClusterProgressValidationEnd=フェールオーバー クラスターに対するサーバーの適合性の検証が完了しました。 CreateClusterProgressCreationStartFormat=フェールオーバー クラスター "{0}" を作成しています。 CreateClusterProgressCreationEndFormat=フェールオーバー クラスター "{0}" の作成が完了しました。 AddNodesProgressValidationStart=フェールオーバー クラスターに対する新しいサーバーの適合性を検証しています。 AddNodesProgressValidationEnd=フェールオーバー クラスターに対する新しいサーバーの適合性の検証が完了しました。 AddNodesProgressAdditionStartFormat=フェールオーバー クラスター "{0}" へノードを追加しています。 AddNodesProgressAdditionEndFormat=フェールオーバー クラスター "{0}" へのノードの追加が完了しました。 '@ # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCOg8N9SNuJriAU # xW7TWaMRiwGZ1fy3Azf8qEuG3NVgwKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILV+ # eaPSb8nsXkzpd3gIQnr7immXT69fFdN9THGefDUdMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAJuq64YnT5jCa/dEP5qYMX2/dLy6/StN+MM4t # MuLCI8sFtTAE9UjxbJv2WHPsA3eVieytcyLEV2bSk/mTt9hDVK6ce5QQJmNmBeZ4 # IFNxHDA3VDJTWRlUsmIE59kyqX0VQ8ma2J2kC/oFWoSC0YWs7QdYC+fwcfkJfG3D # qpzTBzlQbxfDGp8UVZfXP3Uo0h9g5Fkyd8kZsMe9cahFK9Pz22bQgP8OgTpi73GX # HenwdQo1d5R3dFYLZSL3cyD2n6u37pfdsdlOcxF177OaJfXJ0NiewTQETUT82oX/ # UkVeguryUy9oB94bVMhtFurF7Hy8+Hk1J/FgnJGczS51/um4gaGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCLuuOY/1hghm7km6vIGWIXVZHiZUC1H5zm # z0mxSuE7ngIGZc3/ed7IGBMyMDI0MDIyMDA3MjE1MC4zNDZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X5sAjAi # GA8yMDI0MDIyMDAwMDgzNFoYDzIwMjQwMjIxMDAwODM0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDpfmwCAgEAMAcCAQACAh4kMAcCAQACAhOuMAoCBQDpf72CAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEjBdhxc2Dy1IiI/abmk2E8Is2Yg # KjvpKrgHVxrmR6uToVLP+UTfGUj2Wdk6mOU9tYSo2+fynkECZN0DoKjTEGh4Crnk # ehLBVuWNgWLsCZc4U+fPnNmgZ2qAoDCCXREnJR9JIJm5UtNXteuMozC7q8xxg/do # s4gse4eoUCHByHFAsQF2yQH4lw0AL5Ue8QK/wBmQWo0hdzZhEo/AGIWBJd5X4190 # yduqpmJpj4buYrRtrFQzbAVLlTIHmz8KofO3bdLsozBU9WK9+/+8a1AXn1SyEt5h # LUX4UrzcmTMmM9UIFyLGwG1hDOrZI6UOtwP+SPLuYv5fTIvLKjn62cj88bgxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBj60WyGOH+B1SPgoLiWyAL1oDH # iP3WnSS/i1pQyh4PjDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg5strNsYb # AJScKAE5aG3Lom5LvoS5tFxoBQ4e8fINHe0wDQYJKoZIhvcNAQELBQAEggIABi/n # +R3YvwGRL+8JczABNj4VgQsNH0R7rGnVhAjG6tYVL4AdmyDFYpoKXyRDbqf5Sdah # YxCE3UgbTwk124uEVjHWSuPJd0NayI4abhgz3sI750LzjB0sw+M6x+frkhvEKsi7 # lb39DWUzCvtU3ZIFbkjQXbZGyCETyiEeZFIiEU9xoBKOKlM/MvbOyIdsM012gH/k # niJs9S8b30egdryvV6eRDO0TWCuZBZjzGnx1gSP81zQjZw5M17VUVavTAfDeTiTn # CJu/5Hq0mNlAgnLKgJWBW9Rh05vzi5VZoFAR0hIUbdOry3EXS90e741sXnv2bFqr # rEdopB697XP8lUJ7vnpz3B/yhzrJEIyZVWdECRy8S7eHl4faVJKHO4euXzrqv925 # FWiwY6JSJQWcxF+M6NCkXRjUt81B2VtSubOcnBW23vPf4TTTFGuZFWr0TQsxB8Rb # VmSr9dHkJkb4aWtQYLCJVXKYTU+wItgDfvnXrHBjyCkkhnrYnDODQ0jOrmT5Mh39 # n1uTAWCMdLTpNqzvmlPHrCSY4X2QVVRzdc51EQkG6+SZ7yyrqgSw/7FEJ15xqdV7 # 8PkanJ39uHHzWaMM3ClRY2xRZLCiiEM7BdyHvZwpYK+y2CS1pSMLCWRs62Fp2X10 # dm444fJTZfkSnEBpmu6GjdP6WaWiTVtk5G8Vtg4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_24_71.ps1
sample_24_71.ps1
<# .SYNOPSIS Creates and throws an invalid argument exception. .PARAMETER Message The message explaining why this error is being thrown. .PARAMETER ArgumentName The name of the invalid argument that is causing this error to be thrown. #> function New-InvalidArgumentException { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Message, [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ArgumentName ) $argumentException = New-Object -TypeName 'ArgumentException' ` -ArgumentList @($Message, $ArgumentName) $newObjectParameters = @{ TypeName = 'System.Management.Automation.ErrorRecord' ArgumentList = @($argumentException, $ArgumentName, 'InvalidArgument', $null) } $errorRecord = New-Object @newObjectParameters throw $errorRecord } <# .SYNOPSIS Creates and throws an invalid operation exception. .PARAMETER Message The message explaining why this error is being thrown. .PARAMETER ErrorRecord The error record containing the exception that is causing this terminating error. #> function New-InvalidOperationException { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Message, [Parameter()] [ValidateNotNull()] [System.Management.Automation.ErrorRecord] $ErrorRecord ) if ($null -eq $ErrorRecord) { $invalidOperationException = New-Object -TypeName 'InvalidOperationException' ` -ArgumentList @($Message) } else { $invalidOperationException = New-Object -TypeName 'InvalidOperationException' ` -ArgumentList @($Message, $ErrorRecord.Exception) } $newObjectParameters = @{ TypeName = 'System.Management.Automation.ErrorRecord' ArgumentList = @( $invalidOperationException.ToString(), 'MachineStateIncorrect', 'InvalidOperation', $null ) } $errorRecordToThrow = New-Object @newObjectParameters throw $errorRecordToThrow } <# .SYNOPSIS Creates and throws an object not found exception. .PARAMETER Message The message explaining why this error is being thrown. .PARAMETER ErrorRecord The error record containing the exception that is causing this terminating error. #> function New-ObjectNotFoundException { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Message, [Parameter()] [ValidateNotNull()] [System.Management.Automation.ErrorRecord] $ErrorRecord ) if ($null -eq $ErrorRecord) { $exception = New-Object -TypeName 'System.Exception' ` -ArgumentList @($Message) } else { $exception = New-Object -TypeName 'System.Exception' ` -ArgumentList @($Message, $ErrorRecord.Exception) } $newObjectParameters = @{ TypeName = 'System.Management.Automation.ErrorRecord' ArgumentList = @( $exception.ToString(), 'MachineStateIncorrect', 'ObjectNotFound', $null ) } $errorRecordToThrow = New-Object @newObjectParameters throw $errorRecordToThrow } <# .SYNOPSIS Creates and throws an invalid result exception. .PARAMETER Message The message explaining why this error is being thrown. .PARAMETER ErrorRecord The error record containing the exception that is causing this terminating error. #> function New-InvalidResultException { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $Message, [Parameter()] [ValidateNotNull()] [System.Management.Automation.ErrorRecord] $ErrorRecord ) if ($null -eq $ErrorRecord) { $exception = New-Object -TypeName 'System.Exception' ` -ArgumentList @($Message) } else { $exception = New-Object -TypeName 'System.Exception' ` -ArgumentList @($Message, $ErrorRecord.Exception) } $newObjectParameters = @{ TypeName = 'System.Management.Automation.ErrorRecord' ArgumentList = @( $exception.ToString(), 'MachineStateIncorrect', 'InvalidResult', $null ) } $errorRecordToThrow = New-Object @newObjectParameters throw $errorRecordToThrow } <# .SYNOPSIS Retrieves the localized string data based on the machine's culture. Falls back to en-US strings if the machine's culture is not supported. .PARAMETER ResourceName The name of the resource as it appears before '.strings.psd1' of the localized string file. For example: For WindowsOptionalFeature: MSFT_WindowsOptionalFeature For Service: MSFT_ServiceResource For Registry: MSFT_RegistryResource For Helper: SqlServerDscHelper .PARAMETER ScriptRoot Optional. The root path where to expect to find the culture folder. This is only needed for localization in helper modules. This should not normally be used for resources. #> function Get-LocalizedData { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ResourceName, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $ScriptRoot ) if ( -not $ScriptRoot ) { $resourceDirectory = Join-Path -Path $PSScriptRoot -ChildPath $ResourceName $localizedStringFileLocation = Join-Path -Path $resourceDirectory -ChildPath $PSUICulture } else { $localizedStringFileLocation = Join-Path -Path $ScriptRoot -ChildPath $PSUICulture } if (-not (Test-Path -Path $localizedStringFileLocation)) { # Fallback to en-US if ( -not $ScriptRoot ) { $localizedStringFileLocation = Join-Path -Path $resourceDirectory -ChildPath 'en-US' } else { $localizedStringFileLocation = Join-Path -Path $ScriptRoot -ChildPath 'en-US' } } Import-LocalizedData ` -BindingVariable 'localizedData' ` -FileName "$ResourceName.strings.psd1" ` -BaseDirectory $localizedStringFileLocation return $localizedData } Export-ModuleMember -Function @( 'New-InvalidArgumentException', 'New-InvalidOperationException', 'New-ObjectNotFoundException', 'New-InvalidResultException', 'Get-LocalizedData' ) # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCjPo12DZaAMOkK # EoYmV1li2n5EmeiwcqQzHkVYm5pRSqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINlD # ZdfY6WZGxuDeFy2D68UYR92qFoGvw0+OOhcq1/JFMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEASODjo9gkcFWyEocxZPEwCbrn921/AR3WZejo # yuL9o4Ns3laddyuRaiRi63BaAviyfKgxt9igMVrAUroxnXpTbdDGXIB8N73Xj4wP # Y2TiQ9txnU+Kkrabwi0c23hfz1VhIE+zUoKpyiROqfMMzRmnLSmYWg1TOWg4CcVm # NGqlglQGINolH6QgqcOi/gjXxLg2b8wMHoSTOityhAApUYt83tHvY68MLmKE8aYZ # i4ax3052rZLtDyet5Y6bqK9Ah8TkNQUV1+HCfzb6CH38mkg3yrybRWfGxFSnGnjs # HsJOXmSOzRgu+b0lLbDq51anmJHViJVrv3mjQUteE8L3/euDaKGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAHkc+JJfAcsleZV7zXouK480RYE1kpQb/8 # Bn/5bfJ93wIGZc4FwbM2GBMyMDI0MDIyMDE4MTgzNy45NjdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QAB # AAAB6zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaF # BuYbNc7hSKmktvJ15NrB/DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB # 3huvv91fZuUugIsKTnAvg2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG # 4cxKgcDAinihT8xroJWVATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARu # Co3TiRGjM2Lp4piT2lD5hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojT # dFLL5vJ9IAogWf3XAu3d7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrC # NL+Tmi/jalRto/J6bh4fPhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TY # jMPbYqG8y5xz+gI/SFyj+aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1X # b6hM5HIWA0jEAZhKEyd5hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6 # rUhudfI7k8L9KKCEufRbK5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjo # W3qs7JRMZmH9fkFkMzb6YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidV # tNqiZeWWpVjfavR+Jj/JOQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu # 4qT9O5jT2B+qAerhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VW # ZP3+W87c/QbdbWK0sOt9Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8 # WHgDOvbwqdqsLUaM4NrertI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd # 5Bg3CWknV3uvVau14F55ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbe # I2IDqRxC4xBbRiNQ+1qHXDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXio # LVYo/2Hkyow6dI7uULJbKxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1R # VHcQtkUE7W9zxZqZ6/jPmaojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawp # azLBv997LRB0ZObNckJYyQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+ # 9dy6nmcCrVcOqbQHX7Zr8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50 # w+JoTxISQq7vBij2nitAsSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvD # Zo365vLOozmQOe/Z+pu4vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltU # dsi3HjNnieuE72fT4eWhxtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCABol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8bZjAi # GA8yMDI0MDIyMDEyMzY1NFoYDzIwMjQwMjIxMTIzNjU0WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpfxtmAgEAMAoCAQACAhMAAgH/MAcCAQACAhOuMAoCBQDpgGzm # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBABw72WBlIIfdfPitXIcxN79L # J56Xg99cSVpjhklVV+YseVWLfQZTsQp/dQONQxcJyDIVatdZd95N+F34V2I6G8+o # f7FhnsFJNOqwnBVDkado9+qWVxN7gyiOVHZ6azwUz1e0Cw1rPiVgS6HK2uzUFp/2 # eQiMWwuoa7SENG5hITaYEBiwbcPVg0gyKD28SitkFRNcuHBlwMwBnGLg8NEeqkb7 # rIG3uNYzP5++ZJRZfZvcdOnIPpxeFL3vgmwTXxb5TnYtWMdDdAh55Ef6QQEV1W9E # OuRerYvEyxQySiI7Xn5nSfwbt5ZzhxYORrzNC6VCCLROCJNfiirgg7r6AsVnJYMx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AevgGGy1tu847QABAAAB6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCIfIWNCP6FclBg8daDobyq # gOAk+HUv869hlTMDaExbSTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63 # a75faQPhf8SBDTtk2DSUgIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQggKkx # wqtR8jBF+mZZSe8oRTL6Kg41uCboKT1n1Bm9DnQwDQYJKoZIhvcNAQELBQAEggIA # ZTXYqOeOW7bCiMJbkTjFDqM2XlTAVnKY3ddKgKSQJBiQWjBEyDndc/cC/RNTOEFS # ZkCqE7IhvFPUZPnQPH0idUTKUTHm3Vqxi2Pss65msTyLWieApqk7DItpUCecxKUc # OujVg45dNYhrssHuSL6JplOcXD6XosywScBW/3iX7YNw5ZR/vVTf9UiFIhBid+/c # OuCHNbBW9XjOUwxL2fhrKhRaXa6mqbO953pWjTrpRCsG05PzYlsMtpQUDPhlYu3y # GIQT+RdN5s861UhMP/zzSI8AQg/5d7XzHPsbb/QT/8+WDxu8HFGic9pnalKh3mzr # P8ojU836OhL6ClP6N6FOhBYMxMLcBLmWJSzMgfTSR9JEHfONKZOALI9P5enIthok # YNRT6Kt2izcl9fJKDfG9rQsifPzicHtR9BjP3A93gd9H8SgNzLP/bBk8865jycKm # 5A6p4J+5C9NiFFwjg7AiEZ9ZdfjMbODTKsvfH/XZvKkJisXC0g7CUVgjoRjrI2QL # WLYQTw4Q1Ucd4OpLSji4Lq5aLw+XRiY3IGsC22Gmg76dbBbuplm8DOiJajys17/d # /Ubil7ExteU61quYuJl5Hg24aFGzAnEsNiDtiqOkD8cjO9cjlWT8lL85Yl5fLbJi # VbSLZaqKVumD5Bu3lh9cYghT7Lix7KGRd6RwbCLTIF4= # SIG # End signature block
combined_dataset/train/non-malicious/1142.ps1
1142.ps1
$username = 'CarbonGrantPrivilege' $password = 'a1b2c3d4 function Start-TestFixture { & (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Install-User -Username $username -Password $password -Description 'Account for testing Carbon Grant-Privileges functions.' } function Stop-Test { Uninstall-User -Username $username } function Test-ShouldGrantAndRevokePrivileges { $serviceName = 'CarbonGrantPrivilege' $servicePath = Join-Path $TestDir ..\Service\NoOpService.exe -Resolve Install-Service -Name $serviceName -Path $servicePath -StartupType Manual -Username $username -Password $password Stop-Service $serviceName Revoke-Privilege -Identity $username -Privilege SeServiceLogonRight Assert-False (Test-Privilege -Identity $username -Privilege SeServiceLogonRight) Assert-Null (Get-Privilege -Identity $username | Where-Object { $_ -eq 'SeServiceLogonRight' }) Grant-Privilege -Identity $username -Privilege SeServiceLogonRight Assert-True (Test-Privilege -Identity $username -Privilege SeServiceLogonRight) Assert-NotNull (Get-Privilege -Identity $username | Where-Object { $_ -eq 'SeServiceLogonRight' }) Start-Service $serviceName Revoke-Privilege -Identity $username -Privilege SeServiceLogonRight Assert-False (Test-Privilege -Identity $username -Privilege SeServiceLogonRight) Assert-Null (Get-Privilege -Identity $username | Where-Object { $_ -eq 'SeServiceLogonRight' }) $error.Clear() Start-Service $serviceName -ErrorAction SilentlyContinue Assert-Equal 0 $error.Count } function Test-ShouldWriteAnErrorIfIdentityNotFound { $error.Clear() Grant-Privilege -Identity 'IDNOTEXIST' -Privilege SeBatchLogonRight -ErrorAction SilentlyContinue Assert-True ($error.Count -gt 0) Assert-True ($error[0].Exception.Message -like '*Identity * not found*') } function Test-ShouldGrantCaseSensitivePermission { $Error.Clear() Grant-Privilege -Identity $username -Privilege SESERVICELOGONRIGHT -ErrorAction SilentlyContinue Assert-GreaterThan $Error.Count 1 Assert-Like $Error[0].Exception.Message '*case-sensitive*' }
combined_dataset/train/non-malicious/egg_timer_1.ps1
egg_timer_1.ps1
function GenerateForm { [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null $form_main = New-Object System.Windows.Forms.Form $reset_button = New-Object System.Windows.Forms.Button $label1 = New-Object System.Windows.Forms.Label $start_button = New-Object System.Windows.Forms.Button $progressBar1 = New-Object System.Windows.Forms.ProgressBar $timer1 = New-Object System.Windows.Forms.Timer $InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState $start_button_OnClick = { $timer1.Enabled = $true $timer1.Start() $start_button.Text = 'Countdown Started.' } $reset_button_OnClick = { $timer1.Enabled = $false $progressBar1.Value = 0 $start_button.Text = 'Start' $label1.Text = '3:00' } $timer1_OnTick = { $progressBar1.PerformStep() $time = 180 - $progressBar1.Value [char[]]$mins = "{0}" -f ($time / 60) $secs = "{0:00}" -f ($time % 60) $label1.Text = "{0}:{1}" -f $mins[0], $secs if ($progressBar1.Value -eq $progressBar1.Maximum) { $timer1.Enabled = $false $start_button.Text = 'FINISHED!' } } $OnLoadForm_StateCorrection = { #Correct the initial state of the form to prevent the .Net maximized form issue $form_main.WindowState = $InitialFormWindowState } $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 628 $System_Drawing_Size.Height = 295 $form_main.MaximumSize = $System_Drawing_Size $form_main.Text = 'Super Duper Over-engineered Egg Timer' $form_main.MaximizeBox = $False $form_main.Name = 'form_main' $form_main.ShowIcon = $False $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 628 $System_Drawing_Size.Height = 295 $form_main.MinimumSize = $System_Drawing_Size $form_main.StartPosition = 1 $form_main.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 612 $System_Drawing_Size.Height = 259 $form_main.ClientSize = $System_Drawing_Size $reset_button.TabIndex = 4 $reset_button.Name = 'button2' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 209 $System_Drawing_Size.Height = 69 $reset_button.Size = $System_Drawing_Size $reset_button.UseVisualStyleBackColor = $True $reset_button.Text = 'Reset' $reset_button.Font = New-Object System.Drawing.Font("Verdana",12,0,3,0) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 362 $System_Drawing_Point.Y = 13 $reset_button.Location = $System_Drawing_Point $reset_button.DataBindings.DefaultDataSourceUpdateMode = 0 $reset_button.add_Click($reset_button_OnClick) $form_main.Controls.Add($reset_button) $label1.TabIndex = 3 $label1.TextAlign = 32 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 526 $System_Drawing_Size.Height = 54 $label1.Size = $System_Drawing_Size $label1.Text = '3:00' $label1.Font = New-Object System.Drawing.Font("Courier New",20.25,1,3,0) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 45 $System_Drawing_Point.Y = 89 $label1.Location = $System_Drawing_Point $label1.DataBindings.DefaultDataSourceUpdateMode = 0 $label1.Name = 'label1' $form_main.Controls.Add($label1) $start_button.TabIndex = 2 $start_button.Name = 'button1' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 310 $System_Drawing_Size.Height = 70 $start_button.Size = $System_Drawing_Size $start_button.UseVisualStyleBackColor = $True $start_button.Text = 'Start' $start_button.Font = New-Object System.Drawing.Font("Verdana",12,0,3,0) $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 45 $System_Drawing_Point.Y = 12 $start_button.Location = $System_Drawing_Point $start_button.DataBindings.DefaultDataSourceUpdateMode = 0 $start_button.add_Click($start_button_OnClick) $form_main.Controls.Add($start_button) $progressBar1.DataBindings.DefaultDataSourceUpdateMode = 0 $progressBar1.Maximum = 180 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Width = 526 $System_Drawing_Size.Height = 87 $progressBar1.Size = $System_Drawing_Size $progressBar1.Step = 1 $progressBar1.TabIndex = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 45 $System_Drawing_Point.Y = 146 $progressBar1.Location = $System_Drawing_Point $progressBar1.Style = 1 $progressBar1.Name = 'progressBar1' $form_main.Controls.Add($progressBar1) $timer1.Interval = 1000 $timer1.add_tick($timer1_OnTick) $InitialFormWindowState = $form_main.WindowState $form_main.add_Load($OnLoadForm_StateCorrection) $form_main.ShowDialog()| Out-Null } #Call the Function GenerateForm
combined_dataset/train/non-malicious/sample_59_91.ps1
sample_59_91.ps1
<# .Synopsis Activate a Python virtual environment for the current PowerShell session. .Description Pushes the python executable for a virtual environment to the front of the $Env:PATH environment variable and sets the prompt to signify that you are in a Python virtual environment. Makes use of the command line switches as well as the `pyvenv.cfg` file values present in the virtual environment. .Parameter VenvDir Path to the directory that contains the virtual environment to activate. The default value for this is the parent of the directory that the Activate.ps1 script is located within. .Parameter Prompt The prompt prefix to display when this virtual environment is activated. By default, this prompt is the name of the virtual environment folder (VenvDir) surrounded by parentheses and followed by a single space (ie. '(.venv) '). .Example Activate.ps1 Activates the Python virtual environment that contains the Activate.ps1 script. .Example Activate.ps1 -Verbose Activates the Python virtual environment that contains the Activate.ps1 script, and shows extra information about the activation as it executes. .Example Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv Activates the Python virtual environment located in the specified location. .Example Activate.ps1 -Prompt "MyPython" Activates the Python virtual environment that contains the Activate.ps1 script, and prefixes the current prompt with the specified string (surrounded in parentheses) while the virtual environment is active. .Notes On Windows, it may be required to enable this Activate.ps1 script by setting the execution policy for the user. You can do this by issuing the following PowerShell command: PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser For more information on Execution Policies: https://go.microsoft.com/fwlink/?LinkID=135170 #> Param( [Parameter(Mandatory = $false)] [String] $VenvDir, [Parameter(Mandatory = $false)] [String] $Prompt ) <# Function declarations --------------------------------------------------- #> <# .Synopsis Remove all shell session elements added by the Activate script, including the addition of the virtual environment's Python executable from the beginning of the PATH variable. .Parameter NonDestructive If present, do not remove this function from the global namespace for the session. #> function global:deactivate ([switch]$NonDestructive) { # Revert to original values # The prior prompt: if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) { Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT } # The prior PYTHONHOME: if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) { Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME } # The prior PATH: if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) { Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH Remove-Item -Path Env:_OLD_VIRTUAL_PATH } # Just remove the VIRTUAL_ENV altogether: if (Test-Path -Path Env:VIRTUAL_ENV) { Remove-Item -Path env:VIRTUAL_ENV } # Just remove VIRTUAL_ENV_PROMPT altogether. if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) { Remove-Item -Path env:VIRTUAL_ENV_PROMPT } # Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether: if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) { Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force } # Leave deactivate function in the global namespace if requested: if (-not $NonDestructive) { Remove-Item -Path function:deactivate } } <# .Description Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the given folder, and returns them in a map. For each line in the pyvenv.cfg file, if that line can be parsed into exactly two strings separated by `=` (with any amount of whitespace surrounding the =) then it is considered a `key = value` line. The left hand string is the key, the right hand is the value. If the value starts with a `'` or a `"` then the first and last character is stripped from the value before being captured. .Parameter ConfigDir Path to the directory that contains the `pyvenv.cfg` file. #> function Get-PyVenvConfig( [String] $ConfigDir ) { Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg" # Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue). $pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue # An empty map will be returned if no config file is found. $pyvenvConfig = @{ } if ($pyvenvConfigPath) { Write-Verbose "File exists, parse `key = value` lines" $pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath $pyvenvConfigContent | ForEach-Object { $keyval = $PSItem -split "\s*=\s*", 2 if ($keyval[0] -and $keyval[1]) { $val = $keyval[1] # Remove extraneous quotations around a string value. if ("'""".Contains($val.Substring(0, 1))) { $val = $val.Substring(1, $val.Length - 2) } $pyvenvConfig[$keyval[0]] = $val Write-Verbose "Adding Key: '$($keyval[0])'='$val'" } } } return $pyvenvConfig } <# Begin Activate script --------------------------------------------------- #> # Determine the containing directory of this script $VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition $VenvExecDir = Get-Item -Path $VenvExecPath Write-Verbose "Activation script is located in path: '$VenvExecPath'" Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)" Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)" # Set values required in priority: CmdLine, ConfigFile, Default # First, get the location of the virtual environment, it might not be # VenvExecDir if specified on the command line. if ($VenvDir) { Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values" } else { Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir." $VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/") Write-Verbose "VenvDir=$VenvDir" } # Next, read the `pyvenv.cfg` file to determine any required value such # as `prompt`. $pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir # Next, set the prompt from the command line, or the config file, or # just use the name of the virtual environment folder. if ($Prompt) { Write-Verbose "Prompt specified as argument, using '$Prompt'" } else { Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value" if ($pyvenvCfg -and $pyvenvCfg['prompt']) { Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'" $Prompt = $pyvenvCfg['prompt']; } else { Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)" Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'" $Prompt = Split-Path -Path $venvDir -Leaf } } Write-Verbose "Prompt = '$Prompt'" Write-Verbose "VenvDir='$VenvDir'" # Deactivate any currently active virtual environment, but leave the # deactivate function in place. deactivate -nondestructive # Now set the environment variable VIRTUAL_ENV, used by many tools to determine # that there is an activated venv. $env:VIRTUAL_ENV = $VenvDir if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) { Write-Verbose "Setting prompt to '$Prompt'" # Set the prompt to include the env name # Make sure _OLD_VIRTUAL_PROMPT is global function global:_OLD_VIRTUAL_PROMPT { "" } Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt function global:prompt { Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) " _OLD_VIRTUAL_PROMPT } $env:VIRTUAL_ENV_PROMPT = $Prompt } # Clear PYTHONHOME if (Test-Path -Path Env:PYTHONHOME) { Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME Remove-Item -Path Env:PYTHONHOME } # Add the venv to the PATH Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH $Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH" # SIG # Begin signature block # MIIvJAYJKoZIhvcNAQcCoIIvFTCCLxECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBnL745ElCYk8vk # dBtMuQhLeWJ3ZGfzKW4DHCYzAn+QB6CCE8MwggWQMIIDeKADAgECAhAFmxtXno4h # MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z # ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z # G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ # anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s # Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL # 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb # BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3 # JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c # AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx # YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0 # viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL # T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud # EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf # Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk # aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS # PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK # 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB # cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp # 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg # dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri # RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7 # 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5 # nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3 # i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H # EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G # CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C # 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce # 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da # E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T # SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA # FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh # D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM # 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z # 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05 # huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY # mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP # /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry # sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL # IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf # Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh # OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh # dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV # 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j # wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH # Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC # XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l # /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW # eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw # CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x # IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ # eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7 # uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx # xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb # D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA # GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm # SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA # LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1 # HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc # eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w # tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B # Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj # ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E # FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM # MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp # Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI # QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v # RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex # LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v # d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF # BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu # aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI # hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N # s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA # 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2 # de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O # q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd # I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50 # jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU # 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq # rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs # M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa # 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa # tzCCGrMCAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu # Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT # QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl # AwQCAQUAoIHIMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC # AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBnAZ6P7YvTwq0fbF62 # o7E75R0LxsW5OtyYiFESQckLhjBcBgorBgEEAYI3AgEMMU4wTKBGgEQAQgB1AGkA # bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAyAC4ANQBfADIAMAAyADQA # MAA4ADAANgAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAoXbLeBCFQhwr4rTK # R0WSySG7AtpuY1n5vhwkJPE0JgQ11PFJYphroU2ouWWM8ifejqa6m21JEWGjC9En # Rpzpe1+eps7ClsdO+y5NxZc/3vD1j7IddJdzZh77QqDFMqJEeDNY+00OxxnnhbN1 # wJk29w8qRyIJ7HpCM0E5b8R8Atooip5ihAgrdrIsyyA3Mnl5Y+YMdqtQYe4QtOhE # QcEoxAMoI5nLSGsbLhEM8CArl36EmX31eHTVMRJMaM98p0DkURHL030ALmW2V70h # M7ovmhOezFyndR1d3HtcfwRB3nr5vHWZe6ythZ3wVgpsN++RdDOvHjb9LC9lkth/ # BGbcmVqsA9ZHnub1iPt89GsQBSiXjaOnWUxgJi0Qd3s2pwswLxHp05QDUE/d8EF7 # Wy6aNPI43+G2BjPLVeM3iVbMWd/yxhH6pddaVPAMKVvxJoJ7PfDLihMNyonHt0on # xuaM5r2KaVMWpHIkgLiB9tyvdIQb0IW+YU05VAnOqh7CDaEtP7jM6P0usxY9ufEC # BFZnOGb3M/c4KbcOuHOIkY3jGqw+DLZFrcWiIe2wbi2TsXDixs+pz8vm/KQczrQ2 # RJ1R8jrbK7IIRyZmTYf+dStZG3NhNQn1xcPYraHKNOm9CzNmeXJTdfAe0BEApqUN # 9AiLj6uvSEp278ysr/EE3ayw2QmhghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghco # BgkqhkiG9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3 # DQEJEAEEoGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgpuSq # fyINa45wSs5Sa6msoQk+zCLDcSK24OqaBM/0/2cCEQCILkaxGSFBcWXv0MYtx2Rr # GA8yMDI0MDgwNjIxMDAxOVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/ # X+VhFjANBgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGln # aUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5 # NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAx # MzIzNTk1OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMu # MSAwHgYDVQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOX # ejsqnGfcYhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbj # aedp/lvD1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7 # ReoNYWyd/nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PB # uOZSlbVH13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu # 6QXuqvYk9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769Sg # LDSb495uZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUG # FOpiCBPTaR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZc # ClhMAD6FaXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmh # cbJsca8+uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U2 # 0clfCKRwo+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qD # y0B7AgMBAAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAW # BgNVHSUBAf8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglg # hkgBhv1sBwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0O # BBYEFKW27xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6 # Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEy # NTZUaW1lU3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUF # BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6 # Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZT # SEEyNTZUaW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6g # qbWYF7xwjU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s # 1+FgnCvt7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0q # BXqEKZi2V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp4 # 4pMadqJpddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6w # QSbd3lqXTzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4Z # iQPq1JE3701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wn # LEHQmjNKqDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5Adza # ROY63jg7B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy # 0tg6uLFGhmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDA # dwrUAuBcYLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2Xl # G3O2mflrLAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRU # fNhHrP0oZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UE # ChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYD # VQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcN # MzcwMzIyMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs # IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy # NTYgVGltZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEAxoY1BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+k # iPNo+n3znIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+va # PcQXf6sZKz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RB # idx8ald68Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn # 7w6lY2zkpsUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAx # E6lXKZYnLvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB # 3iIU2YIqx5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNC # aJ+2RrOdOqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklS # UPRR8zZJTYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP # 015LdhJRk8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXi # YKNYCQEoAA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZ # MBIGA1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCP # nshvMB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQE # AwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYB # BQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0 # cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5j # cnQwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp # Z2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJ # YIZIAYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULh # sBguEE0TzzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAl # NDFnzbYSlm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XN # Q1/tYLaqT5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ # 8NWKcXZl2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDn # mPv7pp1yr8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsd # CEkPlM05et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcm # a+Q4c6umAU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+ # 8kaddSweJywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6 # KYawmKAr7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAj # fwAL5HYCJtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucT # Dh3bNzgaoSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJ # KoZIhvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IElu # YzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQg # QXNzdXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1 # OVowYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UE # CxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBS # b290IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+Rd # SjwwIjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20d # q7J58soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7f # gvMHhOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRA # X7F6Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raR # mECQecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzU # vK4bA3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2 # mHY9WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkr # fsCUtNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaA # sPvoZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxf # jT/JvNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEe # xcCPorF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQF # MAMBAf8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaA # FEXroq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcB # AQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggr # BgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNz # dXJlZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5k # aWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQK # MAgwBgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3 # v1cHvZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy # 3iS8UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cn # RNTnf+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3 # WlxUjG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2 # zm8jLfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGC # A3YwggNyAgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ # bmMuMTswOQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2 # IFRpbWVTdGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEF # AKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8X # DTI0MDgwNjIxMDAxOVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+C # Xc6qisnGTxmcz0AwLwYJKoZIhvcNAQkEMSIEIL9lTxR+g4mt3OIR7T0lPGf6Hj9l # yapkEMN9zlB/5cQ+MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRA # V2hBNm+CitpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICACnbfFSzh4YR # mOPLWXmxjM1wu1RdC6EyrhaTe+xvcwP1uuKgKEAmfsd1hEAPRFlJyKabwSuMI5lP # OHuhVqbgMy11bQpPccGezy+ei3n9TbCgng0HFf4c6BPPlwBwJizFgh0z+Z/vwlak # JwNnKLNvgChHEGKfuJmGh9LRhWcJwrLYgNwjs8sK4JcOIdF7JsLyt+qf7+vHcNQz # xYv2kbxIhTGpSmVPe8ZRHdh9McTXvSkLN0j9X8+tJ7ieQqK0wA+uTA28tG4H4BXa # YFF5Bv9F1NL0tU1HPUCb33Hoe2nu/MQsGNCkXQBQoBlFd2OwBDs6AhuP3Ht/YbHZ # 79lE9JN0MTBDZ+jaxgIYyVhn+3Dx5lryJ7gVizEK+zyNRH64TjExM1LMMSa8NEG8 # FkuJwMB+5KDyrPh81Y9tyD/re9UdB8tjk220aGiQ+Cf1fTEdQ8dTwh6/f+Ua+KTS # hLApIqAlJTMxcK1l7rdvlSnZkQ2RnDATuGeHKB57wdXXmngI8zVIEq+Z8RdiI/tn # eOEaoV7xU66aPt8BjNKNIwOCLHrz9RgYLjUQ2gV40/49ey7+PUKU5hepa4Es2cov # Ik2xGCwKXr4M7mj5fEB/mVWzCAtdjBgeoQpCCvsXgpyvSyaM4jDMh/E/VtAcH2vF # mnqYyn6UBw5CJYheSkCTkwgGP40/C2kC # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_62.ps1
sample_1_62.ps1
#************************************************ # DC_SummaryReliability.ps1 # Version 0.1 # Date: 3/19/2012 # By Craig Landis ([email protected]) #************************************************ # 2023-02-20 WalterE mod Trap #we# trap [Exception]{ WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" } Import-LocalizedData -BindingVariable SummaryReliabilityStrings -FileName DC_SummaryReliability -UICulture en-us Write-DiagProgress -Activity $SummaryReliabilityStrings.ID_SummaryReliability -Status $SummaryReliabilityStrings.ID_SummaryReliabilityObtaining $sectionDescription = "Summary - Reliability" $OutputFile = ($ComputerName + "__SUMMARY_*.txt") $Diag_ID = Get-DiagID if ($Diag_ID -eq "DIAG_CTSWindowsSetup"){ $CommandToExecute = "cscript.exe SummaryReliability.vbs /sdp /SetupSDPManifest" }else{ $CommandToExecute = "cscript.exe SummaryReliability.vbs /sdp" } RunCmD -commandToRun $CommandToExecute -sectionDescription $sectionDescription -filesToCollect $OutputFile -fileDescription "Summary" # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAZXGOlnHtP1bPG # YeBlnbg1yKtk/uRsRIZf97SXwUEBGKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJEk # KwkJtRsK1Q8bq6Zc120lD3cI5YmFuuasfNmTO3TsMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEABt/suaQVGFJ/26pK5RsoIxAM6gHVzZQRtgW3 # AiUziCAkO8mh7Bq8vBLAXQJZ3HIlSSmn8AY5TW0JPsXu00Rkj0C07YXMN2Xqyq0Y # BOlLnRAz3cgOYi+W8y7akR/phZPNXu3Y8O4PeATvTBF32teKmkQejEu7otfOsucY # QyzKqKpLY5f8EErjupONGZ6MjztAez66cxNoIx7YJXMMVyjNFayMyHiYbxFQ4LAQ # k/6K/Og060u3iy82kDWD2YBjfcxyLoran9estn5dZVuScHJTIq0Skzvzv1zXopcn # tvLAQBBPybZm23/LchcbMwrtB2D+nry1EZ99acXPGJeWSOAYtaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCA3tMW3PBuLe9UXD3SFD6ykgwDgWsWyYF0c # dHfMequt+wIGZv8ZfhH2GBMyMDI0MTAyODExNDA0My41NjFaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgAxqukPpAdx50FtAP9fQbDgaoWzfmvOcVMwPnkmbTlngwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICAG4MQgdHz7ncIdPalnm5D6/HwaXMfbwS4RUC # UMdguHsVZ3fXO6Q1432LeMYhbkkCHCuetR74TVuOh8YvBXHlQGmoi2cXhRlVnKO7 # MZd4JmFMMnjwmNMUQl2smPJURaDDHrBC9GogLr4GzNTsKWQAH+tw4PXUo35xHv78 # 3siNg5IvUJ9ZxMuSnCLSxCRUJ819keMJg2pYn7k70brgbZbdRRj6asR5ue30Jbgo # n2D42RHCbFB6ZOdQ/pwvHpAKJCjYmvxeyQLgKaUk1yekmFuhP6IuckUAiIDvHxZX # 8mCaomHSaiXdSDhG1e/no29/MOcB460K9ZriA36qhD8OtaRy1E/dsPP/+9v9Dj+o # p/4cJQQV6jqU0NbIcHWqLaVD/OB7xiOF8zi+S2vTn3hL2ht+8W2uVTbVorJS3prU # RgroiPoAWk8PxE6u4AjSD4UrpkhABqbGX/Bg46MYEMgKhXZ1rtg5fwTgFG8QdCJy # uZb5eNe6hTDCdPLkROwyve1kB0pHxB1BTTFMdzarQfLwspvdM4c7zuZ/LzcnvKhZ # xzRkfVCG4G37toNIYH9kAqi/aexAPRcOFi6gVw+UHqpBUQjgbmmMVckuA1HxeqMy # kKUdWFygmQQz55oEwyXt9wTXoo2MTHkmOpMrkuIx0BtLZnBLpwSvWR4JNgl/fhzI # g3XLqNvO # SIG # End signature block
combined_dataset/train/non-malicious/3161.ps1
3161.ps1
Function Convert-CsvToPsDt { [CmdletBinding()] Param( [Parameter(Mandatory = $true, HelpMessage = 'The csv input file path.')] [string]$Infile, [Parameter(Mandatory = $true, HelpMessage = 'The output file path.')] [string]$Outfile = ".\MyPsDataTable.ps1" ) if(Test-Path $Infile) { Write-Output "[+] $Infile is accessible." }else{ write-Output "[-] $Infile is not accessible, aborting." break } Write-Output "[+] Importing csv file." $MyCsv = Import-Csv $Infile Write-Output "[+] Paring columns." $MyCsvColumns = $MyCsv | Get-Member | Where-Object MemberType -like "NoteProperty" | Select-Object Name -ExpandProperty Name Write-Output "[+] Writing data table object to $Outfile." write-output '$MyTable = New-Object System.Data.DataTable' | Out-File $Outfile Write-Output "[+] Writing data table columns to $Outfile." $MyCsvColumns | ForEach-Object { write-Output "`$null = `$MyTable.Columns.Add(`"$_`")" | Out-File $Outfile -Append } Write-Output "[+] Writing data table rows to $Outfile." $MyCsv | ForEach-Object { $CurrentRow = $_ $PrintRow = "" $MyCsvColumns | ForEach-Object{ $GetValue = $CurrentRow | Select-Object $_ -ExpandProperty $_ if($PrintRow -eq ""){ $PrintRow = "`"$GetValue`"" }else{ $PrintRow = "$PrintRow,`"$GetValue`"" } } write-Output "`$null = `$MyTable.Rows.Add($PrintRow)" | Out-File $Outfile -Append } Write-Output "[+] All done." }
combined_dataset/train/non-malicious/Export-HTML.ps1
Export-HTML.ps1
#Requires -Version 2.0 <# Export-Html behaves exactly like native ConvertTo-HTML However it has one optional parameter -Path Which lets you specify the output file: e.g. Get-Process | Export-Html C:\\temp\\processes.html (c) Dmitry Sotnikov http://dmitrysotnikov.wordpress.com Proxy generated using PowerGUI Script Editor code snippets: http://poshoholic.com/2009/08/28/learn-powershell-v2-features-using-powershell-code-snippets/ All changes to the proxy commented This sample from Kirk used for inspiration: http://poshoholic.com/2009/09/18/powershell-3-0-why-wait-importing-typed-objects-with-typed-properties-from-a-csv-file/ #> function Export-Html { [CmdletBinding(DefaultParameterSetName='Page')] param( [Parameter(ValueFromPipeline=$true)] [System.Management.Automation.PSObject] ${InputObject}, # Adding Path parameter # (made it Position 0, and incremented Position for others) [Parameter(Position=0)] [Alias('PSPath', 'FilePath')] [ValidateNotNullOrEmpty()] [System.String] ${Path}, [Parameter(Position=1)] [ValidateNotNullOrEmpty()] [System.Object[]] ${Property}, [Parameter(ParameterSetName='Page', Position=4)] [ValidateNotNullOrEmpty()] [System.String[]] ${Body}, [Parameter(ParameterSetName='Page', Position=2)] [ValidateNotNullOrEmpty()] [System.String[]] ${Head}, [Parameter(ParameterSetName='Page', Position=3)] [ValidateNotNullOrEmpty()] [System.String] ${Title}, [ValidateSet('Table','List')] [ValidateNotNullOrEmpty()] [System.String] ${As}, [Parameter(ParameterSetName='Page')] [Alias('cu','uri')] [ValidateNotNullOrEmpty()] [System.Uri] ${CssUri}, [Parameter(ParameterSetName='Fragment')] [ValidateNotNullOrEmpty()] [Switch] ${Fragment}, [ValidateNotNullOrEmpty()] [System.String[]] ${PostContent}, [ValidateNotNullOrEmpty()] [System.String[]] ${PreContent}) begin { try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('ConvertTo-Html', [System.Management.Automation.CommandTypes]::Cmdlet) # define string variable to become the target command line #region Initialize helper variable to create command $scriptCmdPipeline = '' #endregion # add new parameter handling #region Process and remove the Path parameter if it is present if ($Path) { $PSBoundParameters.Remove('Path') | Out-Null $scriptCmdPipeline += " | Out-File -FilePath $Path" } #endregion $scriptCmd = {& $wrappedCmd @PSBoundParameters} # redefine command invocation #region Append our pipeline command to the end of the wrapped command script block. $scriptCmd = $ExecutionContext.InvokeCommand.NewScriptBlock( [string]$scriptCmd + $scriptCmdPipeline ) #endregion $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } <# .ForwardHelpTargetName ConvertTo-Html .ForwardHelpCategory Cmdlet #>}
combined_dataset/train/non-malicious/sample_51_72.ps1
sample_51_72.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Gets the SASKey of a ServiceBus namespace, queue or topic. .Description Gets the SASKey of a ServiceBus namespace, queue or topic. #> function Get-AzServiceBusKey{ [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Models.IAccessKeys])] [CmdletBinding(DefaultParameterSetName = 'GetExpandedNamespace', PositionalBinding = $false, ConfirmImpact = 'Medium')] param( [Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the Authorization Rule")] [Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the Authorization Rule")] [Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of the Authorization Rule")] [Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the Authorization Rule")] [Alias('AuthorizationRuleName')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the Authorization Rule. ${Name}, [Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the ServiceBus queue.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the ServiceBus queue. ${QueueName}, [Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the ServiceBus topic.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the ServiceBus entity. ${TopicName}, [Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the Service Disaster Recovery Config.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the Service Disaster Recovery Config. ${AliasName}, [Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of ServiceBus namespace")] [Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")] [Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")] [Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the ServiceBus namespace.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of ServiceBus namespace ${NamespaceName}, [Parameter(ParameterSetName = 'GetExpandedNamespace', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Parameter(ParameterSetName = 'GetExpandedQueue', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Parameter(ParameterSetName = 'GetExpandedTopic', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Parameter(ParameterSetName = 'GetExpandedAlias', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName = 'GetExpandedNamespace', HelpMessage = "The ID of the target subscription.")] [Parameter(ParameterSetName = 'GetExpandedQueue', HelpMessage = "The ID of the target subscription.")] [Parameter(ParameterSetName = 'GetExpandedTopic', HelpMessage = "The ID of the target subscription.")] [Parameter(ParameterSetName = 'GetExpandedAlias', HelpMessage = "The ID of the target subscription.")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] [System.String[]] # The ID of the target subscription. ${SubscriptionId}, [Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(HelpMessage = "Run the command as a job")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(HelpMessage = "Run the command asynchronously")] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process{ try{ $null = $PSBoundParameters.Remove('WhatIf') $null = $PSBoundParameters.Remove('Confirm') if ($PSCmdlet.ParameterSetName -eq 'GetExpandedNamespace'){ if ($PSCmdlet.ShouldProcess("ServiceBus Namespace Authorization Rule $($Name)", "List Keys")) { Az.ServiceBus.private\Get-AzServiceBusNamespaceKey_List @PSBoundParameters } } elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedQueue'){ if ($PSCmdlet.ShouldProcess("ServiceBus Queue Authorization Rule $($Name)", "List Keys")) { Az.ServiceBus.private\Get-AzServiceBusQueueKey_List @PSBoundParameters } } elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedTopic'){ if ($PSCmdlet.ShouldProcess("ServiceBus Topic Authorization Rule $($Name)", "List Keys")) { Az.ServiceBus.private\Get-AzServiceBusTopicKey_List @PSBoundParameters } } elseif ($PSCmdlet.ParameterSetName -eq 'GetExpandedAlias'){ $null = $PSBoundParameters.Remove('AliasName') $null = $PSBoundParameters.Remove('Name') if ($PSCmdlet.ShouldProcess("ServiceBus Alias Authorization Rule $($Name)", "List Keys")) { Az.ServiceBus.private\Get-AzServiceBusDisasterRecoveryConfigKey_List -Alias $AliasName -AuthorizationRuleName $Name @PSBoundParameters } } } catch{ throw } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCL+uOGvAXZiyuG # TJq9KvQM5bXdSrJk57wzJom+hcuxHaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPo6QcXvuQttW65zHmWJ/P6D # riCh2Pkns+IE7Wco7nkbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAVaXn3zDtqVciGuBj7dRLk+yHNiGMpOFPBkLnW+SckTOdGmJsFIaq6DLr # aB+jqJS2CBd+cjgM1kGfHpEerE70+E0ufNCc78uCE9qGxBmjSGJX9zF5pKEclASF # 8r3EgbwUfGx++95U/PeMoeKTgYUR6KMzpKrPq3pL60tVcO4r0/WIzR4FnZPGRGmd # lZbS/u9XxCHXxRfFN1uvvD1/RSLgrfz7rANJ1LlR8TMVO+t6b1EXt2930AsBGH7c # /2vDddh36yEtsm+w9lPYaaoBOLkw5vMFmc8KMmbC7dg1uXPLwAIQIYOGVqa4UJ7W # aaUhpch7OUOM/pbfPg91vFOjSmoiZaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAQJIijahx4FSUDBTQr26pnSax4k9lUJgycUm22q6t4wAIGZjOqm5n5 # GBMyMDI0MDUxNjA2NDIxNC45MzFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnv800wIhgPMjAyNDA1MTYxMDUxNTdaGA8yMDI0MDUxNzEwNTE1N1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6e/zTQIBADAHAgEAAgIG2zAHAgEAAgIUMDAKAgUA # 6fFEzQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAE/ZvDwugy6NnYyIDV7u # OSLWi/ufyQ+0+8oP/z2EFLWVt1PPV9ckDwOXfMyZUrmeW13sfHNC/IxUxFOo4o6f # zlnV7jGD2rKF1A4HHzrz25qNAoYIhSmyXWxlEnQSsjafsbqZ4nebWLCpisf9Xvpk # FD9uxVS2ajQVLxRI4TtSt9PjMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgi/DqN91denaVlZRhO1Fa7wi19w9WdUYrY97KHhThugswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIAbnS84eHhUBUYVK4RZHP3oaXBAIVzGN5U0dVtVYzunV # MA0GCSqGSIb3DQEBCwUABIICAI5xWL0mrHFi2Tqu663Lu52ZVqKyRLSz1sO5X8Ft # uaNolYXr7tcFmrHUqQ9kMJqAbp4yAX6VFG6eugYU5Uv0Fw4sAUzoHGGjI92ymy8S # YryYYU24Ppu0RzM82XgJaQdL0PT3uhk54sbCpaWWXgRxLm+sVOH3ya6UOCxckoxQ # FTBV1fMfDCSCesZ+/9z46FO0TQ0SFvfT3b/o42zhitLm/rLeFdySXKGYS3w1b74m # UvxxldaOaA84RmkCvIYknZSXevMsE1pHOwPqbcILXlirUF2Fp11u6JzXvgVfEthc # NxM15vT1ZKrJ6GCKWpzqZsQaLCkgGmsGwj9rIIjM6PQjhiG6MPlx/6z07efVGtRY # 9kjrxRkcAo0Hgu6sgJ0LyTGQezbUesYKlZXVVdhxBpyjQXWsYMoaKXw4PHNONfJ5 # wrW0xjE3Ot7MlIYA8jUPG0WLA6LGn5lL4GjFAoGFevY1SGBVfuvcuXk9pYbUwrKc # JlInlRkyt+PdL/RV7jZ6FdglpxvoDZ0CKkYhk5VJJFyfjpmRY8ntWujNBLmHwaDp # faPSSRhQZbD/rvq1vNSZFMoJWBkGSMzQY3zfdX5PwEClWLg0ySMkIO9nd7AaSEsU # 6uxA4WfEUP6rBSfqDUTi8XUbI9nuwr633unsyjKaoVHcJ+wClA9zM3kLpiv8XGw/ # 6vEr # SIG # End signature block
combined_dataset/train/non-malicious/337d4ddf-c2e9-4243-8681-ea4303a40040.ps1
337d4ddf-c2e9-4243-8681-ea4303a40040.ps1
None
combined_dataset/train/non-malicious/sample_30_21.ps1
sample_30_21.ps1
# # Module manifest for module 'OCI.PSModules.Bastion' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Bastion.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2e2ff643-43d5-47ff-a4d4-2f965b778f45' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Bastion Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Bastion.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIBastion', 'Get-OCIBastionSession', 'Get-OCIBastionSessionsList', 'Get-OCIBastionsList', 'Get-OCIBastionWorkRequest', 'Get-OCIBastionWorkRequestErrorsList', 'Get-OCIBastionWorkRequestLogsList', 'Get-OCIBastionWorkRequestsList', 'Move-OCIBastionCompartment', 'New-OCIBastion', 'New-OCIBastionSession', 'Remove-OCIBastion', 'Remove-OCIBastionSession', 'Update-OCIBastion', 'Update-OCIBastionSession' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Bastion' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Convert-SchemaGUID.ps1
Convert-SchemaGUID.ps1
# List of Guids not properly defined in AD but used # Used to initialize GuidCache. New-Variable -Name GuidCache -Force -Option AllScope -Scope Script -Description "Cached GUIDs from AD. :: [redtoo]" $Script:GuidCache = @{ "a05b8cc2-17bc-4802-a710-e7c15ab866a2" = "Autoenroll" "00000000-0000-0000-0000-000000000000" = "All" } $Script:GuidObjects = @{} function Convert-SchemaGUIDtoLDAPDisplayName { <# .Synopsis Convert-SchemaGUIDtoLDAPDisplayName converts a schema GUId to the LDAP Display Name .DESCRIPTION Convert-SchemaGUIDtoLDAPDisplayName converts a schema GUId to the LDAP Display Name .PARAMETER guid The schema guid to lookup .EXAMPLE PS C:\\> Convert-SchemaGUIDtoLDAPDisplayName "bf96793f-0de6-11d0-a285-00aa003049e2" .INPUTS System.String .OUTPUTS System.String .NOTES NAME: Convert-SchemaGUIDtoLDAPDisplayName AUTHOR: Patrick Sczepanski VERSION 20120105 #Requires -Version 2.0 .LINK http://PoshCode.org/embed/3788 #> [Cmdletbinding()] Param( [Parameter(Mandatory=$true,Position=0)] [GUID]$guid ) $ThisFunctionName = $MyInvocation.MyCommand.Name if ( $GuidCache.Contains($guid.Tostring()) ) { Write-Verbose "[$ThisFunctionName] :: Found in script cache." return $GuidCache.($guid.Tostring()) } $RootDSE = [DirectoryServices.DirectoryEntry]"LDAP://RootDSE" $escapedGuid = "\\" + ((([GUID]$guid).ToByteArray() |% {"{0:x}" -f $_}) -join '\\') $Filter = "(&(|(objectcategory=classschema)(objectcategory=attributeschema)(objectcategory=controlAccessRight))" + "(|(schemaIdGuid=$escapedGuid)(rightsGuid=$guid)))" Write-Verbose "[$ThisFunctionName] :: Query Schema and configuration" Write-Verbose "[$ThisFunctionName] :: Base $($RootDSE.configurationNamingContext)" Write-Verbose "[$ThisFunctionName] :: Filter $Filter" Write-Verbose "[$ThisFunctionName] :: Attr ldapdisplayname" $SearchResult = Search-AD -Searchbase $RootDSE.configurationNamingContext ` -Filter $Filter ` -Attributes ("distinguishedname","name","ldapdisplayname","displayname") ` -Scope Subtree ` -FindOne ` -ReferralChasing Subordinate ` -PageSize 0 if ( $SearchResult.properties.distinguishedname[0] -like "*Schema*" ) { $GuidCache.($guid.Tostring()) = $SearchResult.properties.ldapdisplayname[0] Write-Verbose "[$ThisFunctionName] :: Found in schema, added to cache." Write-Output $SearchResult.properties.ldapdisplayname[0] } elseif ( $SearchResult.properties.distinguishedname[0] -like "*Configuration*" ) { $GuidCache.($guid.Tostring()) = $SearchResult.properties.displayname[0] Write-Verbose "[$ThisFunctionName] :: Found in configuration context, added to cache." Write-Output $SearchResult.properties.displayname[0] } else { Write-Verbose "[$ThisFunctionName] :: Not found return GUID, added 'unknown'." Write-Output $guid.ToString() } } #endregion Convert-Schema
combined_dataset/train/non-malicious/sample_35_52.ps1
sample_35_52.ps1
# # Script Module file for Dism module. # # Copyright (c) Microsoft Corporation # # # Cmdlet aliases # Set-Alias Apply-WindowsUnattend Use-WindowsUnattend Set-Alias Add-ProvisionedAppxPackage Add-AppxProvisionedPackage Set-Alias Remove-ProvisionedAppxPackage Remove-AppxProvisionedPackage Set-Alias Get-ProvisionedAppxPackage Get-AppxProvisionedPackage Set-Alias Optimize-ProvisionedAppxPackages Optimize-AppxProvisionedPackages Set-Alias Set-ProvisionedAppXDataFile Set-AppXProvisionedDataFile Set-Alias Add-ProvisionedAppSharedPackageContainer Add-AppProvisionedSharedPackageContainer Set-Alias Get-ProvisionedAppSharedPackageContainer Get-AppProvisionedSharedPackageContainer Set-Alias Remove-ProvisionedAppSharedPackageContainer Remove-AppProvisionedSharedPackageContainer # Below are aliases for Appx related cmdlets and aliases Set-Alias Add-AppProvisionedPackage Add-AppxProvisionedPackage Set-Alias Remove-AppProvisionedPackage Remove-AppxProvisionedPackage Set-Alias Get-AppProvisionedPackage Get-AppxProvisionedPackage Set-Alias Optimize-AppProvisionedPackages Optimize-AppxProvisionedPackages Set-Alias Set-AppPackageProvisionedDataFile Set-AppXProvisionedDataFile Set-Alias Add-ProvisionedAppPackage Add-AppxProvisionedPackage Set-Alias Remove-ProvisionedAppPackage Remove-AppxProvisionedPackage Set-Alias Get-ProvisionedAppPackage Get-AppxProvisionedPackage Set-Alias Optimize-ProvisionedAppPackages Optimize-AppxProvisionedPackages Set-Alias Set-ProvisionedAppPackageDataFile Set-AppXProvisionedDataFile Export-ModuleMember -Alias * -Function * -Cmdlet * # SIG # Begin signature block # MIIlyAYJKoZIhvcNAQcCoIIluTCCJbUCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD2VgPS+GIfbBqt # L1H/9k6cfQuEjvMnZ0KROm49Ir6sb6CCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghm3MIIZswIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIHGMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCrw3c0a1durihK0hX/aZZM # EqQ1ikdu5uELZVQjzCpA2DBaBgorBgEEAYI3AgEMMUwwSqAkgCIATQBpAGMAcgBv # AHMAbwBmAHQAIABXAGkAbgBkAG8AdwBzoSKAIGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS93aW5kb3dzMA0GCSqGSIb3DQEBAQUABIIBAI3tczJzF04fms7fh/Z1wsbY # Fb1SYdBnHurqIsjZ5191Ti3QybkU4GLjWEfp02I8o3RmhlGgK0bM6PmqpFf2O4y8 # riNEQfRk31j8XsTJs9zkSDKQKyAe9IYzmrWSuxHSqIvtlHxwuVEVJt4k9W78/dLB # VJuuAwCRjM5b4I3tiA3eZbZlKi4a6BY/BwEN+5PT9jsioJyvF4zXEA52dSMpjprO # wejlMuj61zGrksXxZKIeyJ1Jw8kQoommsDKLFKWGlX92206moNeRAzleJCIIZTh7 # cz280fMUOqX8Qvhl/AlAG9TKsXOav98V4AHiqNhK5MA8wqA1xeaVC8nsynMuPxGh # ghcpMIIXJQYKKwYBBAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW/gIB # AzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC # AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQguemcAsvDaz5gOHFGmwCL # m4SGzmpTMiQL1XP7fy+5+eYCBmX8b7RN8RgTMjAyNDA0MDEwMDE0NTguNTg5WjAE # gAIB9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVk # MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXgwggcnMIIFD6ADAgEC # AhMzAAAB2o7VyVoA0RGxAAEAAAHaMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5MDY1OVoXDTI1MDExMDE5MDY1 # OVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNV # BAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UE # CxMdVGhhbGVzIFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw # ggIKAoICAQCTkAYIdrVRUdY/I0AODQ3/G3Fa10jdPNAjSj0kKO0ue7Apz1NBSheO # 8Ni+qh7cJuBJwpRdnK7lxaf5ez6TEINuRO1/MQ5r8a/AQROogEgDwn603m7rwLGV # nCWIcu6a4ArgX+zonV6YLFtcvKelbO7A9mrqf9Lr3mMXl5SrbD4zAqZR5JNG2vh4 # C4aNCevCnY4twzNiufcB8vca7bGCvl/Xq2wxmdppl9++uWkuUO/7oA8TFYM8o/NM # iZ+lC55Jw/YuJFEMVYaldXXPwxelAXrs37pJDHne7a81BGTEcpWu6ob8FHkJYMwk # IaWY8/s7EIKV5T3M7xndIqq+5QAsH1RqIOaZSM3RMb7dUwPCZnn/NfWkysB9SFRC # MGCwOrr0vJEXQOkcbzHG//7pTYyLhnHsspDAFxMp1ayxvVbyuK36wrBi9499C5on # boPqMK3Ao0GoGJqxpNYQcpF4paPWAfEMsuUNSoRrh+uVd8xcvGtJMGygUbPFUeB7 # aD2MPc9Q3XCX2QTtnYc198gDIqQhpukpr5r2r0bF4cvNOY4gKQ8jfrNP2+6LNs/I # kVhiZOjPbrk9uPd4BVf/SSxoOWCSQiVyPssZDvzl52SbLhrdPs1i3R0uFyFwRte6 # D7uSrBX0Ux0RJaEdnSOhsGmsSMg8kh2DrbyMnZWu7uJX53wo2P6ikwIDAQABo4IB # STCCAUUwHQYDVR0OBBYEFKF8jclRPWYTlYsxFFcITYC/D19FMB8GA1UdIwQYMBaA # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3Rh # bXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUH # MAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC # MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG # SIb3DQEBCwUAA4ICAQC5g1XU7biNIwBLeNTtjjPAlNt+0xjMoaxq+xcyghBWl8ba # KpPyDm0K4qtXGh1Ydr8rkNuJ8903Tgb+63LP6pz4zsZ1xS8mT3mli7DbgEVZlFYs # lWF412AeQ8M2lmYEnGPBii+8ho8lq4e/FiVIIe6xNfuVQ+YdP+q7PXQUagMyPX4W # c+7KbI7fL58edFhMWwUkh+632mx3p3aXqm05lv0X3Gk/hhSLE/oNno+8ESiKv0IZ # 7KBfJqRTTx1dav1iv6xfwoaL5ISTA75arRE1ovexqJTkimpmQvW2IHDyn89vHndu # VictdFbUPT+fgv9nTnw2s9UZnjm9uym3oIWtEnz3K4k3zkVb6jw0mt5/Te3YU2O/ # uPSPHr6GnfYXWfAnyDj37cLd8U19kYTGSQlaBZWmx3L32/OK2hTOnM+RGJPsdWlR # Il7YCukdMZ9cIzFx39AFpUo6kZM70p0SsxbGcBJe+FWoZSlYSPgovUU/fuhnNMVs # ye80CFBRNyYosefuyi/AKx3wWPVBS8+LJ26Ce0IqdyAA25FOGS9IkPI/CMa2u2km # H06FHn5nLd3TOvX3+BHodiofTbCooqYefPQKf8UtYxEpa34y/4P2W6GkuXfWtnwO # ffJrmw7yw+ceTz9++9NL5v2PjyIZqdn077ktrJ3XmQZsk6nFDR0TZgpPp41d5zCC # B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAw # gYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT # KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIx # MDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57Ry # IQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VT # cVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx # XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ # HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1 # KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s # 4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUg # fX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3 # Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je # 1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUY # hEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUY # P3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGC # NxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4w # HQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB # BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv # bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcD # CDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0T # AQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNV # HR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9w # cm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEE # TjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOC # AgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/a # ZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp # 4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq # 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB # woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG # +jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3B # FARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77 # IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJ # fn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K # 6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDx # yKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIICPQIBATCC # AQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # LTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm # MCQGA1UECxMdVGhhbGVzIFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMT # HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAEKi # HyGJYx1GzaGNP8I4V0Z/7EgNoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwDQYJKoZIhvcNAQEFBQACBQDptBwcMCIYDzIwMjQwNDAxMDEzMDA0 # WhgPMjAyNDA0MDIwMTMwMDRaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOm0HBwC # AQAwBwIBAAICFUAwBwIBAAICEogwCgIFAOm1bZwCAQAwNgYKKwYBBAGEWQoEAjEo # MCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG # 9w0BAQUFAAOBgQBU365bJ02y6qx187Yc5ejptCGsCM2x6UWxZmdZyQVJ6sYR1mNa # lULKSH5UbY2CUbm8s8m8TDH6W2nCpYD7vHMnjwJcq0wzbm2YCEdpsIFkFd2W2Xon # qaAWLal2SRijSkmFpsI9DB2CfsG6NkNrlJYPlBkesCoVotxMUKuFUawbXzGCBA0w # ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYL # KoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIMpVn22at32E8IhFUaZPHwv0nbaj # zx6er+x82taKlGzcMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgIqWjaWLA # 756k3veQ49QtPdNtCOZY4m61v53SAjsYPcYwgZgwgYCkfjB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB2jAiBCCvzd5V7dEL # 7qgJPV7+jncmaMC3FUQLLo3zuzzaUUAxiDANBgkqhkiG9w0BAQsFAASCAgBR7sAs # HHnlnq+iOBUvCMLEsmD+2X8SswiMuTpt2BpWYrEPAaBQAJfmw/9YtmLgVek+tpXx # Gu8rgPZcSchnxa82ZzNWy28O7JkJzKOSzLeIOEXbglX3tAGmDum1nbHn2D/bo+Lx # b/eV3WLIT1Jz835cpe5aUeGhr8YJk42uQTBJyH5JbXLpa8GmLSliwLDFkI3y0iJ6 # jyDkRrgY/M8XoWDSGV+BIgTqA0cMSzIfylGYHEQC3Bk8/Bb4AqyaqcgSrQXszbKs # Is7bRfEKtMNiE/kQuhVNpWlNM4OwCkwHHwCyBOMmykJnJ8VmgxO7idhjKlH04Fer # QfyaYS469jFeYypjL+ijpX7yWDlXoVFVykDms2LHjGWBm3K1LhrKWdQO2uena6bl # 7Y3CRDgVvoCdgYRq5oiQH5nxKioLNg++cNVUluMUeZ62xTNrN9wDbQ3wSWG3syGc # qb7tEEAOT4MBnb5r51XTjsLiSxQXwy7pwmTMwWrkzakuZWGjDzPdMKiCspwpWd8v # wTgyyIuBf//MiXvEgXIkVDPVKID9GeaY+QAuGDJ7CRs5038WXf3hn2CDZcAIILiN # R6FC/LgR+jOboOGncXOHpV47uwvO81t0tIq9eh6J25pC4RzSscStqPMXk7J0dqgL # D535pcPB0p/bQez1tzfvNduBG0+MsVPeJFG0NQ== # SIG # End signature block
combined_dataset/train/non-malicious/Map a Network Drive.ps1
Map a Network Drive.ps1
function MapNetDrive { param( #Non-Boolean parameters (Values) # [Parameter(Position=0,Mandatory=$true)] [string]$DriveLetter="Z:", [Parameter(Position=1,Mandatory=$true)] [string]$Path, #Boolean switches (On/Off) # [Parameter(Position=2,Mandatory=$false)] [switch]$Credentials, [Parameter(Position=3,Mandatory=$false)] [switch]$Stay, [Parameter(Position=4,Mandatory=$false)] [switch]$Force ) #Creates new WScript.Network object called "$map" and allows it to access MapNetworkDrive(), EnumNetworkDrives(), #and RemoveNetworkDrive() methods. # $map=New-Object -ComObject WScript.Network #Uses EnumNetworkDrives() and "-contains" operator to determine if specified drive already exists. If so, and "$Force" #parameter is not present to force an override, it outputs a message to the user. Then uses "Try/Catch" statement to #catch any other general errors that might prevent removal of drive. # if($map.EnumNetworkDrives() -contains $DriveLetter) { if(!$Force) {throw "Can't map $driveLetter because it's already mapped. Use -Force to override."} try {$map.RemoveNetworkDrive($DriveLetter,$Force.ToBool(),$Stay.ToBool())} catch { Write-Error -Exception $_.Exception.InnerException -Message "Error removing '$driveLetter' $($_.Exception.InnerException.InnerException.Message)" } } #Maps new network drive, checking first if "$Credentials" parameter is passed. If so, a System.Management.Automation.PSCredential object #called "$creds" is created and instantiated to result value of "Get-Credential" Cmdlet. Because of its type, "$creds" has access to the #individual "UserName" and "Password" property values when the user submits them at the prompt. # #"$Stay" is placeholder for "bUpdateProfile" argument of the MapNetworkDrive() method, which determines whether the new #drive is saved as part of the user's profile. It's value here is determined by the presence of the "$Stay" switch. # if($Credentials) { [System.Management.Automation.PSCredential]$creds=$(Get-Credential) #-Credential $($(Get-WmiObject -Class Win32_ComputerSystem).UserName) $map.MapNetworkDrive($DriveLetter,$Path,$Stay.ToBool(),$creds.UserName,$creds.GetNetworkCredential().Password) } else {$map.MapNetworkDrive($DriveLetter,$Path,$Stay.ToBool())} #Opens newly created drive letter in Windows Explorer # $explore=New-Object -ComObject Shell.Application $explore.Open($DriveLetter) }
combined_dataset/train/non-malicious/Start-BootsTimer_2.ps1
Start-BootsTimer_2.ps1
function Start-BootsTimer { #.Syntax # Creates a stay-on-top countdown timer #.Description # A WPF borderless count-down timer, with audio/voice alarms and visual countdown + colored progress indication #.Parameter EndMessage # The message to be spoken by a voice when the time is up... #.Parameter StartMessage # A message to be spoken at start up (just to let you know, audibly, what's up). #.Parameter Minutes # Some minutes to add to the timer #.Parameter Seconds # Some seconds to add to the timer #.Parameter Hours # Some hours to add to the timer #.Parameter SoundFile # A .wav file to play as the alarm #.Parameter FontSize # The size of the timer text #.Parameter SingleAlarm # Only sound the alarm once #.Example # Start-BootsTimer 180 "The three minute egg is ready!" # # Starts a three minute timer with the specified voice alert at the end # #.Example # Start-BootsTimer -End "The three minute egg is ready!" -Minute 3 # # Starts a three minute timer with the specified voice alert at the end # #.Example # Start-BootsTimer "Your turn is over!" -Minutes 10 -Single -FontSize 18 # # Starts a 10 minute timer that only plays the alert once at the end, and has a small font, which would fit over the task bar or a window title bar... [CmdletBinding(DefaultParameterSetName="Times")] PARAM( [Parameter(Position=2,ParameterSetName="Times",Mandatory=$false)] [Parameter(Position=1,ParameterSetName="Reasons", Mandatory=$true)] [string]$EndMessage , [Parameter(Position=2,ParameterSetName="Reasons", Mandatory=$false)] [string]$StartMessage , [Parameter(Position=3,ParameterSetName="Reasons", Mandatory=$false)] [int]$minutes = 0 , [Parameter(Position=4,ParameterSetName="Reasons", Mandatory=$false)] [Parameter(Position=1,ParameterSetName="Times", Mandatory=$true)] [int]$seconds = 0 , [Parameter()] [int]$hours = 0 , [Parameter()] $SoundFile = "$env:SystemRoot\\Media\\notify.wav" , [Parameter()] $FontSize = 125 , [Parameter()] [Switch]$SingleAlarm ) # Default to 10 seconds ... without adding 5 seconds when people specify minutes if(($seconds + $Minutes + $hours) -eq 0) { $seconds = 10 } $start = [DateTime]::Now ## We have to store all this stuff, because the powerboots window lasts longer than the script $TimerStuff = @{} $TimerStuff["seconds"] = [Math]::Abs($seconds) + [Math]::Abs([int]($minutes*60)) + [Math]::Abs([int]($hours*60*60)) $TimerStuff["TimerEnd"] = $start.AddSeconds( $TimerStuff["seconds"] ) $TimerStuff["SingleAlarm"] = $SingleAlarm ## Take care of as much overhead as we can before we need it... if(Test-Path $soundFile) { $TimerStuff["Sound"] = new-Object System.Media.SoundPlayer $TimerStuff["Sound"].SoundLocation=$SoundFile } if($EndMessage -or $StartMessage) { $TimerStuff["Voice"] = new-object -com SAPI.SpVoice } ## Create and store a scriptblock to figure out the remaining time and format it $TimerStuff["NowFunction"] = { $diff = $BootsTimer.Tag["TimerEnd"] - [DateTime]::Now; $diff.TotalSeconds if($diff.Ticks -ge 0) { ([DateTime]$diff.Ticks).ToString(" HH:mm.ss") } else { ([DateTime][Math]::Abs($diff.Ticks)).ToString("-HH:mm.ss") } } ## Create and store a scriptblock to sound the alarm $TimerStuff["AlarmFunction"] = { if($BootsTimer.Tag["Sound"]) { $BootsTimer.Tag["Sound"].Play() } else { [System.Media.SystemSounds]::Exclamation.Play() } if($BootsTimer.Tag["EndMessage"]) { $null = $BootsTimer.Tag["Voice"].Speak( $BootsTimer.Tag["EndMessage"], 1 ) } } ## Store the "EndMessage" message if($EndMessage) { $TimerStuff["EndMessage"] = $EndMessage } ## If they provided a second status message, read it out loud if($StartMessage) { $null = $TimerStuff["Voice"].Speak( $StartMessage, 1 ) } $TimerStuff["FontSize"] = $FontSize ## Make the window ... $Global:BootsTimer = boots -WindowStyle None -AllowsTransparency -Topmost { TextBlock "" -FontSize $BootsParameters.FontSize -FontFamily Impact -margin 20 ` -BitmapEffect $(OuterGlowBitmapEffect -GlowColor White -GlowSize 15) ` -Foreground $(LinearGradientBrush -Start "1,1" -End "0,1" { GradientStop -Color Black -Offset 0.0 GradientStop -Color Black -Offset 0.95 GradientStop -Color Red -Offset 1.0 GradientStop -Color Red -Offset 1.0 }) # -TextDecorations ([System.Windows.TextDecorations]::Underline) } -On_MouseDown { if($_.ChangedButton -eq "Left") { $this.DragMove() } } -On_Close { $this.Tag["Timer"].Stop() Remove-BootsWindow $this } -Async -Passthru -Background Transparent -ShowInTaskbar:$False -Tag $TimerStuff ## Now we need to call that scriptblock on a timer. That's easy, but it ## must be done on the window's thread, so we use Invoke-BootsWindow. ## Notice the first argument is the window we want to run the script in Invoke-BootsWindow $Global:BootsTimer { ## We'll create a timer $Global:BootsTimer.Tag["Timer"] = new-object System.Windows.Threading.DispatcherTimer $BootsTimer.Tag["Timer"].Interval = [TimeSpan]"0:0:0.05" ## And will invoke the $updateBlock $BootsTimer.Tag["Timer"].Add_Tick( { trap { write-host "Error: $_" -fore Red write-host $($_.Exception.StackTrace | Out-String) -fore Red } $remain, $BootsTimer.Content.Text = & $BootsTimer.Tag["NowFunction"] $remain = $remain / $BootsTimer.Tag["seconds"] ## Move the gradient a little bit each time. $BootsTimer.Content.Foreground.GradientStops[2].Offset = [Math]::Max(0.0, $remain) $BootsTimer.Content.Foreground.GradientStops[1].Offset = [Math]::Max(0.0, $remain - 0.05) ## When we get to the end ... make a few changes if($remain -le 0) { ## The first time we hit the end, we want to add a mouse click handler... if($this.Interval.Seconds -eq 0) { ## Which will now only fire every few seconds ## So it's easier to close the window ;) $this.Interval = [TimeSpan]"0:0:2" ## If you click on the finished window, it just goes away $BootsTimer.Add_MouseDown( { $BootsTimer.Close() } ) ## But if they chose -SingleAlarm, they don't neeto bother if($BootsTimer.Tag["SingleAlarm"]) { $BootsTimer.Close() } } & $BootsTimer.Tag["AlarmFunction"] } } ) ## Now start the timer running $BootsTimer.Tag["Timer"].Start() } }
combined_dataset/train/non-malicious/Appscanner v0.10.ps1
Appscanner v0.10.ps1
####################### #Appscanner V0.10 #Author Adam Liquorish #Creation Date 08/11/11 #Change log: # 14/11/11 Removed unrequired step # 02/12/11 Created input choice for domain.local,cached rather than auto determine # 02/12/11 Added all supported filetypes for applockers ".bat",".cmd",".dll",".exe",".js",".msi",".msp","ocx",".psq",".vbs" # 09/12/11 Implemented try/catch to capture file not found or access denied errors for outputting files # #Syntax #appscanner -path <path> -user <user> -applockerpolicy <local/path> -outputpath <path> -userstatus <domain,local,cached> -logdirectory <path> # #Example #appscanner -path "C:\\Program Files" -user "adam" -applockerpolicy "local" -outputpath "c:\\temp\\output.html" -userstatus "local" -logdirectory "c:\\temp\\" ####################### ######Define Parameters param( [Parameter(Mandatory=$true, HelpMessage="Enter Path to be processed.")] [ValidateNotNullOrEmpty()] [string]$path, [Parameter(Mandatory=$true, HelpMessage="Enter User to be processed, as either builtin\\<user> or <domain>\\<user>.")] [ValidateNotNullOrEmpty()] [string]$user=$(Read-Host -prompt "User"), #Uncomment when in production version. [Parameter(Mandatory=$true, HelpMessage="Enter Applocker XML to be utilised ie c:\\applocker.xml, or type local to use effective policy for workstation")] [ValidateNotNullOrEmpty()] [string]$applockerpolicy=$(Read-Host -prompt "Path to applocker policy xml file, or type local to use effective policy for workstation"), [Parameter(Mandatory=$true, HelpMessage="Enter Path for ouput ie c:\\Temp\\output.html.")] [ValidateNotNullOrEmpty()] [string]$outputpath=$(Read-Host -prompt "Path for Output"), [Parameter(Mandatory=$true, HelpMessage="Is the user a Domain/Local/Cached User.[Domain,Local,Cached]")] [ValidateNotNullOrEmpty()] [ValidateSet("Domain","Local","Cached")] [string]$UserStatus=$(Read-Host -prompt "Is the user a Domain/Local/Cached User.[Domain,Local,Cached]"), [Parameter(Mandatory=$true, HelpMessage="Enter Log Directory for ouput ie c:\\Temp\\")] [ValidateNotNullOrEmpty()] [string]$logdirectory=$(Read-Host -prompt "Log Directory") ) ######END DEFINE PARAMETERS ######Define Logger $logfilename="$(get-date -format yyyy-MM-dd-hh-mm-ss).txt" $logfile=$logdirectory+$logfilename if ($host.name -match 'ise') { write-host "Warning: Running in Windows Powershell ISE, Transcript logging will not be running" -foregroundcolor red $null } else { write-host "Running in Powershell Console, Transcript logging will now start" -foregroundcolor blue try{ start-transcript -path $logfile } #catch for if path not found catch [System.IO.DirectoryNotFoundException]{ write-host "Critical: Parent Path to save $logfile not found." -foregroundcolor red read-host "Press enter to exit" } #catch for path access denied catch [System.Management.Automation.RuntimeException]{ write-host "Critical: Write access to $logfile is denied unable to save log file." -foregroundcolor red read-host "Press enter key to exit" } } ###### END Logger ######Define Variables $ticksymbol=[char]10004 $errorsymbol=[char]10008 $asterisksymbol=[char]10033 $dict=@{} $t=$null $hashtable=$null $u=$null $Pathvalid=test-path $path $Pathvalidpolicy=test-path $applockerpolicy $direct=$null $inherited=$null ######END DEFINE VARIABLEs ######Define HTML Output $a="<style>" $a=$a +"TABLE{border-width: 1px;border-style: solid;border-color: black;border-collapse: collapse;}" $a=$a +"TH{border-width: 1px;padding: 0px;border-style: solid;border-color: black;background-color:thistle}" $a=$a +"TD{border-width: 1px;padding: 0px;border-style: solid;border-color: black;}" $a=$a +"</style>" $header= "<h1>List of Processed Files</h1>" ######END DEFINE HTML OUTPUT ######Testing Privileges #$currentprincipal=new-object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent()) #& { # if ($currentprincipal.isinrole( [Security.principal.windowsbuiltinrole]::Administrator)) # { # write-host "$ticksymbol Running with administrative privilages" -foregroundcolor blue # } # else # { # write-host "$errorsymbol Script is currently not running with administrative privileges, please run as admin" -foregroundcolor red # read-host "Press enter to exit" -foregroundcolor red # exit # } # } ######END TESTING PRIV ######Importing Required Modules try { if((get-wmiobject -cl win32_operatingsystem).version -gt "6") { write-host "$ticksymbol Win Vista or higher detected, Importing Applocker Module" -foregroundcolor blue if((get-module -listavailable|foreach-object {$_.name}) -contains "applocker") { import-module applocker write-host "Successfully imported applocker module" -foregroundcolor blue } else { write-host "Critical: Applocker module cannot be found try logging in as administrator" -foregroundcolor red read-host "Press enter to quit" exit } } else { "Critical: $errorsymbol Exiting....An operating system lower that Windows Vista has been detected. Script can only be run on Vista or higher." read-host "Press Enter key to exit" Exit } } catch { write-host "Critical: Error encountered loading applocker module" -foregroundcolor red read-host "Press Enter key to exit" Exit } ######END IMPORT MODULES ######MAIN if ($Pathvalid -eq "True") #If Path Valid { if ($applockerpolicy -eq "local") #Output effective local applied applocker policy { #Determine whether an applocker policy is in effect on workstation if((get-applockerpolicy -effective -xml ) -like "*Rule*") { write-host "$ticksymbol A valid Applocker Policy is currently applied to this workstation" -foregroundcolor blue write-host "Warning: A path is required to save local applied applocker policy for usage" -foregroundcolor red $applockerpolicy=read-host "Enter path, ie c:\\temp\\applockerpolicy.xml" write-host "$asterisksymbol Effective applied Applocker Policy for this workstation has been selected, policy will be output to $applockerpolicy" -foregroundcolor blue #Effective Applocker policy output try{ get-applockerpolicy -effective -xml >$applockerpolicy } #catch for if path not found catch [System.IO.DirectoryNotFoundException]{ write-host "Critical: Parent Path to save $applockerpolicy not found." -foregroundcolor red read-host "Press enter to exit" } #catch for path access denied catch [System.Management.Automation.RuntimeException]{ write-host "Critical: Write access to $applockerpolicy is denied unable to export policy." -foregroundcolor red read-host "Press enter key to exit" } } else { write-host "Critical: $errorsymbol Exiting....An applocker policy has not been applied to this workstation" -foregroundcolor red read-host "Press Enter key to exit" exit } } elseif ($Pathvalidpolicy -eq "True") { write-host "$ticksymbol Valid XML file supplied for Applocker Policy" -foregroundcolor blue } else { write-host "Critical: $errorsymbol Exiting....Invalid path for applocker policy xml file, File Doesn't exist!" -foreground red read-host "Press Enter key to exit" exit } #Stage 1 Find group membership for user $starttime=get-date "Stage 1 of 7, Enumerating Groups User is a member of, including inherited groups" #Load .Net Assembler add-type -AssemblyName System.DirectoryServices.AccountManagement $domain = (Get-wmiobject Win32_ComputerSystem).Domain $ping=new-object system.net.networkinformation.ping #Function for finding group membership for only local or domain not a cached user!!! function groupfind { #Create objects to filter based on group name and ContextType--Domain or Machine $principal = new-object System.DirectoryServices.AccountManagement.PrincipalContext $ctype,$domain $idtype = [System.DirectoryServices.AccountManagement.IdentityType]::SamAccountName $groupPrincipal = [System.DirectoryServices.AccountManagement.UserPrincipal]::FindByIdentity($principal, $idtype, $user) #Recursively find what groups the user is a member of #Also assigns groups found to a global variable called groupout set-variable -name groupout -value $groupprincipal.GetAuthorizationGroups() -scope global } #END FUNCTION #Determine if workstation is part of a domain or just local. If($userstatus -eq "Domain") { try { $domainName = [System.DirectoryServices.ActiveDirectory.Domain]::GetComputerDomain() | select -ExpandProperty Name $isDomain = $domainName -match $domain $domain =$domainname write-host "Workstation is part of a domain" -foregroundcolor blue #Determine if domain controller is contactable if not contactable treat workstation as local and use local account information if ($ping.send(([System.DirectoryServices.ActiveDirectory.Domain]::GetComputerDomain()).pdcroleowner.name).status -eq "Success") { $ctype = [System.DirectoryServices.AccountManagement.ContextType]::Domain write-host "Successfully contacted Domain controller, using Domain account information." -foregroundcolor blue #calls function groupfind groupfind } else { write-host "Critical: Domain Controller not contactable!" -foregroundcolor red read-host "Press Enter key to exit" exit } } catch { write-host "Critical: Computer is not part of a domain" -foregroundcolor red read-host "Press Enter key to exit" exit } } elseif($userstatus -eq "Local") { #Build list of local users $computername="$env:computername" $computer=[ADSI]"WinNT://$computername,computer" $localuserlist=$computer.psbase.children|where-object {$_.psbase.schemaclassname -eq 'user'} $localuserlistfilt=foreach($useritem in $localuserlist){$useritem.name} #Check queried user against list to see whether user is local if($localuserlistfilt -contains $user) { write-host "Verified user is a part of local SAM database" -foregroundcolor blue $domain=(Get-wmiobject Win32_ComputerSystem).Name $ctype = [System.DirectoryServices.AccountManagement.ContextType]::Machine #Calls function groupfind groupfind } else { write-host "Critical: User is not a local user" -foregroundcolor red read-host "Press Enter key to exit" exit } } elseif($userstatus -eq "Cached") { try { #Build list of local users $computername="$env:computername" $computer=[ADSI]"WinNT://$computername,computer" $localuserlist=$computer.psbase.children|where-object {$_.psbase.schemaclassname -eq 'user'} $localuserlistfilt=foreach($useritem in $localuserlist){$useritem.name} #Check queried user against list to see whether user is local if($localuserlistfilt -contains $user) { write-host "Critical: User is a part of local SAM database, therefore user is not cached." -foregroundcolor red read-host "Press Enter key to exit" exit } else { #Check queried user matches logged on user" if((gwmi win32_computersystem).username -like "*$user") { write-host "Verified user is a cached user" -foregroundcolor blue $groupout=[system.security.principal.windowsidentity]::getcurrent().groups|foreach-object {$_.translate([system.security.principal.ntaccount])} } else { write-host "Critical: Logged on user doesn't match queried user, therefore User is not a cached user" -foregroundcolor red read-host "Press Enter key to exit" exit } } } catch { write-host "Critical: User is not cached" -foregroundcolor red read-host "Press Enter key to exit" exit } } else { write-host "Critical: Please use Local,Domain or Cached" -foregroundcolor red read-host "Press Enter key to exit" exit } "Stage 1 of 7, Finished Scanning Group Membership" "Stage 1 of 7, Outputting Group Membership hierarchy" #Add user to variable $groupfilter=@($user) #Filter group properties down to name string $groupfilter+=foreach($groupname in $groupout){$groupname.name} #Determine direct membership $domaincut=$domain -match "\\w+[A-Za-z0-9-]+" $domaincutvalue=$matches.values $query="ASSOCIATORS OF {Win32_Account.Name='$user',Domain='$domaincutvalue'} WHERE ResultRole=GroupComponent ResultClass=Win32_Account" $directmembership=get-wmiobject -query $query $directmembershipresults=foreach($directmember in $directmembership){$directmember.name} $directmembershipresultsfiltered=$directmembershipresults|select-object -unique "#####################################################" write-host "#Green is for the username," -foregroundcolor darkgreen -nonewline; write-host "Red is for direct group membership," -foregroundcolor red -nonewline; write-host "Blue is for the inherited group membership" -foregroundcolor blue "#User $user group structure looks like the following;" foreach ($group in $groupfilter){ if($directmembershipresultsfiltered -contains $group){ $direct+=@($group)} elseif($group -eq $user){ $null} else{$inherited+=@($group)} } #Display user write-host "-$user" -foregroundcolor darkgreen #Display direct membership foreach($member in $direct){ write-host "->$member" -foregroundcolor red } foreach($member in $inherited){ write-host "-->$member" -foregroundcolor blue } "#####################################################" "Stage 1 of 7 Complete" #End Stage 1 #Stage 2 Recurse found items to variable $count=0 "Stage 2 of 7 $path is populating a variable " Get-Childitem $path -recurse -outvariable objects|where-object{write-progress "Stage 2 of 7 Recursing items to variable, Examining $($_.fullname)...." "Found $count items";"$($_.fullname)"}|foreach-object {$count++} "Stage 2 of 7 $path has been populated into a variable" #End Stage 2 #Stage 3 FILTERACL "Stage 3 of 7 Processing ACL on files to index" $max=$objects.length #filter variable $filteracl ={$groupfilter -like $_.IdentityReference.value.split("\\")[1] -and ($_.FileSystemRights -band 131241 -or $_.FileSystemRights -band 278)} #Filter and add to new property foreach ($i in $objects) { $dict[$i.fullname]=@{user="";Permission=""} $t++ $i.GetAccessControl().Access |Where $filteracl|foreach {$dict.($i.Fullname).User+=($_.IdentityReference,",");$dict.($i.Fullname).Permission=$_.FileSystemRights} Write-Progress -activity "Stage 3 of 7 Processing File Permissions to index" -status "$t of $max" -PercentComplete (($t/$objects.count)*100) -CurrentOperation $i.fullname } "Stage 3 of 7 Complete" #END STAGE 3 #Stage 4 Remove Duplicate identities "Stage 4 of 7 Removing duplicate identities" #Zeroise write-progress counter $t=$null #Remove duplicate identities due to listing of inherited groups in ACL foreach ($i in $objects) { $t++ $identarray=$dict[$i.fullname].user;$dict[$i.fullname].user=$null;$splitidentarray=$identarray -split ",";$uniqueidentarray=$splitidentarray|sort-object -unique;$uniqueidentarray -join ","|foreach {$dict.($i.fullname).User+=($_)} Write-Progress -activity "Stage 4 of 7 Removing Username/Group Duplicates" -status "$t of $max" -PercentComplete (($t/$objects.count)*100) -CurrentOperation $i.fullname } "Stage 4 of 7 Complete" #END STAGE 4 #Stage 5 APPLOCKER "Stage 5 of 7 Processing Applocker policy on files" #Applocker file extensions list $Applockerfileextlist=".bat",".cmd",".dll",".exe",".js",".msi",".msp","ocx",".psq",".vbs" $userpol=$objects|where {$Applockerfileextlist -contains $_.Extension}|convert-path|test-applockerpolicy $applockerpolicy -User $user $userobjpol = $userpol|select-object PolicyDecision,FilePath,MatchingRule $userobjpolcount=0 $userobjpol|foreach { $userobjpolcount++ $dict[$_.FilePath] += @{ PolicyDecision = $_.PolicyDecision;MatchingRule= $_.MatchingRule} Write-progress -activity "Stage 5 of 7 Processing AppLockers results:" -status "$userobjpolcount of $($userobjpol.count)" -PercentComplete (($userobjpolcount/$userobjpol.count)*100) -CurrentOperation $_ } "Stage 5 of 7 Complete" #END STAGE 5 #Stage 6 "Stage 6 0f 7 Preparing format of results for html Report" $max2=$dict.count $hashtable=foreach($j in $dict.keys){ $u++ New-Object -TypeName PSObject -Property @{Path=$j User=$dict.$j.user Permission=$dict.$j.Permission MatchingRule=$dict.$j.MatchingRule PolicyDecision=$dict.$j.PolicyDecision } Write-Progress -activity "Stage 6 of 7 Processing Dictionary to properties" -status "$u of $max2" -PercentComplete (($u/$max2)*100) -CurrentOperation $_} "Stage 6 of 7 Complete, $u files scanned of $max for Applocker scan" #END STAGE 6 #####END MAIN #####RESULTS #OUTPUT RESULTS TO FILE "Stage 7 of 7 Outputting to file $outputpath" try{ $hashtable|sort-object Path|ConvertTo-Html -head $header -title "ACL List" -body $a|Set-Content $outputpath } #catch for if path not found catch [System.IO.DirectoryNotFoundException]{ write-host "Critical: Parent Path to save $outputpath not found." -foregroundcolor red read-host "Press enter to exit" } #catch for path access denied catch [System.Management.Automation.RuntimeException]{ write-host "Critical: Write access to $outputpath is denied unable to export results." -foregroundcolor red read-host "Press enter key to exit" } #Display results $endtime=get-date $totaltime=$endtime-$starttime $totaltimehours=$totaltime.hours $totaltimeminutes=$totaltime.minutes $outputsize=get-item "$outputpath"|foreach {echo($_.length/1mb).tostring("0.00 MB")} "Stage 7 of 7, Scanned $max files of $path is complete in $totaltimehours hours and $totaltimeminutes minutes, $outputpath is $outputsize." #####END RESULTS #####Zeroise variables and unrequired files #Stop Logging if ($host.name -match 'ise') { $null } else { "Running Log output to $logfile" stop-transcript >$null } #Prompt delete applocker policy $delete=read-host -prompt "Would you like the Applocker policy file $applockerpolicy deleted,YES/NO" if($delete -eq "yes") { del $applockerpolicy } else { write-host "Warning: $asterisksymbol You chose not to delete file $applockerpolicy, Application will now exit....." -foregroundcolor red read-host "Press Enter key to exit" } } #If Path invalid else { write-host "Critical: $errorsymbol Exiting...Invalid path supplied for processing" -foregroundcolor red read-host "Press Enter key to exit" exit }
combined_dataset/train/non-malicious/divide integer.ps1
divide integer.ps1
function divide-integer ([int]$dividend , [int]$divisor ){ [int]$local:remainder = $Null;return [Math]::DivRem($dividend,$divisor,[ref]$local:remainder);} set-alias i/ divide-integer i/ 10 3 function divide-integerpipe ([int]$divisor ) { begin { [int]$local:remainder = $Null} process { [Math]::DivRem($_ ,$divisor,[ref]$local:remainder); } } set-alias i\\ divide-integerpipe 10 | i\\ 3 1..10 | i\\ 3
combined_dataset/train/non-malicious/4350.ps1
4350.ps1
function ThrowError { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.Management.Automation.PSCmdlet] $CallerPSCmdlet, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ExceptionName, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ExceptionMessage, [System.Object] $ExceptionObject, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [System.String] $ErrorId, [parameter(Mandatory = $true)] [ValidateNotNull()] [System.Management.Automation.ErrorCategory] $ErrorCategory ) $exception = New-Object $ExceptionName $ExceptionMessage; $errorRecord = New-Object System.Management.Automation.ErrorRecord $exception, $ErrorId, $ErrorCategory, $ExceptionObject $CallerPSCmdlet.ThrowTerminatingError($errorRecord) }
combined_dataset/train/non-malicious/3776.ps1
3776.ps1
$ErrorActionPreference = "Stop" $scriptpath = $MyInvocation.MyCommand.Path $scriptDirectory = Split-Path $scriptpath $scriptFileName = Split-Path $scriptpath -Leaf function prompt { Write-Host "[$((Get-Location).Path)]" Write-Host "StorageSyncDevOps " -NoNewLine -foreground White "PS> " } function reload { Remove-Module StorageSyncDevOps ipmo "$($scriptDirectory)\StorageSyncDevOps.psm1" -DisableNameChecking -Scope Global } ipmo "$($scriptDirectory)\StorageSyncDevOps.psm1" -DisableNameChecking -Scope Global
combined_dataset/train/non-malicious/sample_59_71.ps1
sample_59_71.ps1
<############################################################## # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # ##############################################################> using Module ..\..\HelperFiles\Result.psm1 Import-Module $PSScriptRoot\..\..\HelperFiles\TestObsHelper.psm1 -Force Import-Module $PSScriptRoot\..\..\HelperFiles\ReportHelper.psm1 -Force function Test-GMAConfig { Param( [Parameter(Mandatory=$true)] [PSCustomObject] $TestReport, [Parameter(Mandatory=$true)] [string] $DeviceType ) try { $functionName = $($MyInvocation.MyCommand.Name) $gmaCacheData = Get-Content -Path "$PSScriptRoot\GMACacheData.json" | ConvertFrom-Json $areaPaths = $gmaCacheData.AreaPaths foreach ($areaPath in $areaPaths) { Trace-Progress "$functionName : Checking for GMA Config for area path : $areaPath" $testRow = Test-AreaPathGMAConfig -AreaPath $areaPath $TestReport.Rows.Add($testRow) } return $TestReport } catch { Trace-Progress "$functionName : Failed with $_" -Error return $TestReport } } function Test-AreaPathGMAConfig { Param( [Parameter(Mandatory=$true)] [string] $AreaPath ) $functionName = $($MyInvocation.MyCommand.Name) $testRow = $null $testName = "Test GMA Config Exists" try { $testRow = New-TestRow -TestName $testName -AreaPath $AreaPath $gmaConfigPath = Get-PathToGMAFolders -AreaPath $AreaPath $getHighestVersionFolder = $false # Find which config folder is being used by GMA # Need to read file that ends in "cv". If multiple (unlikely), get the one that was modified most recently. Trace-Progress "$functionName : Getting path to GMAConfig for area path $AreaPath" $testRow.TestDescription = "Go to path $gmaConfigPath, find the correct folder based on GMA version, and check that GMA config exists and is not empty." $fileWithGMAVersion = Get-ChildItem -Path $gmaConfigPath -Filter "*cv" | where-object { -not $_.PsIsContainer } | Sort LastWriteTime -Descending | Select-Object -First 1 if ($null -ne $fileWithGMAVersion) { Trace-Progress "$functionName : Found file $($fileWithGMAVersion.Name) which should contain GMA version" $versionNumber = Get-Content -Path $fileWithGMAVersion.FullName if (-not [string]::IsNullOrEmpty($versionNumber)) { Trace-Progress "$functionName : GMA version is $versionNumber" # Get folder with the correct version number. If more than one (unlikely), get the one that was modified most recently. $gmaFolder = Get-ChildItem -Path $gmaConfigPath -Filter "*cv$versionNumber" | where-object {$_.PsIsContainer} | Sort LastWriteTime -Descending | Select-Object -First 1 if ($null -ne $gmaFolder) { $testRow = Check-IfGMAConfigExists -TestRow $testRow -GMAConfigPath $gmaFolder.FullName } else { Trace-Progress "$functionName : Could not get folder ending in version number $versionNumber" $getHighestVersionFolder = $true } } else { Trace-Progress "$functionName : Could not get GMA version Number. Contents of $($fileWithGMAVersion.Name) were empty" $getHighestVersionFolder = $true } } else { Trace-Progress "$functionName : Could not get file with GMA version" $getHighestVersionFolder = $true } if ( $getHighestVersionFolder) { Trace-Progress "$functionName : Could not get path to GMA config using specific version number." Trace-Progress "$functionName : Will check folder with highest GMA version number instead." try { $gmaConfigPath = Get-HighestVersionGMAFolder -TestRow $testRow } catch { $errorMessage = "Failure in Get-HighestVersionGMAFolder. $_" Trace-Progress $errorMessage } if ($errorMessage -or $null -eq $gmaConfigPath) { $testRow.Result = [Result]::FAIL $testRow.ReasonForFailure = "Could not get path to GMA config. $errorMessage" } else { $testRow = Check-IfGMAConfigExists -TestRow $testRow -GMAConfigPath $gmaConfigPath.FullName } } if ($testRow.Result -eq [Result]::PASS) { Trace-Progress "$functionName : Successfully found the GMA config" } else { Trace-Progress "$functionName : Could not get GMA config. GMA config was empty or null." } return $testRow } catch { $failureMessage = "$functionName : failed with $_" Trace-Progress $failureMessage -Error return Update-TestRowForError -TestRow $testRow -FailureMessage $failureMessage ` -TestName $testName -AreaPath $AreaPath } } function Get-HighestVersionGMAFolder { Param( [Parameter(Mandatory=$true)] [PSCustomObject] $TestRow ) $gmaConfigPath = Get-PathToGMAFolders -AreaPath $TestRow.AreaPath $gmaFolders = Get-ChildItem -Path $gmaConfigPath | Where-Object {$_.PsIsContainer} $versionNumberRegex = ".*cv(\d+\.\d+)$" $gmaFolders = $gmaFolders | Where-Object {$_.Name -match $versionNumberRegex } | Where-Object { -not ($_.Name -match ".*1\.99+$") } $version = 0 foreach ($folder in $gmaFolders) { if ($folder.Name -match $versionNumberRegex) { $dec = [decimal]$matches[1] if ($dec -gt $version) { $version = $dec $gmaFolderHighestVersion = $folder } } } return $gmaFolderHighestVersion } function Get-PathToGMAFolders { Param( [Parameter(Mandatory=$true)] [string] $AreaPath ) $prefixPath = Join-Path $env:SystemDrive "GMACache" $folderName = $AreaPath + "Cache" $gmaConfigPath = Join-Path $prefixPath $folderName return Join-Path $gmaConfigPath "Gcs\Conf" } function Check-IfGMAConfigExists { Param( [Parameter(Mandatory=$true)] [PSCustomObject] $TestRow, [Parameter(Mandatory=$true)] [string] $gmaConfigPath ) $functionName = $($MyInvocation.MyCommand.Name) Trace-Progress "$functionName : The path to the GMA config is $gmaConfigPath" # If more than one config (unlikely), get the one that was modified most recently. $gmaConfig = Get-ChildItem -Path $gmaConfigPath -Filter "GcsConfig" | where-object { -not $_.PsIsContainer } if ($null -eq $gmaConfig -or $gmaConfig.Length -le 0) { $testRow.Result = [Result]::FAIL $testRow.ReasonForFailure = "GMAConfig at path $gmaConfigPath is null or empty." } else { $testRow.Result = [Result]::PASS } return $testRow } Export-ModuleMember -Function Test-GMAConfig -Verbose:$false # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD2qPn91uqBOKtl # jCwXnsBcr+RAwRgwPB2chbtiPIreY6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN8UlYd9nPdj+2Zi2de+V0yt # 4Y6LsHhKact5sNI5/ykNMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAYYFvEq3BQHdlY3hVvdCcwuP+YgkTr+S3UBWnM7Fu8OoDVq2ByLThmcS8 # 1XRMdSI0qW7YH7XGTa6UFsqzlNX8QtUp6VXyQmA9me+dtzEb4i7DMWuEy7BRca1m # fU2NsO7ACY7E90lZaUe4J5IN9sVdJQHk8r4EDAQRmsLfqvQ/9Vi6M8lO238HjnWF # 0T2ap9uSp0SSUgCEA5PAm1EXQlQ3EhfNeltTVn8imxR2MfTPIyfE9eHEfd4qraPI # rxTV7sQoZ24qjo/FwuKfnsalMTy4IqyBDPfPME45VXFZZNDXBy8Y2N+aNus2tnoT # J+PtxCBMToPVZxifWC59x4Q6bq6tT6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDgMA2j8mXbBpjufl+GfkkSEhhX4TA9xgr/OZYTdSb8yQIGZkYQQolB # GBMyMDI0MDUxNjE4NDUxNy44MDNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6fCOvzAiGA8yMDI0MDUxNjEzNTUx # MVoYDzIwMjQwNTE3MTM1NTExWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp8I6/ # AgEAMAoCAQACAgCWAgH/MAcCAQACAhNUMAoCBQDp8eA/AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKlaN55iszYSxtGiRceZ8tPVu4q25o4TrvchJXESH/42 # YYeFMjoEHfcFRs+wUJ0XZBONIM/4Rv8nLAyGmw6MGKkz28xVOeov/TsW+JtBUzUR # 8eQUzaECR9rckF8e8JYXKF5oOAErbcubUTN0V3hQvTHCQvMKso0ZS9VmwbUwx/9c # ZSVQTdco0VZd5l887kmCYBRtuek6vaLmcVGS+3qQZorewx/PKBG/n9a7iIWF4TON # 3EDu6x7fTW12E1fGY/NpePMQ/zaDsHG5P064YcKsdHSbsqESRQ7ZLa2G0QmzRG1h # 7cJmvG1ZtzPO+HgHJJo9aMlzBDSXvEtkM/+aMy5BpQQxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBe8uORBwIHqCBWzNGL7Hsb83EcG9gu0NIubgeTC2Zu # CzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgyvBAj/2YQSwlGf9t2sDDJ2yP # PePKa5byfE3TrMElYnAwDQYJKoZIhvcNAQELBQAEggIACOIhgB23sEG11n7ZSWAv # ED1VAdR5qpaen5omuF5klErr5pX/R0m0T3u/DqMsaTl/1ILMeUjg+p2vasCZJ++y # H2spUoQu4GMqvBrWepCn9rFG206aCjXG3n+Gru3W7ymIRWqbbHdo6Eg1go0bTjUk # VyEqp1PKRmlHWbT1TwUxUxwygH4aR8huQavDokYQBY/tk7zqfm1XgTRpg47Ka0wA # H0prSyf/8Vmh2Vm9Sn7m8gewg3yu7ArFlBE9KIFv6gwUs2CPtfDKirJhxf1wO5Md # GrSb6bhQwwkxkstKtA7k9FkgXv/xhC2VTnNtOEEqjlWmghhAYKrtvDPdVEyfL9qY # VSXDrbR1neZeaz4BSTob0hu17k0EYNTghyYab0M4s4wasHl6M6Qh5YYuZk0W3OYk # q+SJlmA5b79fUyCdBXZ0SGkPIPq8G7NIBje6IJd28WaWQCjwtqdhHFTPwAmMHg9A # O+4r+BEOy6ZaUYBHJBX+f/17Kn38Knhyfctffhogxf6vpJUzVxHUIHBv3Rb34HUc # NOqis7W0J2CYxUL9Cd7xJJ09SqwPNsV+ytXxodS6BniJhLEfUs3i5xSuAyu3d50S # OrBMwqRvMwk+sCXBFW0O1omk3agNiE4hnxVWe5e64SwYOjJLAiK9mckQJULQuhZ/ # /hBEIMBBrU0P6BFCBmyGOPs= # SIG # End signature block
combined_dataset/train/non-malicious/sample_13_48.ps1
sample_13_48.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Deletes a single database in a Redis Enterprise cache. .Description Deletes a single database in a Redis Enterprise cache. .Example PS C:\> Remove-AzRedisEnterpriseCacheDatabase -Name "MyCache" -ResourceGroupName "MyGroup" -PassThru True .Example PS C:\> Remove-AzRedisEnterpriseCacheDatabase -Name "MyCache" -ResourceGroupName "MyGroup" .Inputs Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.IRedisEnterpriseCacheIdentity .Outputs System.Boolean .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IRedisEnterpriseCacheIdentity>: Identity Parameter [ClusterName <String>]: The name of the Redis Enterprise cluster. [DatabaseName <String>]: The name of the database (must be "default"). [Id <String>]: Resource identity path [Location <String>]: The region the operation is in. [OperationId <String>]: The operation's unique identifier. [PrivateEndpointConnectionName <String>]: The name of the private endpoint connection associated with the Azure resource [ResourceGroupName <String>]: The name of the resource group. The name is case insensitive. [SubscriptionId <String>]: The ID of the target subscription. .Link https://learn.microsoft.com/powershell/module/az.redisenterprisecache/remove-azredisenterprisecachedatabase #> function Remove-AzRedisEnterpriseCacheDatabase { [OutputType([System.Boolean])] [CmdletBinding(DefaultParameterSetName='Delete', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='Delete', Mandatory)] [Alias('Name')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the Redis Enterprise cluster. ${ClusterName}, [Parameter(ParameterSetName='Delete', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(ParameterSetName='Delete')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(ParameterSetName='DeleteViaIdentity', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.IRedisEnterpriseCacheIdentity] # Identity Parameter # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $null = $PSBoundParameters.Add("DatabaseName", "default") Az.RedisEnterpriseCache.internal\Remove-AzRedisEnterpriseCacheDatabase @PSBoundParameters } } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDr++nG4J2LUdfo # MS2iXQWzkVBzlOTv4pNR3Vj6u0CUhKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAi4 # R6QLoA0bBNXdD+/wjy4w1yPh2PlX/Uya0Vu8G7QjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA5FOfojNEEjZ904usCtfz8KUfDN2EMjZA3TXa # vaOXJyEpTcTMW3QayB612v1PMfl1ChRrYPIe7UojAHysuW0nrbyuSU7Qnc0tRQQq # zn4htTPp1gWCeeky28tm3RHUx+o/rXymoEEo1/mXcm6Lpq400rsg07i1WebQioL7 # k+rfH/H/UHPwxHLlN5Q3mBAefzgM26RjkB8UG57Y13/8r2tYd/IFIztFqPUkqxmD # S3M7hKNgnQuGTq9Bb3ZERe+IJOFCT+irsxsARmMrjS6ssLTxmRDduHJpduH/cJqZ # sa95tKKbEc8uOtSZqeViXj3EP7O5lAwm/Ny34DzijD006Q1JvqGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAQ11BmFreqwQraWoTizYKauoAS7e0JS3Y9 # DEt/4JvwhgIGZiAgthONGBMyMDI0MDQyMzEzMTUxMy45NDJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV # 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj # tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC # 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ # bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU # Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne # tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF # cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4 # eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth # FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW # ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv # NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u # fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3 # ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL # hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX # a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan # hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl # UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo # ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO # aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv # E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS # gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv # 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf # iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQy # NDE1MTcxMlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgID # FQIB/zAHAgEAAgITGDAKAgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBANIiA17LpM6vqyo+h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv # /pD1kqx4aZmxSYhfghQxG6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z # 6t1t+B5+UpZHn/ZqMCje0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsA # AQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgyWzO2VvDd2aWOL4bTedj9WQILFARY5T/rF47 # kJ4qhtswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETO # DoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O # 6Yu7/zJ0dHmtmWF4o2meBeYsMA0GCSqGSIb3DQEBCwUABIICAI/5N7z5eDTW6oPk # h5S15L4lL2feTAP2gLug+klUAXqDM9sh8HgNmft9DwSaqbaDii/NfZdvba7Hys0y # qzxRJNCnaBbCgKN+YoPjReLqf5dQsH+YeRgFecmOV/hc9w/xLPQm3q19x42+mJUM # sQ1SEE+bLgY2GGZYVOuBteEeksaKdFoOArz29ErCPZ7C9LqqzPPp0SuHdGubboHJ # pH+RevLJrsOChCkVGFVsyHrn9qh+mcnw2l0MaM/zbqx5p9TtCeyKD9rXHcfxYCJM # 6xIV+R2uhSqrG7B6Mb2OWtSsrOSP0SreJFqAPAv9BBJojql80fHeCQTPPsbk0osn # 1rGvhGDnn4oB06tEuKiOHDS/ToW111d/JQDip9Ma+jjYjpOdAhDkeRUOfvJyVUJv # 8uUmBaHD5WZulyJG+9f0QggMFMA6+rmn0G0u5nB6JLD225eE32U+I7oj+ociSIoe # i8xAJWYr9zjPXVUdnbz+1rHN+7mdupUNb1DTv4HIAKX3i3ceJpChKA0imiB+T/r9 # lnuus4dnVOIHrWangGHu2Bgjw3skdrtGTsSUxou3R2H+8CB8rIrgzfmFtGIUG5GI # huEF2Bxyw+yXw27L7aGWL9MzKpZs0amCxA0ahtloDjJBBwDFZtcaP0bQss9mdVsk # n1G8S5ThQoom0nJca6sajR/XE72Y # SIG # End signature block
combined_dataset/train/non-malicious/601.ps1
601.ps1
function Get-CleanSPUrl { param( [Parameter(Mandatory=$true)] [String] $Url ) [Uri]$Url = $Url if($Url -match "(/Forms/).*?\.(aspx$)"){ [Uri]$ListUrl = $Url.AbsoluteUri -replace "(/Forms/).*?\.(aspx)","" [Uri]$WebUrl = $Url.AbsoluteUri -replace "/([^/]*)(/Forms/).*?\.(aspx)","" @{ListUrl=$ListUrl;WebUrl=$Weburl} }elseif($Url -match "(/Lists/).*?\.(aspx$)"){ [Uri]$ListUrl = $Url.AbsoluteUri -replace "/([^/]*)\.(aspx)","" [Uri]$WebUrl = $Url.AbsoluteUri -replace "(/Lists/).*?\.(aspx)","" @{ListUrl=$ListUrl;WebUrl=$Weburl} }elseif($Url -match "/SitePages/Homepage.aspx$" -or $Url -match "/default.aspx$"){ [uri]$WebUrl = $Url -replace "/SitePages/Homepage.aspx", "" -replace "/default.aspx","" @{WebUrl=$Weburl} }else{ @{WebUrl=$Url} } }
combined_dataset/train/non-malicious/sample_44_48.ps1
sample_44_48.ps1
@{ GUID = 'A51E6D9E-BC14-41A7-98A8-888195641250' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @('MSFT_MpPerformanceRecording.psm1') FormatsToProcess = @('MSFT_MpPerformanceReport.Format.ps1xml') CompatiblePSEditions = @('Desktop', 'Core') FunctionsToExport = @( 'New-MpPerformanceRecording', 'Get-MpPerformanceReport' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '5.1' } # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC5QoGq9EV41ZN5 # fnwNlxKx8aIBP8W7y/AxkQ4SrJmPcKCCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEICjaAYW6dpF96OECCa1j0HmEWEEdofGluuKSKwAnvISeMEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALzIUfydds/lAn8wg+foVEOxU # P04PWhoHTYiyOeWsFk1kXQCK1+MBcg+UbtfgO2LPZB6vWWmD0/q9ShL4G8vA3xfI # uN8Wt9DWThKG1b9xBm3x1nPo5Ey3Bd5XGhmZf37/Bj7HOoCSKb+2osiQS6WTUb8+ # j/ifuMLxJcyqF2hOPiogTcslwIDBgc/4oD49TXkCnbefTIX12ceUuhV4mZ0V+X97 # uS2vhmkTW3jOuv88DmujL24NrbM+FBTq44smIE4d6iqPmeI/sVgrvKZEGEhiSotk # MJLDzNr0IQBqjOHsjHx26H9kKHEwmoA97gluyYer2M4H/TKM77+mCcyJnCn0b6GC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCABZ4Dgpg/f9krqiUcXw8tT # y7jhnvCveoTuPnxZ2P5U2AIGZfHOdMIAGBMyMDI0MDMxNjAwNDcyMi44NDRaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHajtXJWgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAJOQBgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w # 2L6qHtwm4EnClF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWc # JYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgL # ho0J68Kdji3DM2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJ # n6ULnknD9i4kUQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQh # pZjz+zsQgpXlPczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIw # YLA6uvS8kRdA6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidu # g+owrcCjQagYmrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4Hto # PYw9z1DdcJfZBO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iR # WGJk6M9uuT2493gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oP # u5KsFfRTHREloR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoq # k/IObQriq1caHVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyV # YXjXYB5DwzaWZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz # 7spsjt8vnx50WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/Qhns # oF8mpFNPHV1q/WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25W # Jy10VtQ9P5+C/2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+4 # 9I8evoad9hdZ8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEi # XtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ # 7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYf # ToUefmct3dM69ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA59 # 8mubDvLD5x5PP37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIf # IYljHUbNoY0/wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOme7y8wIhgPMjAyNDAzMTYwMDAwNDda # GA8yMDI0MDMxNzAwMDA0N1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6Z7vLwIB # ADAHAgEAAgIweDAHAgEAAgISGDAKAgUA6aBArwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAK2ZXnF21ebDZM7hSi2Neao/u/rypFyoqYDZOq7KqEoOe33Ym2GI # Vn9i+Nj0gWrEle3RQwdEnRqJ+ACw4svlpRnx6JIt2q2AhC+ymI6sA1dOG1uPQZLN # Hw5aXNYxUPTC8rQASFpEPM6AIK/V2Dmf7OTWrPfF0JieFIGijgZVzsR0MYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg/hv3R7buNy0jIZS2KM3BzUO0rMvI # 8GolnzIzQdpkagswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDv # nqTe95Dj1C09020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIGX+ds06kAkq # ejfHlLcH9+uqLdPgo4cRPNecw9vAj3UrMA0GCSqGSIb3DQEBCwUABIICAF7/mWvT # YiIFGf1E4R3Tb4vvGAPHjWeFdGNX0w2nXB4R4yoZ3hJ/hueda+dLi70CfRZtfmTb # 4D9gWmG6UOYtrx4YXcvPZXkolsG3wS/qC4ZnBf9t9My609l9B8lc+iYaAUoPrraC # l10z1K8/WfDFPEq3m/ulQRarwXbtTlzCtc3E0svg6iSmqUK77DegDT6E+LXOt0dS # 2yBtty01mBDbuAmdu6hA04tblyvWVe29fXjhSdj+MF+G/ojxLGbnIpi/8/JLi4Nt # 6wAlqtlJzugJPVxEcziCAreX/vNcIruHMYHIFrhukYlrw9yBXYLC/+DTWB/WFcW4 # XH5BNv4mcROOxG9lHjETQuFmLekcFovlLmE2D/XgrXCg49lWGIa2Uc/IcRIjj6Je # ExYS3hEzvK4+FwRMYhFqEwX/2+6OdL9ZNhqlrvKb4p3+rKYkXgm23dHiFZoTa607 # elUlEACQq+xlicxgiXTVznjTT0goI2m8rBjwI1U48PsXvMr1CQBr6tps63CptkwC # 86CflWuL0ltI7vqC/o+uSy+lrDngvYwJeg4X5OSb3mamyX8tGGNvA5aQ5zfiIlXk # mJHeMMP7Yq+ApYo0m6gITbizUJ6yQpV32w6VJJ4/pg7FxhPDtjmx8Rlh/g2znPWe # YOsa5ybCCVM6/UWnN+Twbwz1lz/fjnujH95c # SIG # End signature block
combined_dataset/train/non-malicious/sample_47_49.ps1
sample_47_49.ps1
# # Module manifest for module 'OCI.PSModules.Nosql' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Nosql.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6350988d-a08e-4817-bfff-d79172f60809' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Nosql Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Nosql.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCINosqlIndex', 'Get-OCINosqlIndexesList', 'Get-OCINosqlRow', 'Get-OCINosqlTable', 'Get-OCINosqlTablesList', 'Get-OCINosqlTableUsageList', 'Get-OCINosqlWorkRequest', 'Get-OCINosqlWorkRequestErrorsList', 'Get-OCINosqlWorkRequestLogsList', 'Get-OCINosqlWorkRequestsList', 'Invoke-OCINosqlPrepareStatement', 'Invoke-OCINosqlQuery', 'Invoke-OCINosqlSummarizeStatement', 'Move-OCINosqlTableCompartment', 'New-OCINosqlIndex', 'New-OCINosqlReplica', 'New-OCINosqlTable', 'Remove-OCINosqlIndex', 'Remove-OCINosqlReplica', 'Remove-OCINosqlRow', 'Remove-OCINosqlTable', 'Remove-OCINosqlWorkRequest', 'Update-OCINosqlRow', 'Update-OCINosqlTable' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Nosql' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_59_32.ps1
sample_59_32.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="$basedir\..\..\..\..\..\[email protected]\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="$basedir/../../../../../[email protected]/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$env_node_path$pathsep$new_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../../../../../[email protected]/node_modules/rollup/dist/bin/rollup" $args } else { & "$basedir/node$exe" "$basedir/../../../../../[email protected]/node_modules/rollup/dist/bin/rollup" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../../../../../[email protected]/node_modules/rollup/dist/bin/rollup" $args } else { & "node$exe" "$basedir/../../../../../[email protected]/node_modules/rollup/dist/bin/rollup" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/1806.ps1
1806.ps1
Describe "Validate basic Variable provider cmdlets" -Tags "CI" { BeforeAll { $testVarName = "MyTestVarThatWontConflict" $testVarValue = 1234 $testVarDescription = "This is a test variable for provider test purposes." } BeforeEach { New-Variable -Name $testVarName -Value $testVarValue -Description $testVarDescription } AfterEach { Remove-Variable -Name $testVarName -ErrorAction SilentlyContinue } It "Verify Get-Item" { $result = Get-Item "Variable:${testVarName}" $result.Name | Should -Be $testVarName $result.Value | Should -Be $testVarValue } It "Verify New-Item" { $result = New-Item -Name "MyTestVariable" -Value 5 -Path "Variable:" $result.Name | Should -Be "MyTestVariable" $result.Value | Should -Be 5 } It "Verify Clear-Item" { $valueBefore = (Get-Item "Variable:${testVarName}").Value Clear-Item "Variable:${testVarName}" $valueAfter = (Get-Item "Variable:${testVarName}").Value $valueBefore | Should -Be $testVarValue $valueAfter | Should -BeNullOrEmpty } It "Verify Copy-Item" { Copy-Item -Path "Variable:${testVarName}" -Destination "Variable:${testVarName}_Copy" $original = Get-Item "Variable:${testVarName}" $copy = Get-Item "Variable:${testVarName}_Copy" $original.Name | Should -Be $testVarName $copy.Name | Should -Be "${testVarName}_Copy" $original.Value | Should -Be $copy.Value } It "Verify Remove-Item" { $existsBefore = Test-Path "Variable:${testVarName}" Remove-Item -Path "Variable:${testVarName}" $existsAfter = Test-Path "Variable:${testVarName}" $existsBefore | Should -BeTrue $existsAfter | Should -BeFalse } It "Verify Rename-Item" { $existsBefore = Test-Path "Variable:${testVarName}" Rename-Item -Path "Variable:${testVarName}" -NewName "${testVarName}_Rename" $existsAfter = Test-Path "Variable:${testVarName}" $result = Get-Item "Variable:${testVarName}_Rename" $existsBefore | Should -BeTrue $existsAfter | Should -BeFalse $result.Name | Should -Be "${testVarName}_Rename" $result.Value | Should -Be $testVarValue } } Describe "Validate basic negative test cases for Variable provider cmdlets" -Tags "Feature" { BeforeAll { $testVarName = "MyTestVarThatWontConflict" $testVarValue = 1234 $testVarDescription = "This is a test variable for provider test purposes." } BeforeEach { New-Variable -Name $testVarName -Value $testVarValue -Description $testVarDescription } AfterEach { Remove-Variable -Name $testVarName -ErrorAction SilentlyContinue } It "Verify Negative New-Item" { { New-Item -Name $testVarName -Value 5 -Path "Variable:" -ErrorAction Stop } | Should -Throw -ErrorId "Argument,Microsoft.PowerShell.Commands.NewItemCommand" } It "Verify Negative Move-Item" { $alreadyExistsVar = 2 { Move-Item -Path "Variable:${testVarName}" -Destination "Variable:alreadyExistsVar" -ErrorAction Stop } | Should -Throw -ErrorId "GetDynamicParametersException,Microsoft.PowerShell.Commands.MoveItemCommand" } It "Verify Negative Invoke-Item" { { Invoke-Item -Path "Variable:${testVarName}" -ErrorAction Stop } | Should -Throw -ErrorId "NotSupported,Microsoft.PowerShell.Commands.InvokeItemCommand" } It "Verify Negative Get-ItemPropertyValue" { { Get-ItemPropertyValue -Path "Variable:" -Name $testVarName -ErrorAction Stop } | Should -Throw -ErrorId "NotSupported,Microsoft.PowerShell.Commands.GetItemPropertyValueCommand" } }
combined_dataset/train/non-malicious/sample_62_90.ps1
sample_62_90.ps1
# # Module manifest for module 'OCI.PSModules.Autoscaling' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Autoscaling.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '98b2f4cc-21d0-4675-bf24-96c27b13f169' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Autoscaling Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Autoscaling.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAutoscalingConfiguration', 'Get-OCIAutoscalingConfigurationsList', 'Get-OCIAutoscalingPoliciesList', 'Get-OCIAutoscalingPolicy', 'Move-OCIAutoscalingConfigurationCompartment', 'New-OCIAutoscalingConfiguration', 'New-OCIAutoscalingPolicy', 'Remove-OCIAutoscalingConfiguration', 'Remove-OCIAutoscalingPolicy', 'Update-OCIAutoscalingConfiguration', 'Update-OCIAutoscalingPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Autoscaling' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_44_68.ps1
sample_44_68.ps1
pipeline { agent { kubernetes { inheritFrom 'docker-node' } } environment{ PROJECT = "vscode-plugin-for-sf" PUBLISHER = "QualityClouds" VS_PUBLISH_TOKEN = credentials("vs-publish-token") } stages { stage ('Install Dependencies') { steps { container('node') { sh 'npm install -g vsce --unsafe-perm=true --allow-root' sh 'npm install' sh 'chown -R $(id -u):$(id -g) ~/.npm' } } } stage ('Unit Testing') { steps { container('node') { sh 'echo "TODO"' } } } stage ('Quality Gate scan') { steps { container('node') { sh 'echo "TODO"' } } } stage ('Build Release') { steps { container('node') { sh 'vsce package' } } } stage ('Publish Release') { when { branch 'master' } steps { container('node') { sh "vsce publish -p $VS_PUBLISH_TOKEN" } } } } }
combined_dataset/train/non-malicious/Get-GPOSettings.ps1
Get-GPOSettings.ps1
<# .SYNOPSIS Get-GPOSettings .DESCRIPTION This script gets a list of all Group Policy Objects in the domain filtered on the value of GPOSettingName. For each GPO if the Extension Name matches GPOSettingName the Extensions are then reported back. .PARAMETER GPOSettingName The name of the GPO Setting you want to filter on. This can be viewed by using the GPO search function of the GPMC. .PARAMETER GPOSettingGuid The GUID of the GPOSettingName, the only way to determine this is to enable GPMC logging in the registry, and then grep the log file for the GPO Setting Name. .PARAMETER GPOComputerContext Any value other than $true will switch the script to evaluate the user policies. .EXAMPLE .\\Get-GPOSettings.ps1 Description ----------- The default syntax returns a list of Deployed Printer connections. .NOTES ScriptName: Get-GPOSettings.ps1 Created By: Jeff Patton Date Coded: August 18, 2011 ScriptName is used to register events for this script LogName is used to determine which classic log to write to This script relies on the Get-ADObject and Get-GPO cmdlet that are provided from the ActiveDirectory and GroupPolicy modules. .LINK http://scripts.patton-tech.com/wiki/PowerShell/Production/Get-GPOSettings .LINK http://www.ldap389.info/en/2010/09/17/powershell-search-settings-gpo-parameter-configuration-gpmc/ .LINK http://technet.microsoft.com/en-us/library/ee617198.aspx .LINK http://technet.microsoft.com/en-us/library/ee461059.aspx #> Param ( $GPOSettingName = "Deployed Printer Connections Policy", $GPOSettingGuid = "{8A28E2C5-8D06-49A4-A08C-632DAA493E17}", $GPOComputerContext = $true ) Begin { $ScriptName = $MyInvocation.MyCommand.ToString() $LogName = "Application" $ScriptPath = $MyInvocation.MyCommand.Path $Username = $env:USERDOMAIN + "\\" + $env:USERNAME New-EventLog -Source $ScriptName -LogName $LogName -ErrorAction SilentlyContinue $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nStarted: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message $GPOSettingGuid = "*$($GPOSettingGuid)*" $ErrorActionPreference = "Stop" # Dotsource in the functions you need. Try { Import-Module GroupPolicy Import-Module ActiveDirectory } Catch { Write-Warning "Must have the Active Directory and Group Policy cmdlets installed." Write-EventLog -LogName $LogName -Source $ScriptName -EventID "101" -EntryType "Error" -Message "RSAT installed?" Break } Switch ($GPOComputerContext) { $true { $GPOs = Get-ADObject -Filter {(ObjectClass -eq "groupPolicyContainer") -and (gPCMachineExtensionNames -like $GPOSettingGuid)} } Default { $GPOs = Get-ADObject -Filter {(ObjectClass -eq "groupPolicyContainer") -and (gPCUserExtensionNames -like $GPOSettingGuid)} } } } Process { If ($GPOs -ne $null) { $Report = @() foreach ($GPO in $GPOs) { [XML]$GPOReport = Get-GPOReport -Guid $GPO.Name -ReportType XML Try { Switch ($GPOComputerContext) { $true { foreach ($Extension in $GPOReport.GPO.Computer.ExtensionData) { if ($Extension.Name -eq $GPOSettingName) { $Settings = $Extension.Extension.ChildNodes } } If ($Settings -ne $null) { foreach ($Setting in $Settings) { $ReportItem = New-Object -TypeName PSObject -Property @{ Name = $GPOReport.GPO.Name GUID = $GPO.Name Setting = $Setting.InnerText } $Report += $ReportItem } } } Default { foreach ($Extension in $GPOReport.GPO.User.ExtensionData) { if ($Extension.Name -eq $GPOSettingName) { $Settings = $Extension.Extension.ChildNodes } } If ($Settings -ne $null) { foreach ($Setting in $Settings) { $ReportItem = New-Object -TypeName PSObject -Property @{ Name = $GPOReport.GPO.Name GUID = $GPO.Name Setting = $Setting.InnerText } $Report += $ReportItem } } } } } Catch { Write-Error $Error[0].Exception.InnerException.Message.ToString().Trim() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Error[0] } } } } End { $Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nFinished: " + (Get-Date).toString() Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message Return $Report }
combined_dataset/train/non-malicious/sample_23_31.ps1
sample_23_31.ps1
Describe "Test-EngineLibrary" { It "Calls Get-Date" { {Get-Date} | Should Not Throw } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAepXxxr54/3E+i # xZqMHSDHnhgmd0btMsUM/pLXYJo0EqCCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMOr0AxDn3l9rH/WdnSIxRgJ # RU7Xsknup0kFcJSJUmQlMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEANsY7PaaJqwe/K5iRohB0jkNeJIJr8W483AxiWLUP4SRPWDZgo9llY0ve # fN5tSWsi97iLJf4CA+3sRtTQtxJech2/TIDP3u+005UzejPIEQf18tah/XIu0rP9 # aG61INC88u4VcHYZIXIMZXIWF0rUqy6D++Kvo6tFQgn0Vt7/M6lLaR8c3bB0dWjo # AwyDGOgoQhyZawEOIxvFyIiJbFuSmvH9ChkGf3tx0Sid3xeGIfoaGDR0l+Ig5oDK # EU2zPEVzVhDKGvCOaFKgTPardX4l6QywUbbx2d7L6gsQGODopYdiX6dFPsclCyI7 # 6r50hABXsZKO5R2On5ljztKfDjz3oqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDK/83i/hJMddOoL1x3dGjWtczEjbduBYD3E506VY3OKAIGZVbIHl0Y # GBMyMDIzMTIwNTE4NDUyNC4zMzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAdIhJDFKWL8tEQABAAAB0jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MjFaFw0yNDAyMDExOTEyMjFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDcYIhC0QI/SPaT5+nYSBsSdhBPO2SXM40Vyyg8Fq1T # PrMNDzxChxWUD7fbKwYGSsONgtjjVed5HSh5il75jNacb6TrZwuX+Q2++f2/8CCy # u8TY0rxEInD3Tj52bWz5QRWVQejfdCA/n6ZzinhcZZ7+VelWgTfYC7rDrhX3TBX8 # 9elqXmISOVIWeXiRK8h9hH6SXgjhQGGQbf2bSM7uGkKzJ/pZ2LvlTzq+mOW9iP2j # cYEA4bpPeurpglLVUSnGGQLmjQp7Sdy1wE52WjPKdLnBF6JbmSREM/Dj9Z7okxRN # UjYSdgyvZ1LWSilhV/wegYXVQ6P9MKjRnE8CI5KMHmq7EsHhIBK0B99dFQydL1vd # uC7eWEjzz55Z/DyH6Hl2SPOf5KZ4lHf6MUwtgaf+MeZxkW0ixh/vL1mX8VsJTHa8 # AH+0l/9dnWzFMFFJFG7g95nHJ6MmYPrfmoeKORoyEQRsSus2qCrpMjg/P3Z9WJAt # FGoXYMD19NrzG4UFPpVbl3N1XvG4/uldo1+anBpDYhxQU7k1gfHn6QxdUU0TsrJ/ # JCvLffS89b4VXlIaxnVF6QZh+J7xLUNGtEmj6dwPzoCfL7zqDZJvmsvYNk1lcbyV # xMIgDFPoA2fZPXHF7dxahM2ZG7AAt3vZEiMtC6E/ciLRcIwzlJrBiHEenIPvxW15 # qwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCC2n7cnR3ToP/kbEZ2XJFFmZ1kkMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCw5iq0Ey0LlAdz2PcqchRwW5d+fitNISCv # qD0E6W/AyiTk+TM3WhYTaxQ2pP6Or4qOV+Du7/L+k18gYr1phshxVMVnXNcdjecM # tTWUOVAwbJoeWHaAgknNIMzXK3+zguG5TVcLEh/CVMy1J7KPE8Q0Cz56NgWzd9ur # G+shSDKkKdhOYPXF970Mr1GCFFpe1oXjEy6aS+Heavp2wmy65mbu0AcUOPEn+hYq # ijgLXSPqvuFmOOo5UnSV66Dv5FdkqK7q5DReox9RPEZcHUa+2BUKPjp+dQ3D4c9I # H8727KjMD8OXZomD9A8Mr/fcDn5FI7lfZc8ghYc7spYKTO/0Z9YRRamhVWxxrIsB # N5LrWh+18soXJ++EeSjzSYdgGWYPg16hL/7Aydx4Kz/WBTUmbGiiVUcE/I0aQU2U # /0NzUiIFIW80SvxeDWn6I+hyVg/sdFSALP5JT7wAe8zTvsrI2hMpEVLdStFAMqan # FYqtwZU5FoAsoPZ7h1ElWmKLZkXk8ePuALztNY1yseO0TwdueIGcIwItrlBYg1Xp # Pz1+pMhGMVble6KHunaKo5K/ldOM0mQQT4Vjg6ZbzRIVRoDcArQ5//0875jOUvJt # Yyc7Hl04jcmvjEIXC3HjkUYvgHEWL0QF/4f7vLAchaEZ839/3GYOdqH5VVnZrUIB # QB6DTaUILDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # ptLCZsE06NtmHQzB5F1TroFSBqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6RmpjTAiGA8yMDIzMTIwNTEzNTIx # M1oYDzIwMjMxMjA2MTM1MjEzWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpGamN # AgEAMAoCAQACAi6SAgH/MAcCAQACAhXMMAoCBQDpGvsNAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAASj0aCfrwl1IH94ikZJg7GycUXz9lGSsDPsviP7oEPr # hw1TkQGnthH5E7Zko8jRyTuWxDfsxyqJPa1+70uhcWD0gmElwDXuvhYOxGoBhUKT # YnnjxFaAMPXsQujz9kEAgHGAao8C7x6aPsdVQ9DspQFxDoVRlN69NWti2xgz2Pew # JdqpKIEdwQRUHAxxl8HWOk40F9Z2Xle3OnK3lPtXpWBJn5EYqmj/xn5f/Q9e3xNN # c74QoBKVG6qjS+X8lPnklgm+aqAGOFSPN1+R8u5UhcD0ivx2XJG/se0R1tYf+O+O # O1k+OfZ4nX29YCqMZ/zbkTdgf1u6YB0cs5jCgLtq3ysxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdIhJDFKWL8tEQABAAAB # 0jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCxOzc5B+xGOCySASUZWszJLT7W5vHWwL4IL4QffYFL # +jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMeAIJPf30i9ZbOExU557GwW # NaLH0Z5s65JFga2DeaROMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHSISQxSli/LREAAQAAAdIwIgQgHZV6pPkihTEoxiscUjlX6p61 # mDseC7IvJwSq2V2QTA4wDQYJKoZIhvcNAQELBQAEggIAPCoKuzEtl+Mb7a5YkfY+ # lldZR6mjpJjGtgQnsG6HQHbaXIm0HX6tpr9MaALTeA7TVCjg4SR/xc2RmcwU8B3H # 4ZpKYNQVyLFlSasirAn1nHw3Ba8y1Lv5LhStZOcxFx6Ly3+AOiR1m497SHzSwUxR # 1shimQCu+Fn923zrve0qh9zWp37zRrzbLQ14otyRCzlwYC0qHvTY0Lpj360AMrq7 # GN7Kzba2RY0h4dSIGXL7Yr3T4pqRGwiQHmmPLQIh/1jwOgvT2C42Lm0Oxefbpwpa # Re7ASdrLtWVj9VhXSGou08zH10ZNe8Y9C/+FDAQTN1gvEGogJFLrRwM2NHiRT+Uy # naOir7cwCqsFSLBA40tZDSh6WVLjpoHRTV/tE20EDCEcuFASl8FtYz9uXfKt9Qoo # B5rkBCBYAJeEkg/I50zyfaNrFIeJVP0rbclSbX/RWb3DhuoOocZPSte9EWDF/AZo # m+CDBUsDsMFp2fObCYgmk/Adz0lBqvKwXSpfoxGJi7B4BrDKh9DnptAK2IxQzTQx # NTeHS1vcsWM7eOd1MNWD11zW7HkkMBVj3uAg9508BQuHkJO4Jb5Jj5IoaAA0cjB1 # QTLEB34/R0wSlvUznqmbcmvvBl+YQJ1ncRAXj6tPElSgRCe6RxCn+xhy0xoWkShW # u1zNicW7h14mAVnMRpIVxRg= # SIG # End signature block
combined_dataset/train/non-malicious/sample_35_57.ps1
sample_35_57.ps1
# # Module manifest for module 'OCI.PSModules.Resourcemanager' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcemanager.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '73e0f641-602c-4457-9e79-f05b84ced282' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcemanager Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcemanager.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIResourcemanagerConfigurationSourceProvider', 'Get-OCIResourcemanagerConfigurationSourceProvidersList', 'Get-OCIResourcemanagerJob', 'Get-OCIResourcemanagerJobAssociatedResourcesList', 'Get-OCIResourcemanagerJobDetailedLogContent', 'Get-OCIResourcemanagerJobLogs', 'Get-OCIResourcemanagerJobLogsContent', 'Get-OCIResourcemanagerJobOutputsList', 'Get-OCIResourcemanagerJobsList', 'Get-OCIResourcemanagerJobTfConfig', 'Get-OCIResourcemanagerJobTfPlan', 'Get-OCIResourcemanagerJobTfState', 'Get-OCIResourcemanagerPrivateEndpoint', 'Get-OCIResourcemanagerPrivateEndpointsList', 'Get-OCIResourcemanagerReachableIp', 'Get-OCIResourcemanagerResourceDiscoveryServicesList', 'Get-OCIResourcemanagerStack', 'Get-OCIResourcemanagerStackAssociatedResourcesList', 'Get-OCIResourcemanagerStackResourceDriftDetailsList', 'Get-OCIResourcemanagerStacksList', 'Get-OCIResourcemanagerStackTfConfig', 'Get-OCIResourcemanagerStackTfState', 'Get-OCIResourcemanagerTemplate', 'Get-OCIResourcemanagerTemplateCategoriesList', 'Get-OCIResourcemanagerTemplateLogo', 'Get-OCIResourcemanagerTemplatesList', 'Get-OCIResourcemanagerTemplateTfConfig', 'Get-OCIResourcemanagerTerraformVersionsList', 'Get-OCIResourcemanagerWorkRequest', 'Get-OCIResourcemanagerWorkRequestErrorsList', 'Get-OCIResourcemanagerWorkRequestLogsList', 'Get-OCIResourcemanagerWorkRequestsList', 'Invoke-OCIResourcemanagerDetectStackDrift', 'Move-OCIResourcemanagerConfigurationSourceProviderCompartment', 'Move-OCIResourcemanagerPrivateEndpointCompartment', 'Move-OCIResourcemanagerStackCompartment', 'Move-OCIResourcemanagerTemplateCompartment', 'New-OCIResourcemanagerConfigurationSourceProvider', 'New-OCIResourcemanagerJob', 'New-OCIResourcemanagerPrivateEndpoint', 'New-OCIResourcemanagerStack', 'New-OCIResourcemanagerTemplate', 'Remove-OCIResourcemanagerConfigurationSourceProvider', 'Remove-OCIResourcemanagerPrivateEndpoint', 'Remove-OCIResourcemanagerStack', 'Remove-OCIResourcemanagerTemplate', 'Stop-OCIResourcemanagerJob', 'Update-OCIResourcemanagerConfigurationSourceProvider', 'Update-OCIResourcemanagerJob', 'Update-OCIResourcemanagerPrivateEndpoint', 'Update-OCIResourcemanagerStack', 'Update-OCIResourcemanagerTemplate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcemanager' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_64_6.ps1
sample_64_6.ps1
param( [string]$DataPath, ` [switch]$AcceptEula, ` [switch]$Trace, ` [switch]$Logs, ` [switch]$Activity, ` [switch]$Fwd, ` [switch]$FwdCli, ` [switch]$RemShell, ` [switch]$HTTPSYS, ` [switch]$WinHTTP, ` [switch]$CAPI, ` [switch]$Kerberos, ` [switch]$NTLM, ` [switch]$PKU2U, ` [switch]$Schannel, ` [switch]$EventLog, ` [switch]$WMI, ` [switch]$Network, ` [switch]$PerfMon, ` [switch]$Kernel ) $version = "WinRM-Collect (20230601)" $DiagVersion = "WinRM-Diag (20230515)" # by Gianni Bragante - [email protected] Function Write-Diag { param( [string] $msg ) $msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg Write-Host $msg $msg | Out-File -FilePath $diagfile -Append } Function WinRMTraceCapture { Invoke-CustomCommand ("logman create trace 'WinRM-Trace' -ow -o '" + $TracesDir + "\WinRM-Trace-$env:COMPUTERNAME.etl" + "' -p 'Microsoft-Windows-WinRM' 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets") Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{04C6E16D-B99F-4A3A-9B3E-B8325BBC781E}' 0xffffffffffffffff 0xff -ets" # Windows Remote Management Trace if (-not $Activity -or $Fwd) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{699E309C-E782-4400-98C8-E21D162D7B7B}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Forwarding Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B977CF02-76F6-DF84-CC1A-6A4B232322B6}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-EventCollector } if (-not $Activity -or $RemShell) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F1CAB2C0-8BEB-4FA2-90E1-8F17E0ACDD5D}' 0xffffffffffffffff 0xff -ets" # RemoteShellClient Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{03992646-3DFE-4477-80E3-85936ACE7ABB}' 0xffffffffffffffff 0xff -ets" # RemoteShell } Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{72B18662-744E-4A68-B816-8D562289A850}' 0xffffffffffffffff 0xff -ets" # Windows HTTP Services Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{DD5EF90A-6398-47A4-AD34-4DCECDEF795F}' 0xffffffffffffffff 0xff -ets" # HTTP Service Trace if ($HTTPSYS) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{F5344219-87A4-4399-B14A-E59CD118ABB8}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Http-SQM-Provider Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{08F93B14-1608-4A72-9CFA-457EECEDBBA7}' 0xffffffffffffffff 0xff -ets" # WebIo Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C42A2738-2333-40A5-A32F-6ACC36449DCC}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpLog Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7B6BC78C-898B-4170-BBF8-1A469EA43FC5}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-HttpEvent Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{20F61733-57F1-4127-9F48-4AB7A9308AE2}' 0xffffffffffffffff 0xff -ets" # HttpSysGuid Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1945E15-4933-460F-8103-AA611DDB663A}' 0xffffffffffffffff 0xff -ets" # HttpSysProvider } if (-not $Activity -or $WinHTTP) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{7D44233D-3055-4B9C-BA64-0D47CA40A232}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-WinHttp Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B3A7698A-0C45-44DA-B73D-E181C9B5C8E6}' 0xffffffffffffffff 0xff -ets" # WinHttp } if (-not $Activity -or $CAPI) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBCA4A8-B209-48DC-A8C7-B23D3E5216FB}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-CAPI2 } if (-not $Activity -or $Kerberos) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6B510852-3583-4E2D-AFFE-A67F9F223438}' 0xffffffffffffffff 0xff -ets" # Kerberos Authentication Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{BBA3ADD2-C229-4CDB-AE2B-57EB6966B0C4}' 0xffffffffffffffff 0xff -ets" # Kerberos Client Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{98E6CFCB-EE0A-41E0-A57B-622D4E1B30B1}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Security-Kerberos } if (-not $Activity -or $CredSSP) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6165F3E2-AE38-45D4-9B23-6B4818758BD9}' 0xffffffffffffffff 0xff -ets" # TSPkg } if (-not $Activity -or $NTLM) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{AC43300D-5FCC-4800-8E99-1BD3F85F0320}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-NTLM Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{C92CF544-91B3-4DC0-8E11-C580339A0BF8}' 0xffffffffffffffff 0xff -ets" # NTLM Security Protocol Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{5BBB6C18-AA45-49B1-A15F-085F7ED0AA90}' 0xffffffffffffffff 0xff -ets" # NTLM Authentication } if ($PKU2U) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{2A6FAF47-5449-4805-89A3-A504F3E221A6}' 0xffffffffffffffff 0xff -ets" # Pku2u Authentication Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B1108F75-3252-4B66-9239-80FD47E06494}' 0xffffffffffffffff 0xff -ets" # IdentityCommonLib Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{D93FE84A-795E-4608-80EC-CE29A96C8658}' 0xffffffffffffffff 0xff -ets" # IdentityListenerControlGuid Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{82C7D3DF-434D-44FC-A7CC-453A8075144E}' 0xffffffffffffffff 0xff -ets" # IDStore } if (-not $Activity -or $Schannel) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1F678132-5938-4686-9FDC-C8FF68F15C85}' 0xffffffffffffffff 0xff -ets" # Schannel Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{37D2C3CD-C5D4-4587-8531-4696C44244C8}' 0xffffffffffffffff 0xff -ets" # SchannelWppGuid } if ($FwdCli) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{9D11915C-C654-4D73-A6D6-591570E011A0}' 0xffffffffffffffff 0xff -ets" # EvtFwdrWpp Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{6FCDF39A-EF67-483D-A661-76D715C6B008}' 0xffffffffffffffff 0xff -ets" # ForwarderTrace } if ($FwdCli -or $EventLog) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{FC65DDD8-D6EF-4962-83D5-6E5CFE9CE148}' 0xffffffffffffffff 0xff -ets" # Microsoft-Windows-Eventlog Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{B0CA1D82-539D-4FB0-944B-1620C6E86231}' 0xffffffffffffffff 0xff -ets" # EventlogTrace } if ($WMI) { Invoke-CustomCommand "logman update trace 'WinRM-Trace' -p '{1418EF04-B0B4-4623-BF7E-D74AB47BBDAA}' 0xffffffffffffffff 0xff -ets" # WMI-Activity } if ($Network) { Invoke-CustomCommand ("netsh trace start capture=yes scenario=netconnection maxsize=2048 report=disabled tracefile='" + $TracesDir + "NETCAP-" + $env:COMPUTERNAME + ".etl'") } if ($Kernel) { Invoke-CustomCommand ("logman create trace 'NT Kernel Logger' -ow -o '" + $TracesDir + "\WinRM-Trace-kernel-$env:COMPUTERNAME.etl" + "' -p '{9E814AAD-3204-11D2-9A82-006008A86939}' 0x1 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 512 -ets") } if ($PerfMon) { Invoke-CustomCommand ("Logman create counter 'WinRM-Trace-PerfMon' -f bincirc -max 2048 -c '\Process(*)\*' '\Processor(*)\*' '\PhysicalDisk(*)\*' '\Event Tracing for Windows Session(EventLog-*)\Events Lost' '\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec' '\HTTP Service Request Queues(*)\*' -si 00:00:01 -o '" + $TracesDir + "WinRM-trace-$env:COMPUTERNAME.blg'") Invoke-CustomCommand ("logman start 'WinRM-Trace-PerfMon'") } Write-Log "Trace capture started" read-host "Press ENTER to stop the capture" Invoke-CustomCommand "logman stop 'WinRM-Trace' -ets" if ($Network) { Invoke-CustomCommand "netsh trace stop" } if ($Kernel) { Invoke-CustomCommand "logman stop 'NT Kernel Logger' -ets" } if ($PerfMon) { Invoke-CustomCommand ("logman stop 'WinRM-Trace-PerfMon'") Invoke-CustomCommand ("logman delete 'WinRM-Trace-PerfMon'") } Invoke-CustomCommand "tasklist /svc" -DestinationFile ("Traces\tasklist-$env:COMPUTERNAME.txt") } Function GetPlugins{ # This function is a contribution from Ga�tan Rabier param( [string] $WinRMPluginPath = "WSMan:\localhost\plugin" ) Write-Log ("Parsing plugins from path " + $WinRMPluginPath) $WinRMPlugins = Get-ChildItem $WinRMPluginPath foreach ($Plugin in $WinRMPlugins) { $PluginName = $Plugin.Name $PluginURIs = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources).Name $PluginDLL = (Get-ChildItem $WinRMPluginPath\$PluginName\Filename).Value $PluginName | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" DLL: " + $PluginDLL) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append foreach ($PluginURI in $PluginURIs) { $Capability = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Capability).Value $SecurityContainerName = (Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security).Name $SecurityContainer = Get-ChildItem $WinRMPluginPath\$PluginName\Resources\$PluginURI\Security\$SecurityContainerName $SecuritySddl = ($SecurityContainer |Where-Object {$_.Name -eq 'Sddl'}).Value $SecuritySddlConverted = (ConvertFrom-SddlString $SecuritySddl).DiscretionaryAcl $ResourceURI = ($SecurityContainer | Where-Object {$_.Name -eq 'ParentResourceUri'}).Value (" URI: " + $ResourceURI) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" Capabilities: " + $Capability) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append (" Security descriptor : " + $SecuritySddlConverted) | Out-File -FilePath ($resDir + "\Plugins.txt") -Append " " | Out-File -FilePath ($resDir + "\Plugins.txt") -Append Remove-Variable SecurityContainerName,SecurityContainer,ResourceURI,Capability,SecuritySddlConverted,SecuritySddl } } } Function EvtLogDetails { param( [string] $LogName ) Write-Log ("Collecting the details for the " + $LogName + " log") $cmd = "wevtutil gl " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append Write-Log ("Collecting the details for the " + $LogName + " log") $cmd = "wevtutil gli " + $logname + " >>""" + $resDir + "\EventLogs.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append "" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append if ($logname -ne "ForwardedEvents") { $evt = (Get-WinEvent -Logname $LogName -MaxEvents 1 -Oldest) "Oldest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append $evt = (Get-WinEvent -Logname $LogName -MaxEvents 1) "Newest " + $evt.TimeCreated + " (" + $evt.RecordID + ")" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append "" | Out-File -FilePath ($resDir + "\EventLogs.txt") -Append } } Function GetStore($store) { $certlist = Get-ChildItem ("Cert:\LocalMachine\" + $store) foreach ($cert in $certlist) { $EKU = "" foreach ($item in $cert.EnhancedKeyUsageList) { if ($item.FriendlyName) { $EKU += $item.FriendlyName + " / " } else { $EKU += $item.ObjectId + " / " } } $row = $tbcert.NewRow() foreach ($ext in $cert.Extensions) { if ($ext.oid.value -eq "2.5.29.14") { $row.SubjectKeyIdentifier = $ext.SubjectKeyIdentifier.ToLower() } elseif (($ext.oid.value -eq "2.5.29.35") -or ($ext.oid.value -eq "2.5.29.1")) { $asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData) $aki = $asn.Format($true).ToString().Replace(" ","") $aki = (($aki -split '\n')[0]).Replace("KeyID=","").Trim() $row.AuthorityKeyIdentifier = $aki } elseif (($ext.oid.value -eq "1.3.6.1.4.1.311.21.7") -or ($ext.oid.value -eq "1.3.6.1.4.1.311.20.2")) { $asn = New-Object Security.Cryptography.AsnEncodedData ($ext.oid,$ext.RawData) $tmpl = $asn.Format($true).ToString().Replace(" ","") $template = (($tmpl -split '\n')[0]).Replace("Template=","").Trim() $row.Template = $template } } if ($EKU) {$EKU = $eku.Substring(0, $eku.Length-3)} $row.Store = $store $row.Thumbprint = $cert.Thumbprint.ToLower() $row.Subject = $cert.Subject $row.Issuer = $cert.Issuer $row.NotAfter = $cert.NotAfter $row.EnhancedKeyUsage = $EKU $row.SerialNumber = $cert.SerialNumber.ToLower() $tbcert.Rows.Add($row) } } Function ChkCert($cert, $store, $descr) { $cert = $cert.ToLower() if ($cert) { if ("0123456789abcdef".Contains($cert[0])) { $aCert = $tbCert.Select("Thumbprint = '" + $cert + "' and $store") if ($aCert.Count -gt 0) { Write-Diag ("[INFO] The $descr certificate was found, the subject is " + $aCert[0].Subject) if (($aCert[0].NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The $descr certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The $descr certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } } else { Write-Diag "[ERROR] The certificate with thumbprint $cert was not found in $store" } } else { Write-Diag "[ERROR] Invalid character in the $cert certificate thumbprint $cert" } } else { Write-Diag "[ERROR] The thumbprint of $descr certificate is empty" } } Function GetSubVal { param( [string]$SubName, [string]$SubValue) $SubProp = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions\" + $SubName) | Get-ItemProperty) if ($SubProp.($SubValue)) { return $SubProp.($SubValue) } else { $cm = $SubProp.ConfigurationMode $subVal = (Get-Item -Path ("HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\ConfigurationModes\" + $cm) | Get-ItemProperty) return $SubVal.($SubValue) } } Function GetOwnerCim{ param( $prc ) $ret = Invoke-CimMethod -InputObject $prc -MethodName GetOwner return ($ret.Domain + "\" + $ret.User) } Function GetOwnerWmi{ param( $prc ) $ret = $prc.GetOwner() return ($ret.Domain + "\" + $ret.User) } $myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent() $myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID) $adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator if (-not $myWindowsPrincipal.IsInRole($adminRole)) { Write-Output "This script needs to be run as Administrator" exit } $global:Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path $resName = "WinRM-Results-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss) if ($DataPath) { if (-not (Test-Path $DataPath)) { Write-Host "The folder $DataPath does not exist" exit } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } if ($DataPath) { if (-not (Test-Path $DataPath)) { Write-Host "The folder $DataPath does not exist" exit } $global:resDir = $DataPath + "\" + $resName } else { $global:resDir = $global:Root + "\" + $resName } $diagfile = $global:resDir + "\WinRM-Diag.txt" $global:outfile = $global:resDir + "\script-output.txt" $global:errfile = $global:resDir + "\script-errors.txt" Import-Module ($global:Root + "\Collect-Commons.psm1") -Force -DisableNameChecking if (-not $Trace -and -not $Logs) { Write-Host "WinRM-Collect: a data collection tools for WinRM troubleshooting" Write-Host "" Write-Host "Usage:" Write-Host "WinRM-Collect -Logs" Write-Host " Collects dumps, logs, registry keys, command outputs" Write-Host "" Write-Host "WinRM-Collect -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]" Write-Host " Collects live trace" Write-Host "" Write-Host "WinRM-Collect -Logs -Trace [[-Activity][-Fwd][-RemShell][-HTTP][-CAPI][-Kerberos][-CredSSP][-NTLM][-Schannel]] [-FwdCli][-EventLog][-Network][-Kernel][-PerfMon]" Write-Host " Collects live trace then -Logs data" Write-Host "" Write-Host "Parameters for -Trace :" Write-Host " -Activity : Only trace WinRM basic log, less detailed and less noisy)" Write-Host " -Fwd : Event Log Forwarding (enabled by default without -Activity)" Write-Host " -RemShell : Remote Shell (enabled by default without -Activity)" Write-Host " -HTTPSYS : HTTP.SYS tracing" Write-Host " o If specified advanced HTTP.SYS tracing is enabled" Write-Host " o If not specified basic HTTP.SYS tracing is enabled" Write-Host " o With -Activity no HTTPS.SYS tracing, unless specified" Write-Host " -WinHTTP : WinHTTP (enabled by default without -Activity)" Write-Host " -CAPI : CAPI (enabled by default without -Activity)" Write-Host " -Kerberos : Kerberos (enabled by default without -Activity)" Write-Host " -CredSSP : CredSSP (enabled by default without -Activity)" Write-Host " -NTLM : NTLM (enabled by default without -Activity)" Write-Host " -Schannel : Schannel (enabled by default without -Activity)" Write-Host " -WMI : WMI activity" Write-Host "" Write-Host " -FwdCli : Additional client side treacing for EventLog forwarding" Write-Host " -EventLog : Event Log tracing (included in -FwdCli)" Write-Host " -Network : Network capture" Write-Host " -Kernel : Kernel Trace for process start and stop" Write-Host " -PerfMon : Performance counters" Write-Host "" exit } $RdrOut = " >>""" + $global:outfile + """" $RdrErr = " 2>>""" + $global:errfile + """" $fqdn = [System.Net.Dns]::GetHostByName(($env:computerName)).HostName $OSVer = ([environment]::OSVersion.Version.Major) + ([environment]::OSVersion.Version.Minor) /10 New-Item -itemtype directory -path $global:resDir | Out-Null Write-Log $version if ($AcceptEula) { Write-Log "AcceptEula switch specified, silently continuing" $eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 2 } else { $eulaAccepted = ShowEULAIfNeeded "WinRM-Collect" 0 if($eulaAccepted -ne "Yes") { Write-Log "EULA declined, exiting" exit } } Write-Log "EULA accepted, continuing" if ($Trace) { $TracesDir = $global:resDir + "\Traces\" New-Item -itemtype directory -path $TracesDir | Out-Null WinRMTraceCapture if (-not $Logs) { exit } } "Logman create counter FwdEvtPerf -o """ + $global:resDir + "\FwdEvtPerf.blg"" -f bin -v mmddhhmm -c ""\Process(*)\*"" ""\Processor(*)\*"" ""\PhysicalDisk(*)\*"" ""\Event Tracing for Windows Session(EventLog-*)\Events Lost"" ""\Event Tracing for Windows Session(EventLog-*)\Events Logged per sec"" ""\HTTP Service Request Queues(*)\*"" -si 00:00:01" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman start FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "timeout 60" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman stop FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii "Logman delete FwdEvtPerf" | Out-File -FilePath ($global:resDir + "\WEF-Perf.bat") -Append -Encoding ascii $cmd = $global:resDir + "\WEF-Perf.bat" Write-Log $cmd Start-Process $cmd -WindowStyle Minimized Write-Log "Retrieving WinRM configuration" $config = Get-ChildItem WSMan:\localhost\ -Recurse -ErrorAction Continue 2>>$global:errfile if (!$config) { Write-Log ("Cannot connect to localhost, trying with FQDN " + $fqdn) Connect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile $config = Get-ChildItem WSMan:\$fqdn -Recurse -ErrorAction Continue 2>>$global:errfile GetPlugins -WinRMPluginPath (WSMan:\$fqdn\Plugin) Disconnect-WSMan -ComputerName $fqdn -ErrorAction Continue 2>>$global:errfile } else { GetPlugins } $config | out-string -Width 500 | out-file -FilePath ($global:resDir + "\WinRM-config.txt") Write-Log "winrm get winrm/config" $cmd = "winrm get winrm/config >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "winrm e winrm/config/listener" $cmd = "winrm e winrm/config/listener >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "winrm enum winrm/config/service/certmapping" $cmd = "winrm enum winrm/config/service/certmapping >>""" + $global:resDir + "\WinRM-config.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Collecting dump of the svchost process hosting the WinRM service" $pidWinRM = FindServicePid "WinRM" if ($pidWinRM) { CreateProcDump $pidWinRM $global:resDir "svchost-WinRM" } Write-Log "Collecing the dumps of wsmprovhost.exe processes" $list = get-process -Name "wsmprovhost" -ErrorAction SilentlyContinue 2>>$global:errfile if (($list | Measure-Object).count -gt 0) { foreach ($proc in $list) { Write-Log ("Found wsmprovhost.exe with PID " + $proc.Id) CreateProcDump $proc.id $global:resDir } } else { Write-Log "No wsmprovhost.exe processes found" } if ($pidWinRM) { Write-Log ("The PID of the WinRM service is: " + $pidWinRM) $pidWEC = FindServicePid "WecSvc" if ($pidWEC) { Write-Log ("The PID of the WecSvc service is: " + $pidWEC) if ($pidWinRM -ne $pidWEC) { Write-Log "WinRM and WecSvc are not in the same process" CreateProcDump $pidWEC $global:resDir "scvhost-WEC" } } } Write-Log "Collecting dump of the SME.exe process" $proc = get-process "SME" -ErrorAction SilentlyContinue if ($proc) { Write-Log "Process SME.EXE found with PID $proc.id" CreateProcDump $proc.id $global:resDir } FileVersion -Filepath ($env:windir + "\system32\wsmsvc.dll") -Log $true FileVersion -Filepath ($env:windir + "\system32\pwrshplugin.dll") -Log $true if (Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions) { Write-Log "Retrieving subscriptions configuration" $cmd = "wecutil es 2>>""" + $global:errfile + """" Write-log $cmd $subList = Invoke-Expression $cmd if ($subList -gt "") { foreach($sub in $subList) { Write-Log "Subscription: " + $sub ("Subscription: " + $sub) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append "-----------------------" | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append $cmd = "wecutil gs """ + $sub + """ /f:xml" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append $cmd = "wecutil gr """ + $sub + """" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append " " | out-file -FilePath ($global:resDir + "\Subscriptions.txt") -Append } } } Write-Log "Listing members of Event Log Readers group" $cmd = "net localgroup ""Event Log Readers"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append if ($OSVer -le 6.3) { Write-Log "Listing members of WinRMRemoteWMIUsers__ group" $cmd = "net localgroup ""WinRMRemoteWMIUsers__"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } else { Write-Log "Listing members of Remote Management Users group" $cmd = "net localgroup ""Remote Management Users"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } Write-Log "Listing members of Windows Admin Center CredSSP Administrators group" $cmd = "net localgroup ""Windows Admin Center CredSSP Administrators"" >>""" + $global:resDir + "\Groups.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append (" ") | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append ($group + " = " + $strSID) | Out-File -FilePath ($global:resDir + "\Groups.txt") -Append Write-Log "Getting the output of WHOAMI /all" $cmd = "WHOAMI /all >>""" + $global:resDir + "\WHOAMI.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Get-Culture output" "Get-Culture" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-Culture | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Exporting registry key HKEY_USERS\S-1-5-20\Control Panel\International" $cmd = "reg export ""HKEY_USERS\S-1-5-20\Control Panel\International"" """ + $global:resDir + "\InternationalNetworkService.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Get-WinSystemLocale output" "Get-WinSystemLocale" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinSystemLocale | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinHomeLocation output" "Get-WinHomeLocation" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinHomeLocation | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinUILanguageOverride output" "Get-WinUILanguageOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinUILanguageOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinUserLanguageList output" "Get-WinUserLanguageList" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinUserLanguageList | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinAcceptLanguageFromLanguageListOptOut output" "Get-WinAcceptLanguageFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinAcceptLanguageFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinCultureFromLanguageListOptOut output" "Get-Get-WinCultureFromLanguageListOptOut" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinCultureFromLanguageListOptOut | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinDefaultInputMethodOverride output" "Get-WinDefaultInputMethodOverride" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinDefaultInputMethodOverride | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-WinLanguageBarOption output" "Get-WinLanguageBarOption" | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Get-WinLanguageBarOption | Out-File -FilePath ($global:resDir + "\LanguageInfo.txt") -Append Write-Log "Get-NetConnectionProfile output" Get-NetConnectionProfile | Out-File -FilePath ($global:resDir + "\NetConnectionProfile.txt") -Append Write-Log "Get-WSManCredSSP output" Get-WSManCredSSP | Out-File -FilePath ($global:resDir + "\WSManCredSSP.txt") -Append Write-Log "Exporting firewall rules" $cmd = "netsh advfirewall firewall show rule name=all >""" + $global:resDir + "\FirewallRules.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Invoke-CustomCommand -Command "netstat -anob" -DestinationFile "netstat.txt" Invoke-CustomCommand -Command "ipconfig /all" -DestinationFile "ipconfig.txt" Invoke-CustomCommand -Command "auditpol /get /category:*" -DestinationFile "auditpol.txt" Write-Log "Copying hosts and lmhosts" if (Test-path -path C:\Windows\system32\drivers\etc\hosts) { Copy-Item C:\Windows\system32\drivers\etc\hosts $global:resDir\hosts.txt -ErrorAction Continue 2>>$global:errfile } if (Test-Path -Path C:\Windows\system32\drivers\etc\lmhosts) { Copy-Item C:\Windows\system32\drivers\etc\lmhosts $global:resDir\lmhosts.txt -ErrorAction Continue 2>>$global:errfile } $dir = $env:windir + "\system32\logfiles\HTTPERR" if (Test-Path -path $dir) { $last = Get-ChildItem -path ($dir) | Sort-Object CreationTime -Descending | Select-Object Name -First 1 Copy-Item ($dir + "\" + $last.name) $global:resDir\httperr.log -ErrorAction Continue 2>>$global:errfile } Write-Log "WinHTTP proxy configuration" $cmd = "netsh winhttp show proxy >""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "NSLookup WPAD" "------------------" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append "NSLookup WPAD" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append "" | Out-File -FilePath ($global:resDir + "\WinHTTP-Proxy.txt") -Append $cmd = "nslookup wpad >>""" + $global:resDir + "\WinHTTP-Proxy.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WinRM """ + $global:resDir + "\WinRM.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WSMAN """+ $global:resDir + "\WSMAN.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\Software\Policies\Microsoft\Windows\WinRM) { Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM" $cmd = "reg export HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM """+ $global:resDir + "\WinRM-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "The registry key HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRM is not present" } Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System """+ $global:resDir + "\System-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector """+ $global:resDir + "\EventCollector.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\EventForwarding """+ $global:resDir + "\EventForwarding.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\EventLog """+ $global:resDir + "\EventLog-Policies.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL """+ $global:resDir + "\SCHANNEL.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Cryptography """+ $global:resDir + "\Cryptography.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Cryptography """+ $global:resDir + "\Cryptography-Policy.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa" $cmd = "reg export HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa """+ $global:resDir + "\LSA.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP" $cmd = "reg export HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\HTTP """+ $global:resDir + "\HTTP.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials) { Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials" $cmd = "reg export HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials """+ $global:resDir + "\AllowFreshCredentials.reg.txt"" /y" + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "The registry key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CredentialsDelegation\AllowFreshCredentials is not present" } Export-EventLog "System" Export-EventLog "Application" Export-EventLog "Microsoft-Windows-CAPI2/Operational" Export-EventLog "Microsoft-Windows-WinRM/Operational" Export-EventLog "Microsoft-Windows-EventCollector/Operational" Export-EventLog "Microsoft-Windows-Forwarding/Operational" Export-EventLog "Microsoft-Windows-PowerShell/Operational" Export-EventLog "Windows PowerShell" Export-EventLog "PowerShellCore/Operational" Export-EventLog "Microsoft-Windows-GroupPolicy/Operational" Export-EventLog "Microsoft-Windows-Kernel-EventTracing/Admin" Export-EventLog "Microsoft-ServerManagementExperience" Export-EventLog "Microsoft-Windows-ServerManager-ConfigureSMRemoting/Operational" Export-EventLog "Microsoft-Windows-ServerManager-DeploymentProvider/Operational" Export-EventLog "Microsoft-Windows-ServerManager-MgmtProvider/Operational" Export-EventLog "Microsoft-Windows-ServerManager-MultiMachine/Operational" Export-EventLog "Microsoft-Windows-FileServices-ServerManager-EventProvider/Operational" EvtLogDetails "Application" EvtLogDetails "System" EvtLogDetails "Security" EvtLogDetails "ForwardedEvents" Write-Log "Autologgers configuration" Get-AutologgerConfig -Name EventLog-ForwardedEvents -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-System -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-Security -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append Get-AutologgerConfig -Name EventLog-Application -ErrorAction SilentlyContinue | Out-File -FilePath ($global:resDir + "\AutoLoggersConfiguration.txt") -Append if ($OSVer -gt 6.1 ) { Write-Log "Copying ServerManager configuration" copy-item $env:APPDATA\Microsoft\Windows\ServerManager\ServerList.xml $global:resDir\ServerList.xml -ErrorAction Continue 2>>$global:errfile Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache" $cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\ServicingStorage\ServerComponentCache"" """ + $global:resDir + "\ServerComponentCache.reg.txt"" /y " + $RdrOut + $RdrErr Write-Log $cmd Invoke-Expression $cmd } Write-Log "Get-Module output" Get-Module -ListAvailable | Out-File -FilePath ($global:resDir + "\Get-Module.txt") Write-Log "Exporting netsh http settings" $cmd = "netsh http show sslcert >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show urlacl >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show servicestate >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "netsh http show iplisten >>""" + $global:resDir + "\netsh-http.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd if (Test-Path HKLM:\SOFTWARE\Microsoft\InetStp) { Write-Log "Exporting IIS configuration" $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list app >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list apppool >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list site >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list module >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list wp >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list vdir >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = $env:SystemRoot + "\system32\inetsrv\APPCMD list config >>""" + $global:resDir + "\iisconfig.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd } else { Write-Log "IIS is not installed" } if (Test-Path -Path ($env:windir + "\System32\inetsrv\Config\ApplicationHost.config")) { Write-Log "IIS ApplicationHost.config" Copy-Item "C:\Windows\System32\inetsrv\Config\ApplicationHost.config" ($global:resDir + "\ApplicationHost.config") } $cmd = "setspn -L " + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q HTTP/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching HTTP/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q HTTP/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $env:computername + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $fqdn + " in the domain" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $env:computername + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q WSMAN/" + $env:computername + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append "Searching WSMAN/" + $fqdn + " in the forest" | Out-File ($global:resDir + "\SPN.txt") -Append $cmd = "setspn -F -Q WSMAN/" + $fqdn + " >>""" + $global:resDir + "\SPN.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd " " | Out-File ($global:resDir + "\SPN.txt") -Append Write-Log "Collecting certificates details" $cmd = "Certutil -verifystore -v MY > """ + $global:resDir + "\Certificates-My.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "Certutil -verifystore -v ROOT > """ + $global:resDir + "\Certificates-Root.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $cmd = "Certutil -verifystore -v CA > """ + $global:resDir + "\Certificates-Intermediate.txt""" + $RdrErr Write-Log $cmd Invoke-Expression $cmd $tbCert = New-Object system.Data.DataTable $col = New-Object system.Data.DataColumn Store,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Thumbprint,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Subject,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Issuer,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn NotAfter,([DateTime]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn IssuerThumbprint,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn EnhancedKeyUsage,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn SerialNumber,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn SubjectKeyIdentifier,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn AuthorityKeyIdentifier,([string]); $tbCert.Columns.Add($col) $col = New-Object system.Data.DataColumn Template,([string]); $tbCert.Columns.Add($col) GetStore "My" GetStore "CA" GetStore "Root" Write-Log "Matching issuer thumbprints" $aCert = $tbCert.Select("Store = 'My' or Store = 'CA'") foreach ($cert in $aCert) { $aIssuer = $tbCert.Select("SubjectKeyIdentifier = '" + ($cert.AuthorityKeyIdentifier).tostring() + "'") if ($aIssuer.Count -gt 0) { $cert.IssuerThumbprint = ($aIssuer[0].Thumbprint).ToString() } } $tbcert | Export-Csv ($global:resDir + "\certificates.tsv") -noType -Delimiter "`t" Write-Log "PowerShell version" $PSVersionTable | Out-File -FilePath ($global:resDir + "\PSVersion.txt") -Append Write-Log "Collecting details about running processes" if (ListProcsAndSvcs) { CollectSystemInfoWMI ExecQuery -Namespace "root\cimv2" -Query "select * from Win32_Product" | Sort-Object Name | Format-Table -AutoSize -Property Name, Version, Vendor, InstallDate | Out-String -Width 400 | Out-File -FilePath ($global:resDir + "\products.txt") Write-Log "Collecting the list of installed hotfixes" Get-HotFix -ErrorAction SilentlyContinue 2>>$global:errfile | Sort-Object -Property InstalledOn -ErrorAction Ignore | Out-File $global:resDir\hotfixes.txt Write-Log "Collecing GPResult output" $cmd = "gpresult /h """ + $global:resDir + "\gpresult.html""" + $RdrErr write-log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append $cmd = "gpresult /r >""" + $global:resDir + "\gpresult.txt""" + $RdrErr Write-Log $cmd Invoke-Expression ($cmd) | Out-File -FilePath $global:outfile -Append } else { Write-Log "WMI is not working" $proc = Get-Process | Where-Object {$_.Name -ne "Idle"} $proc | Format-Table -AutoSize -property id, name, @{N="WorkingSet";E={"{0:N0}" -f ($_.workingset/1kb)};a="right"}, @{N="VM Size";E={"{0:N0}" -f ($_.VirtualMemorySize/1kb)};a="right"}, @{N="Proc time";E={($_.TotalProcessorTime.ToString().substring(0,8))}}, @{N="Threads";E={$_.threads.count}}, @{N="Handles";E={($_.HandleCount)}}, StartTime, Path | Out-String -Width 300 | Out-File -FilePath ($global:resDir + "\processes.txt") CollectSystemInfoNoWMI } Write-Diag ("[INFO] " + $DiagVersion) # Diag start function New-UrlAcl { New-Object psobject -Property @{ Protocol = '' Host = '' Port = 0 Path = '' Url = '' Users = @() } } function New-UrlAclUser { New-Object psobject -Property @{ Name = '' Listen = $false Delegate = $false SSDL = '' } } function Get-UrlAcl { # Taken from https://www.powershellgallery.com/packages/HttpSys/1.0.1/Content/Get-UrlAcl.ps1 and modified to also run on PowerShell 4 [CmdletBinding()] param( [parameter(Position=0)] [string]$Url, [parameter()] [int[]]$Port, [string]$HostName, [string]$Protocol ) $cmd = "netsh http show urlacl" if (-not [string]::IsNullOrWhiteSpace($Url)){ $cmd += " url=$Url" } $result = Invoke-Expression $cmd $result = $result | Select-Object -Skip 4 $items = @() $item = New-UrlAcl $user = New-UrlAclUser for ($i = 0; $i -lt $result.Length; $i++){ $line = $result[$i] if ([string]::IsNullOrWhiteSpace($line)){ continue; } $splitIndex = $line.IndexOf(": "); $key = $line.Substring(0,$splitIndex).Trim(); $value = $line.Substring($splitIndex + 2); if ($key -eq "Reserved Url"){ $item = New-UrlAcl $protocolSplitIndex = $value.IndexOf("://"); $item.Protocol = $value.Substring(0, $protocolSplitIndex) $remainder = $value.Substring($protocolSplitIndex + 3) $pathSplitIndex = $remainder.IndexOf("/") $hostDetails = $remainder.Substring(0, $pathSplitIndex) $hostParts = $hostDetails.Split(':') $item.Host = $hostParts[0] $item.Port = $hostParts[1] $item.Path = $remainder.Substring($pathSplitIndex) $item.Url = $value $items += $item } if ($key -eq "User"){ $user = New-UrlAclUser $user.Name = $value $item.Users += $user } if ($key -eq "Listen"){ $user.Listen = if ($value -eq "Yes") { $true } else { $false } } if ($key -eq "Delegate"){ $user.Delegate = if ($value -eq "Yes") { $true } else { $false } } if ($key -eq "SDDL"){ $user.SSDL = $value } } if (-not [string]::IsNullOrWhiteSpace($HostName)){ $items = $items | Where-Object { $_.Host -eq $HostName } } if (-not [string]::IsNullOrWhiteSpace($Protocol)){ $items = $items | Where-Object { $_.Protocol -eq $Protocol } } if ($null -ne $Port){ if ($Port -isnot [System.Array]){ $Port = @($Port) } if ($Port.Length -ge 0){ $items = $items | Where-Object { $Port -contains $_.Port } } } return $items } Write-Diag "Retrieving URLACL information" $urlACL = Get-UrlAcl Write-Diag "[INFO] Checking HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel\ClientAuthTrustMode" $ClientAuthTrustMode = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\Schannel" | Select-Object -ExpandProperty "ClientAuthTrustMode" -ErrorAction SilentlyContinue) if ($ClientAuthTrustMode -eq $null -or $ClientAuthTrustMode -eq 0) { Write-Diag "[WARNING] 0 Machine Trust (default) - Requires that the client certificate is issued by a certificate in the Trusted Issuers list." } elseif ($ClientAuthTrustMode -eq 1) { Write-Diag "[WARNING] 1 Exclusive Root Trust - Requires that a client certificate chains to a root certificate contained in the caller-specified trusted issuer store. The certificate must also be issued by an issuer in the Trusted Issuers list" } elseif ($ClientAuthTrustMode -eq 2) { Write-Diag "[INFO] 2 Exclusive CA Trust - Requires that a client certificate chain to either an intermediate CA certificate or root certificate in the caller-specified trusted issuer store." } else { Write-Diag ("[ERROR] Invalid value " + $ClientAuthTrustMode) } $OSVer = [environment]::OSVersion.Version.Major + [environment]::OSVersion.Version.Minor * 0.1 $subDom = $false $subWG = $false $Subscriptions = Get-ChildItem -Path HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\EventCollector\Subscriptions foreach ($sub in $Subscriptions) { Write-Diag ("[INFO] Found subscription " + $sub.PSChildname) $SubProp = ($sub | Get-ItemProperty) Write-Diag ("[INFO] SubscriptionType = " + $SubProp.SubscriptionType + ", ConfigurationMode = " + $SubProp.ConfigurationMode) Write-Diag ("[INFO] MaxLatencyTime = " + (GetSubVal $sub.PSChildname "MaxLatencyTime") + ", HeartBeatInterval = " + (GetSubVal $sub.PSChildname "HeartBeatInterval")) $logFile = (GetSubVal $sub.PSChildname "LogFile") if ($logFile -ne "ForwardedEvents") { Write-Diag ("[WARNING] LogFile = " + $logFile + ", this is a CUSTOM LOG") } else { Write-Diag ("[INFO] LogFile = " + $logFile) } if ($SubProp.AllowedSourceDomainComputers) { Write-Diag "[INFO] AllowedSourceDomainComputers" $ACL = (FindSep -FindIn $SubProp.AllowedSourceDomainComputers -Left ":P" -Right ")S:").replace(")(", ",").Split(",") foreach ($ACE in $ACL) { $SID = FindSep -FindIn $ACE -left ";;;" $objSID = New-Object System.Security.Principal.SecurityIdentifier($SID) $group = $objSID.Translate( [System.Security.Principal.NTAccount]).Value Write-Diag "[INFO] $group ($SID)" } } if ($SubProp.Locale) { if ($SubProp.Locale -eq "en-US") { Write-Diag "[INFO] The subscription's locale is set to en-US" } else { Write-Diag ("[WARNING] The subscription's locale is set to " + $SubProp.Locale) } } else { Write-Diag "[INFO] The subscription's locale is not set, the default locale will be used." } if ($SubProp.AllowedSubjects) { $subWG = $true Write-Diag "[INFO] Listed non-domain computers:" $list = $SubProp.AllowedSubjects -split "," foreach ($item in $list) { Write-Diag ("[INFO] " + $item) } } else { Write-Diag "[INFO] No non-domain computers listed, that's ok if this is not a collector in workgroup environment" } if ($SubProp.AllowedIssuerCAs) { $subWG = $true Write-Diag "[INFO] Listed Issuer CAs:" $list = $SubProp.AllowedIssuerCAs -split "," foreach ($item in $list) { Write-Diag ("[INFO] " + $item) ChkCert -cert $item -store "(Store = 'CA' or Store = 'Root')" -descr "Issuer CA" } } else { Write-Diag "[INFO] No Issuer CAs listed, that's ok if this is not a collector in workgroup environment" } $RegKey = (($sub.Name).replace("HKEY_LOCAL_MACHINE\","HKLM:\") + "\EventSources") if (Test-Path -Path $RegKey) { $sources = Get-ChildItem -Path $RegKey if ($sources.Count -gt 4000) { Write-Diag ("[WARNING] There are " + $sources.Count + " sources for this subscription") } else { Write-Diag ("[INFO] There are " + $sources.Count + " sources for this subscription") } } else { Write-Diag ("[INFO] No sources found for the subscription " + $sub.Name) } } if ($Subscriptions) { $EventLost = (Get-Counter "\\$env:computername\Event Tracing for Windows Session(EventLog-ForwardedEvents)\Events Lost").CounterSamples[0].CookedValue if ($EventLost -gt 100) { Write-Diag ("[WARNING] " + $EventLost + " events lost for EventLog-ForwardedEvents") } else { Write-Diag ("[INFO] " + $EventLost + " events lost for EventLog-ForwardedEvents") } } if ($OSVer -gt 6.1) { Write-Diag "[INFO] Retrieving machine's IP addresses" $iplist = Get-NetIPAddress } $pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpCompatibilityListener -ErrorAction SilentlyContinue if ($pol) { if ($pol.HttpCompatibilityListener -eq 1) { Write-Diag ("[WARNING] HTTP Compatibility listener (port 80) is enabled") } } $pol = Get-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WinRM\Service -Name HttpsCompatibilityListener -ErrorAction SilentlyContinue if ($pol) { if ($pol.HttpsCompatibilityListener -eq 1) { Write-Diag ("[WARNING] HTTPS Compatibility listener (port 443) is enabled") } } Write-Diag "[INFO] Browsing listeners" $HTTPListenerFound = $false $listeners = Get-ChildItem WSMan:\localhost\Listener foreach ($listener in $listeners) { Write-Diag ("[INFO] Inspecting listener " + $listener.Name) $prop = Get-ChildItem $listener.PSPath if ($listener.keys[0] -eq "Transport=HTTP") { $HTTPListenerFound = $true } foreach ($value in $prop) { if ($value.Name -eq "CertificateThumbprint") { if ($listener.keys[0].Contains("HTTPS")) { $HTTPSListenerFound = $true Write-Diag "[INFO] Found HTTPS listener" $listenerThumbprint = $value.Value.ToLower() Write-Diag "[INFO] Found listener certificate $listenerThumbprint" if ($listenerThumbprint) { ChkCert -cert $listenerThumbprint -descr "listener" -store "Store = 'My'" } } } if ($value.Name.Contains("ListeningOn")) { $ip = ($value.value).ToString() Write-Diag "[INFO] Listening on $ip" if ($OSVer -gt 6.1) { if (($iplist | Where-Object {$_.IPAddress -eq $ip } | measure-object).Count -eq 0 ) { Write-Diag "[ERROR] IP address $ip not found" } } } } } if ($HTTPListenerFound) { Write-Diag ("[INFO] HTTP listener found") $HTTPURLACL = ($urlACL | Where-Object Port -eq 5985) if ($HTTPURLACL) { Write-Diag "[INFO] URLACL for port 5985 is present" if ($HTTPURLACL.Protocol -ne "http") { Write-Diag ("[ERROR] The protocol for port 5985 is not HTTP (" + $HTTPURLACL.Protocol + ")") } if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") { Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5985") } else { Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5985") } if ($HTTPURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") { Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5985") } else { Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5985") } } else { Write-Diag "[ERROR] HTTP Listener found but URLACL for port 5985 is missing" } } else { Write-Diag ("[ERROR] The HTTP listener is missing") } if ($HTTPSListenerFound) { Write-Diag ("[INFO] HTTP listener found") $HTTPSURLACL = ($urlACL | Where-Object Port -eq 5986) if ($HTTPSURLACL) { Write-Diag "[INFO] URLACL for port 5986 is present" if ($HTTPSURLACL.Protocol -ne "https") { Write-Diag ("[ERROR] The protocol for port 5986 is not HTTPS (" + $HTTPSURLACL.Protocol + ")") } if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\WinRM") { Write-Diag ("[INFO] NT SERVICE\WinRM has permissions on port 5986") } else { Write-Diag ("[ERROR] NT SERVICE\WinRM is missing permissions on port 5986") } if ($HTTPSURLACL.Users | Where-Object Name -eq "NT SERVICE\Wecsvc") { Write-Diag ("[INFO] NT SERVICE\Wecsvc has permissions on port 5986") } else { Write-Diag ("[ERROR] NT SERVICE\Wecsvc is missing permissions on port 5986") } } else { Write-Diag "[ERROR] HTTPS Listener found but URLACL for port 5986 is missing" } } $svccert = Get-Item WSMan:\localhost\Service\CertificateThumbprint if ($svccert.value ) { Write-Diag ("[INFO] The Service Certificate thumbprint is " + $svccert.value) ChkCert -cert $svccert.value -descr "Service" -store "Store = 'My'" } $remoteaccess = Get-Item WSMan:\localhost\Service\AllowRemoteAccess if ($remoteaccess.Value -eq "true") { Write-Diag "[INFO] AllowRemoteAccess = true" } elseif ($remoteaccess.Value -eq "false") { Write-Diag "[ERROR] AllowRemoteAccess = false, this machine will not accept remote WinRM connections" } else { Write-Diag "[ERROR] AllowRemoteAccess has an invalid value" } $ipfilter = Get-Item WSMan:\localhost\Service\IPv4Filter if ($ipfilter.Value) { if ($ipfilter.Value -eq "*") { Write-Diag "[INFO] IPv4Filter = *" } else { Write-Diag ("[WARNING] IPv4Filter = " + $ipfilter.Value) } } else { Write-Diag ("[WARNING] IPv4Filter is empty, WinRM will not listen on IPv4") } $ipfilter = Get-Item WSMan:\localhost\Service\IPv6Filter if ($ipfilter.Value) { if ($ipfilter.Value -eq "*") { Write-Diag "[INFO] IPv6Filter = *" } else { Write-Diag ("[WARNING] IPv6Filter = " + $ipfilter.Value) } } else { Write-Diag ("[WARNING] IPv6Filter is empty, WinRM will not listen on IPv6") } if (Test-Path -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager") { $isForwarder = $True $MaxFwd = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding').MaxForwardingRate if ($MaxFwd) { Write-Diag ("[ERROR] HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\MaxForwardingRate is set to " + $MaxFwd + ". This functionality is broken, see Bug 33554568. Remove the setting Configure Forwarder Resource Usage from the GPO to avoid performance issues") } $RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager') Write-Diag "[INFO] Enumerating SubscriptionManager URLs at HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding\SubscriptionManager" $RegKey.PSObject.Properties | ForEach-Object { If($_.Name -notlike '*PS*'){ Write-Diag ("[INFO] " + $_.Name + " " + $_.Value) $IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right ",").ToLower() if (-not $IssuerCA) { $IssuerCA = (FindSep -FindIn $_.Value -Left "IssuerCA=" -Right "").ToLower() } if ($IssuerCA) { if ("0123456789abcdef".Contains($IssuerCA[0])) { Write-Diag ("[INFO] Found issuer CA certificate thumbprint " + $IssuerCA) $aCert = $tbCert.Select("Thumbprint = '" + $IssuerCA + "' and (Store = 'CA' or Store = 'Root')") if ($aCert.Count -eq 0) { Write-Diag "[ERROR] The Issuer CA certificate was not found in CA or Root stores" } else { Write-Diag ("[INFO] Issuer CA certificate found in store " + $aCert[0].Store + ", subject = " + $aCert[0].Subject) if (($aCert[0].NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The Issuer CA certificate will expire on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The Issuer CA certificate expired on " + $aCert[0].NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } } $aCliCert = $tbCert.Select("IssuerThumbprint = '" + $IssuerCA + "' and Store = 'My'") if ($aCliCert.Count -eq 0) { Write-Diag "[ERROR] Cannot find any certificate issued by this Issuer CA" } else { if ($PSVersionTable.psversion.ToString() -ge "3.0") { Write-Diag "[INFO] Listing available client certificates from this IssuerCA" $num = 0 foreach ($cert in $aCliCert) { if ($cert.EnhancedKeyUsage.Contains("Client Authentication")) { Write-Diag ("[INFO] Found client certificate " + $cert.Thumbprint + " " + $cert.Subject) if (($Cert.NotAfter) -gt (Get-Date)) { Write-Diag ("[INFO] The client certificate will expire on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } else { Write-Diag ("[ERROR] The client certificate expired on " + $cert.NotAfter.ToString("yyyyMMdd HH:mm:ss.fff") ) } $certobj = Get-Item ("CERT:\Localmachine\My\" + $cert.Thumbprint) $keypath = [io.path]::combine("$env:ProgramData\microsoft\crypto\rsa\machinekeys", $certobj.privatekey.cspkeycontainerinfo.uniquekeycontainername) if ([io.file]::exists($keypath)) { $acl = ((get-acl -path $keypath).Access | Where-Object {$_.IdentityReference -eq "NT AUTHORITY\NETWORK SERVICE"}) if ($acl) { $rights = $acl.FileSystemRights.ToString() if ($rights.contains("Read") -or $rights.contains("FullControl") ) { Write-Diag ("[INFO] The NETWORK SERVICE account has permissions on the private key of this certificate: " + $rights) } else { Write-Diag ("[ERROR] Incorrect permissions for the NETWORK SERVICE on the private key of this certificate: " + $rights) } } else { Write-Diag "[ERROR] Missing permissions for the NETWORK SERVICE account on the private key of this certificate" } } else { Write-Diag "[ERROR] Cannot find the private key" } $num++ } } if ($num -eq 0) { Write-Diag "[ERROR] Cannot find any client certificate issued by this Issuer CA" } elseif ($num -gt 1) { Write-Diag "[WARNING] More than one client certificate issued by this Issuer CA, the first certificate will be used by WinRM" } } } } else { Write-Diag "[ERROR] Invalid character for the IssuerCA certificate in the SubscriptionManager URL" } } } } $RegKey = (Get-ItemProperty 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\EventLog\EventForwarding') if ($regkey.MaxForwardingRate) { Write-Diag "[ERROR] MaxForwardingRate is configured, this feature does not work. Please remove this setting and see bug 33554568" } } else { $isForwarder = $false Write-Diag "[INFO] No SubscriptionManager URL configured. It's ok if this machine is not supposed to forward events." } if ((Get-CimInstance -ClassName Win32_ComputerSystem).PartOfDomain) { $search = New-Object DirectoryServices.DirectorySearcher([ADSI]"GC://$env:USERDNSDOMAIN") # The SPN is searched in the forest connecting to a Global catalog $SPNReg = "" $SPN = "HTTP/" + $env:COMPUTERNAME Write-Diag ("[INFO] Searching for the SPN $SPN") $search.filter = "(servicePrincipalName=$SPN)" $results = $search.Findall() if ($results.count -gt 0) { foreach ($result in $results) { Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory) if ($result.properties.objectcategory[0].Contains("Computer")) { if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) { Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0]) $SPNReg = "OTHER" } } else { Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account" $SPNReg = "OTHER" } } if ($results.count -gt 1) { Write-Diag "[ERROR] The The SPN $SPN is duplicate" } } else { Write-Diag "[INFO] The The SPN $SPN was not found. That's ok, the SPN HOST/$env:COMPUTERNAME will be used" } $SPN = "HTTP/" + $env:COMPUTERNAME + ":5985" Write-Diag ("[INFO] Searching for the SPN $SPN") $search.filter = "(servicePrincipalName=$SPN)" $results = $search.Findall() if ($results.count -gt 0) { foreach ($result in $results) { Write-Diag ("[INFO] The SPN HTTP/$env:COMPUTERNAME is registered for DNS name = " + $result.properties.dnshostname + ", DN = " + $result.properties.distinguishedname + ", Category = " + $result.properties.objectcategory) if ($result.properties.objectcategory[0].Contains("Computer")) { if (-not $result.properties.dnshostname[0].Contains($env:COMPUTERNAME)) { Write-Diag ("[ERROR] The The SPN $SPN is registered for different DNS host name: " + $result.properties.dnshostname[0]) } } else { Write-Diag "[ERROR] The The SPN $SPN is NOT registered for a computer account" } } if ($results.count -gt 1) { Write-Diag "[ERROR] The The SPN $SPN is duplicate" } } else { if ($SPNReg -eq "OTHER") { Write-Diag "[WARNING] The The SPN $SPN was not found. It is required to accept WinRM connections since the HTTP/$env:COMPUTERNAME is reqistered to another name" } } if ($OSVer -le 6.3) { Write-Diag "[INFO] Checking the WinRMRemoteWMIUsers__ group" $search = New-Object DirectoryServices.DirectorySearcher([ADSI]"") # This is a Domain local group, therefore we need to collect to a non-global catalog $search.filter = "(samaccountname=WinRMRemoteWMIUsers__)" $results = $search.Findall() if ($results.count -gt 0) { Write-Diag ("[INFO] Found " + $results.Properties.distinguishedname) if ($results.Properties.grouptype -eq -2147483644) { Write-Diag "[INFO] WinRMRemoteWMIUsers__ is a Domain local group" } elseif ($results.Properties.grouptype -eq -2147483646) { Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Global group" } elseif ($results.Properties.grouptype -eq -2147483640) { Write-Diag "[WARNING] WinRMRemoteWMIUsers__ is a Universal group" } if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is also present as machine local group" } } else { Write-Diag "[WARNING] The WinRMRemoteWMIUsers__ was not found in the domain" if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group" } else { Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not even present as machine local group" } } } if ((Get-ChildItem WSMan:\localhost\Service\Auth\Kerberos).value -eq "true") { Write-Diag "[INFO] Kerberos authentication is enabled for the service" } else { Write-Diag "[WARNING] Kerberos authentication is disabled for the service" } } else { Write-Diag "[INFO] The machine is not joined to a domain" if (Get-CimInstance -Query "select * from Win32_Group where Name = 'WinRMRemoteWMIUsers__' and Domain = '$env:computername'") { Write-Diag "[INFO] The group WinRMRemoteWMIUsers__ is present as machine local group" } else { Write-Diag "[ERROR] The group WinRMRemoteWMIUsers__ is not present as machine local group" } if ((Get-ChildItem WSMan:\localhost\Service\Auth\Certificate).value -eq "false") { Write-Diag "[WARNING] Certificate authentication is disabled for the service" } else { Write-Diag "[INFO] Certificate authentication is enabled for the service" } } $HHTPParam = Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" if (($HHTPParam.MaxFieldLength -gt 0) -and ($HHTPParam.MaxRequestBytes -gt 0)) { Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxFieldLength = " + $HHTPParam.MaxFieldLength) Write-Diag ("[INFO] HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters\MaxRequestBytes = " + $HHTPParam.MaxRequestBytes) } else { Write-Diag ("[WARNING] MaxFieldLength and/or MaxRequestBytes are not defined in HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters. This may cause the request to fail with error 400 in complex AD environemnts. See KB 820129") } $iplisten = (Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Services\HTTP\Parameters" | Select-Object -ExpandProperty "ListenOnlyList" -ErrorAction SilentlyContinue) if ($iplisten) { Write-Diag ("[WARNING] The IPLISTEN list is not empty, the listed addresses are " + $iplisten) } else { Write-Diag "[INFO] The IPLISTEN list is empty. That's ok: WinRM will listen on all IP addresses" } $binval = (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections" -Name WinHttpSettings).WinHttPSettings $proxylength = $binval[12] if ($proxylength -gt 0) { $proxy = -join ($binval[(12+3+1)..(12+3+1+$proxylength-1)] | % {([char]$_)}) Write-Diag ("[WARNING] A NETSH WINHTTP proxy is configured: " + $proxy) $bypasslength = $binval[(12+3+1+$proxylength)] if ($bypasslength -gt 0) { $bypasslist = -join ($binval[(12+3+1+$proxylength+3+1)..(12+3+1+$proxylength+3+1+$bypasslength)] | % {([char]$_)}) Write-Diag ("[WARNING] Bypass list: " + $bypasslist) } else { Write-Diag "[WARNING] No bypass list is configured" } Write-Diag "[WARNING] WinRM does not work very well through proxies, make sure that the target machine is in the bypass list or remove the proxy" } else { Write-Diag "[INFO] No NETSH WINHTTP proxy is configured" } $th = (get-item WSMan:\localhost\Client\TrustedHosts).value if ($th) { Write-Diag ("[INFO] TrustedHosts contains: $th") } else { Write-Diag ("[INFO] TrustedHosts is not configured, it's ok it this machine is not supposed to connect to other machines using NTLM") } $psver = $PSVersionTable.PSVersion.Major.ToString() + $PSVersionTable.PSVersion.Minor.ToString() if ($psver -eq "50") { Write-Diag ("[WARNING] Windows Management Framework version " + $PSVersionTable.PSVersion.ToString() + " is no longer supported") } else { Write-Diag ("[INFO] Windows Management Framework version is " + $PSVersionTable.PSVersion.ToString() ) } $clientcert = Get-ChildItem WSMan:\localhost\ClientCertificate if ($clientcert.Count -gt 0) { Write-Diag "[INFO] Client certificate mappings" foreach ($certmap in $clientcert) { Write-Diag ("[INFO] Certificate mapping " + $certmap.Name) $prop = Get-ChildItem $certmap.PSPath foreach ($value in $prop) { Write-Diag ("[INFO] " + $value.Name + " " + $value.Value) if ($value.Name -eq "Issuer") { ChkCert -cert $value.Value -descr "mapping" -store "(Store = 'Root' or Store = 'CA')" } elseif ($value.Name -eq "UserName") { $usr = Get-CimInstance -ClassName Win32_UserAccount | Where-Object {$_.Name -eq $value.value} if ($usr) { if ($usr.Disabled) { Write-Diag ("[ERROR] The local user account " + $value.value + " is disabled") } else { Write-Diag ("[INFO] The local user account " + $value.value + " is enabled") } } else { Write-Diag ("[ERROR] The local user account " + $value.value + " does not exist") } } elseif ($value.Name -eq "Subject") { if ($value.Value[0] -eq '"') { Write-Diag "[ERROR] The subject does not have to be included in double quotes" } } } } } else { if ($subWG) { Write-Diag "[ERROR] No client certificate mapping configured" } } $aCert = $tbCert.Select("Store = 'Root' and Subject <> Issuer") if ($aCert.Count -gt 0) { Write-Diag "[ERROR] Found for non-Root certificates in the Root store" foreach ($cert in $acert) { Write-Diag ("[ERROR] Misplaced certificate " + $cert.Subject) } } if ($isForwarder) { $evtLogReaders = (Get-CimInstance -Query ("Associators of {Win32_Group.Domain='" + $env:COMPUTERNAME + "',Name='Event Log Readers'} where Role=GroupComponent") | Where {$_.Name -eq "NETWORK SERVICE"} | Measure-Object) if ($evtLogReaders.Count -gt 0) { Write-Diag "[INFO] The NETWORK SERVICE account is member of the Event Log Readers group" } else { Write-Diag "[WARNING] The NETWORK SERVICE account is NOT member of the Event Log Readers group, the events in the Security log cannot be forwarded" } } $fwrules = (Get-NetFirewallPortFilter -Protocol TCP | Where { $_.localport -eq "5986" } | Get-NetFirewallRule) if ($fwrules.count -eq 0) { Write-Diag "[INFO] No firewall rule for port 5986" } else { Write-Diag "[INFO] Found firewall rule for port 5986" } $dir = $env:windir + "\system32\logfiles\HTTPERR" if (Test-Path -path $dir) { $httperrfiles = Get-ChildItem -path ($dir) if ($httperrfiles.Count -gt 100) { Write-Diag ("[WARNING] There are " + $httperrfiles.Count + " files in the folder " + $dir) } else { Write-Diag ("[INFO] There are " + $httperrfiles.Count + " files in the folder " + $dir) } $size = 0 foreach ($file in $httperrfiles) { $size += $file.Length } $size = [System.Math]::Ceiling($size / 1024 / 1024) # Convert to MB if ($size -gt 100) { Write-Diag ("[WARNING] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space") } else { Write-Diag ("[INFO] The folder " + $dir + " is using " + $size.ToString() + " MB of disk space") } } # SIG # Begin signature block # MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBdQdZ0sQcyhlnp # vvn1S21gHDnw/ueJT0fNTnjQ7oTrAqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGggwghoEAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDgsat8ygU0by9RLfSDiOz9P # ULyupwmhKNIdeckk6iZLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAX53CAlAjMGanyMtyk8RScBIZQYEn+nSuwPmgSv+Hz6gO1Ld/HYiufZMX # kXEXASC0FgbWNRhZHFil0AqASfdFAXAjidjYwAziJtHG4GULLaAmLj3pr8jZDOjA # OvzTAF9rIWMTO8gjuLy8u1jbqwkQ36AMvTw/AH6gvjil1gbqkZKVv/rfw5WNerGu # CMvBH/JZb+Te43vMFAnu3N6YTdr0voHN3+xfWHdR+ufmXx3qzfecMLXIUKDnZ90x # EFRZ34U2/V23PaEBCpAtkX2iFxqvPP5LxDdHK00NWnprqLeUBETpRaR2oXCUcCg9 # eeZr48J8hwaZZ/jeHHB//ZqoQme8UqGCF5IwgheOBgorBgEEAYI3AwMBMYIXfjCC # F3oGCSqGSIb3DQEHAqCCF2swghdnAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFQBgsq # hkiG9w0BCRABBKCCAT8EggE7MIIBNwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAQIezgFSqnnMHplAH9dkXreHFehYqG/975XDvzWnVbTgIGZkZGMuCc # GBEyMDI0MDYxMjE1MDA0NC4xWjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # 6jCCByAwggUIoAMCAQICEzMAAAHyPjLXZKxwkZQAAQAAAfIwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTU4 # WhcNMjUwMzA1MTg0NTU4WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEAvOXzyxcKaWIMcGMZEhHmL0AbZ2CU7Sio9hSscx8dH4Fe # l4CCK5glpqSpfSDs7znyf5Ooj9EZ6EaORfPQHdvXncxnZVmwo9UMseR1BzWPMrvR # JSTpnYHrjb0yuEVuMLvYgef89kngrmKsl/7/M+j6b9vYdbbTVrEnPyjznroc0gF6 # pANuuQUhU+ZMpMb8wdC8aMUuqFqF1iusMde9jUSUWHCDX1w4VEb1Hw+9I4qBPdq1 # vzoI3DisWZH0MS5cGhUq0pxrO14TK6fU7FIJsLMnExDgXRlZn9Rwg+1jms+RBHEM # iEtgaUWGMLDzGwet7h4idefKjYdUiV7qC+cBg7v22VMzfgc3C4/eosQu8CRkDAYs # Vh/XfvlfG5ddEWHVw2ZZY0QL0uohcDc62obuA62G+2/DO778IRC9MQjr2+1hTLLL # bHF35HROYPjUmnKYYBX3KH7UOajw9jzVZqxt/A5hw6GIYI/bqjyz+756F3+4+vi1 # vFaJ9efA9Fq5pOwrprnEE4h0cnqRGlQ55wNhpIiaHof6930oS+gh4D6Ewe6GFP3e # iTp3EYqA2KqkX1dsJaSlTvG/lWBy/IZ9dSURceqevZi/AUbUmenRvxhRFRPn1ZoM # WHyAlK6YIckJREyTyExAUteSLGlLltBr15S0qHxn9reQwKA5Ligmwvt1XT5pWFUC # AwEAAaOCAUkwggFFMB0GA1UdDgQWBBSVW4cAJurQMQTOXB/AYNPmOuKGeTAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIH # gDANBgkqhkiG9w0BAQsFAAOCAgEAPUunjuB7HwdNF6ToD2m3Dd0GXsoqYIpXEEg2 # fIOlQr/RVR83UqvV6QLJY2UijVkgpYSRM+TqN1Jv7Wj56GxfvApAHZHC0IS3ZEoX # 6/dZM8vbwz6zppQgNhUPY1YRWmrdkDN989afhgj+bbr4qxWlFs1FlQxTqaPzucw6 # c6D2LU69HBYN7l2kS0+eFEN2OLj2F6p+sLp2bVEETIiTM8aVJb3X1hlLQr51t3gw # YpA5IsdVxPfFXGCM9vuX3XL6x1XlGqxl8uC0bcM5sKbArVIe7UesIQq1WJG+hbnQ # XVjO01b44u6RoH43rIJwEmg/woS7seujxsGiGhfsS85NGzcbAI9LoXekHVq+k09/ # Zv0jWdf1F1O5MxKHdLwGN5iJ/F+QOCPvf3tZwTaVESemIgykHeWFYMbLmQlr+EMG # 9Jl4RyHvQrm30qmY7w2sH9iNtvTdy7LQyVEq9bxhQfIkOVvGSzOT8E/L7bChAcBx # GJsLLlprMZIpiBeQUG0s4PcM9Tuo3Vk8RhtDlLdXF1jjCVCc8hB+FkimRzsed6nA # Lw/YdFOoxBdn7gY7Sf0A61m2+Lq7wH676jZ/ZR+4FT6ZajTwyL0PA5Gd5b20LGKp # c+te3u+oGu0mNMO9fkD9euQj3c1GN+nrdkpuKb7KRCvIZZatyGHMl9L/Pe/l/WHn # nDNT29YwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3 # DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw # MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx # MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/ # XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1 # hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7 # M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K # Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy # 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80 # 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc # NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha # YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL # iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV # 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG # CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp # zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT # MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI # KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG # MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a # GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br # aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG # AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN # AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 # OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA # A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz # aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L # GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m # Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0 # SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko # JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm # PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482 # 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7 # vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDTTCC # AjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAl # BgNVBAsTHm5TaGllbGQgVFNTIEVTTjpGMDAyLTA1RTAtRDk0NzElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAa4ve # N3BSx9k30BHwdOUiyAoO+AiggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOoTsn8wIhgPMjAyNDA2MTIwNTM3MDNa # GA8yMDI0MDYxMzA1MzcwM1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hOyfwIB # ADAHAgEAAgIPGTAHAgEAAgITQTAKAgUA6hUD/wIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBCwUAA4IBAQCOChsspCDjYLnXH/y0RrIFtMCqUtnSRv7esfISXdNZ7fki/6+I # g4yzbycqP93UBfVTJXMI51q40oZM35L/5Id53qvkI3HLyLlxY7nrLFb7dVZ+gDAR # 6qpwB+mvJxZIpSqvPORwPUKVgsdvuwAsY2LMt/gaS3OVkoHAnfYc1EEiGxfz6Rdr # zsz+QowkMBjLc2MDINYKzghYdDoj5uMIPPikKarPtAEGWQ0h1MpdMreP0xF3ks5w # pwRI728Ko5aInmeJNpkcLIaPnW6lsL6kbzznoqm7W6m/0+NegwWQu5werPzOPKR7 # PETk4iYpWYmD4gvmvrAaReRMZ8fo3Mb0hhqrMYIEDTCCBAkCAQEwgZMwfDELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z # b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwDQYJ # YIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkq # hkiG9w0BCQQxIgQgbYtNE5IqI1EALa3aK+21Kj0rCw+vOyTatV2mN/7vPTQwgfoG # CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCD42j4dLjFSXNOPmOEbuQVFGxxOLLme # p0R0lLtF10pDRDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # AhMzAAAB8j4y12SscJGUAAEAAAHyMCIEIIMtkkixLESlVY9Z7TporupzLASzK2GU # 7/FEapK99YzLMA0GCSqGSIb3DQEBCwUABIICAKGoKFq7y+/VqY9/W/r9tJiVBsvt # bTnKJgpYOWIysIAaKNk8M2SnLG8T7wxAyn/DHDCwq6zYc12sseB7SUrcfElmXPgi # gZR6IvTYDiK8cKCgbzGBi1mCHm+WUAjonbP9wwhHOtlPJaOfpsT4TuO7TId2MYmK # o5Q2oGXUbuWkP8mjBPG1fiA0lz/JI2hZtGGifa3FzFJcVAh1YiYbObPNsB0zin9A # 2WiLq7Rahs5I85Ni5pbrRY673LzHedeDdEaSpe2Fo/L8/T7Rd4lTQHatiohYwoIX # Q3EuCRmYMhdCV2eV3jQe925q9XQmzYKnW9duZ5Nt4MWw4TNzBwlrr2XyiXVWe2fL # /8jHHZwsERtyHAJcwwgaaatzqeVXZidsl8KRCWozBHSGVa+OGvZG6fLoCLKrHA92 # 615QojJKE8xB6d7UEtaZZCUIXe6OBtEnQtY4Fc8vV+qUDnbUqQW2+pv0tenUBfxs # Kc/m2eC7Sg+U4jD92FAo61XoyO+OZ27/gEEdQfRaqh2pojZ/eMlO0k7GMZQrdHfF # GrXQRPd9TfwsmBbS2YvkfyUe2eQi9FlrOhsvAK+VSsTmP7fg80N7UROQdOWxmP3F # +J2eYKaQ5luMp5+SAWAxwQtNLuDZeJDGoVdaX8wSAQ/Zih46f2bgZkDijb+epUpV # jY2386pmaEx4fgmh # SIG # End signature block
combined_dataset/train/non-malicious/955.ps1
955.ps1
$uniqueId=$(-join ((97..122) + (48..57) | Get-Random -Count 15 | % {[char]$_})) $apiVersion = "2015-04-08" $location = "West US 2" $resourceGroupName = "myResourceGroup" $accountName = "mycosmosaccount-$uniqueId" $resourceType = "Microsoft.DocumentDb/databaseAccounts" $locations = @( @{ "locationName"="West US 2"; "failoverPriority"=0 }, @{ "locationName"="East US 2"; "failoverPriority"=1 } ) $consistencyPolicy = @{ "defaultConsistencyLevel"="Session"; } $CosmosDBProperties = @{ "databaseAccountOfferType"="Standard"; "locations"=$locations; "consistencyPolicy"=$consistencyPolicy; } New-AzResource -ResourceType $resourceType -ApiVersion $apiVersion ` -ResourceGroupName $resourceGroupName -Location $location ` -Name $accountName -PropertyObject $CosmosDBProperties Read-Host -Prompt "Press any key to add a region in South Central US" $locations = @( @{ "locationName"="West US 2"; "failoverPriority"=0 }, @{ "locationName"="East US 2"; "failoverPriority"=1 }, @{ "locationName"="South Central US"; "failoverPriority"=2 } ) $account = Get-AzResource -ResourceType $resourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $accountName $account.Properties.locations = $locations $CosmosDBProperties = $account.Properties Set-AzResource -ResourceType $resourceType ` -ApiVersion $apiVersion -ResourceGroupName $resourceGroupName ` -Name $accountName -PropertyObject $CosmosDBProperties
combined_dataset/train/non-malicious/sample_30_62.ps1
sample_30_62.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIllwYJKoZIhvcNAQcCoIIliDCCJYQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL # sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE # 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+ # tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi # 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5 # LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU # Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI # wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w # PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN # MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT # BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE # SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl # cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG # SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL # El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb # w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr # v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd # dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM # YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq # GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz # WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD # ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD # ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az # VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv # m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw # NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a # FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r # XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG # AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr # BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw # AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN # MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 # cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG # CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE # AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q # S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA # YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI # hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0 # bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0 # wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH # KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ # VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7 # BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11 # 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr # cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry # DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs # mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF # ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIZ # mjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy # O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN # AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB # gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3 # RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq # tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7 # EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/ # 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt # SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC # FykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgED # MQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIB # AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL # JZwfEO4YeUvzRyzBGzb6/QIGZdYJC4ZGGBMyMDI0MDMwODAxMzYzMy44MzNaMASA # AgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQIC # EzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5 # WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UE # CxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQL # Ex1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tq # orMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrABrfserf0kFayNXVzwT7j # arJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879lP6ydY0BBZkZ9t39e/sv # NRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahNkFgK85OIaRrDGvhnxOa/ # 5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcq # hTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCSbaFMk77LwVbklpnw4aHW # JXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA0tCU53AauvUOZRoQBh89 # nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEE # Q4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9 # s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT # +aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8i # wfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1iON3HEZ0X23nde4Kg/Wf # bx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr/kYjMWd63OP0Glq70ua4 # WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9 # vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZtbIXjU4mr5dns9dnanBd # BS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukHo16afE/AqP/smmGJh5ZR # 0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KOuKAYNngljiOlllct0uJV # z2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9 # zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7Fq2BGTRkcy//hmS32p6q # yglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y0mGnEAuA85tsOcUPlzwW # F5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIB # AKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEt # MCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw # JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR # 1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOmUSxMwIhgPMjAyNDAzMDcyMjE3NTVa # GA8yMDI0MDMwODIyMTc1NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6ZRLEwIB # ADAHAgEAAgIy2TAHAgEAAgIUBTAKAgUA6ZWckwIBADA2BgorBgEEAYRZCgQCMSgw # JjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3 # DQEBBQUAA4GBAFaazxlLFAIxJfTxGh9UwtSl6JTFgkoetfKiDG5trZMIZ22qg/e9 # GV74LcWrEHEbxjwRC9NdaKWz7Ubxi/kGzNA3XHZZ4EUi5r+0sRxRpx72Ps1nnZCQ # PexqQTqDhkFxjYu7Ts5NDOxt2otAqniq865/4ZwKeFuq1W1abmQozFLxMYIEDTCC # BAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHg1Pwf # ExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsq # hkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg2fCBAEXmyKXFj4JkISJ/5jbEiZiu # JE/Ryj7PufyDzLYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnl # bTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEAAAHgMCIEIC58HBtly9ON # bLEJxzPigfjEEyjBV161D7Wwhfi7T2gUMA0GCSqGSIb3DQEBCwUABIICAA2AAnFn # ZnNe7NTBX91DVN7D5+1rkSiFoGHqBbKPMpx2lxVQbMmPl8J7+LR5SGLnN4u5oxOe # stcPm2c+jCQI6qssQWaC9oA8qAAKCRKvxSaQiMzvOlP0GhOCktC/jwqlKKgfOBWO # WwhRSLy8jz5dTSf7pnLQ4JkyuCC9vhtse6cxa56H1CeNhTs2ujILiP48fGUe/C95 # AxBXcigWJ4kjYC9BS1WCqb6TWpdafeBARhgjsz5Djan5VBitgKTOHGXE8lNyxsmg # k2zjlcmL1hc8mS1oYHLRmYJcR/RlYNQnnNoZiqtJ3VlPw6CKS540fhj/ERvEgH6i # KzZFFM01uyJg3lqxZ+cuR/HKMo1ICmwP4YehDfz0rGCGNkW9v6FZ+cELqUfB2B4Y # za/WumYOYDlK7ULvFTr0StjZXACooDVRFsgUmWMuHGHn7EiomlpVcZCdeJI32T/5 # f/ctYaSfSjdZ0G5b/yqFmq1n1R3HAvnWKvCmnG8w0HbjCzdZeFRMizgBsXz6m5tH # aqZIisyavM75Pp96emwtUr3AHdXaJU4rXMRloidEnkNFvPDIRL02bRKEyBOnT/8W # VGRd2lXhI1Xb0m09ZfZce/AyNUn83+5PWHu5zgMV/wFFKF5wbtG2NTJjPYwdwELG # UcKJxe687yyprR9Ihi0G2LbY0qmUhK8rgi4s # SIG # End signature block
combined_dataset/train/non-malicious/2322.ps1
2322.ps1
[CmdletBinding()] param( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string[]]$ComputerName, [Parameter()] [ValidateNotNullOrEmpty()] [pscredential]$Credential ) <<<<<<< HEAD $ErrorActionPreference = 'Stop' $scriptBlock = { function Test-RegistryKey { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key ) ======= $remoteScriptblock = { function Test-RegistryKey { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key ) >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce $ErrorActionPreference = 'Stop' <<<<<<< HEAD if (Get-Item -Path $Key -ErrorAction Ignore) { $true ======= if (Get-Item -Path $Key -ErrorAction Ignore) { $true } >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } <<<<<<< HEAD function Test-RegistryValue { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Value ) ======= function Test-RegistryValue { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Value ) >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce $ErrorActionPreference = 'Stop' <<<<<<< HEAD if (Get-ItemProperty -Path $Key -Name $Value -ErrorAction Ignore) { $true ======= if (Get-ItemProperty -Path $Key -Name $Value -ErrorAction Ignore) { $true } >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } <<<<<<< HEAD function Test-RegistryValueNotNull { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Value ) ======= function Test-RegistryValueNotNull { [OutputType('bool')] [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Key, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Value ) >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce $ErrorActionPreference = 'Stop' <<<<<<< HEAD if (($regVal = Get-ItemProperty -Path $Key -Name $Value -ErrorAction Ignore) -and $regVal.($Value)) { $true ======= if (($regVal = Get-ItemProperty -Path $Key -Name $Value -ErrorAction Ignore) -and $regVal.($Value)) { $true } >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } $tests = @( { Test-RegistryKey -Key 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootPending' } { Test-RegistryKey -Key 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Component Based Servicing\RebootInProgress' } { Test-RegistryKey -Key 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\RebootRequired' } { Test-RegistryKey -Key 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Component Based Servicing\PackagesPending' } { Test-RegistryKey -Key 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\PostRebootReporting' } { Test-RegistryValueNotNull -Key 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Value 'PendingFileRenameOperations' } { Test-RegistryValueNotNull -Key 'HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager' -Value 'PendingFileRenameOperations2' } { (Test-RegistryKey -Key 'HKLM:\SOFTWARE\Microsoft\Updates') -and (Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Updates' -Name 'UpdateExeVolatile' -ErrorAction Ignore | Select-Object -ExpandProperty UpdateExeVolatile) -ne 0 } { Test-RegistryValue -Key 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce' -Value 'DVDRebootSignal' } { Test-RegistryKey -Key 'HKLM:\SOFTWARE\Microsoft\ServerManager\CurrentRebootAttemps' } { Test-RegistryValue -Key 'HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon' -Value 'JoinDomain' } { Test-RegistryValue -Key 'HKLM:\SYSTEM\CurrentControlSet\Services\Netlogon' -Value 'AvoidSpnSet' } { (Test-RegistryValue -Key 'HKLM:\SYSTEM\CurrentControlSet\Control\ComputerName' -Value 'ActiveComputerName') -and (Test-RegistryValue -Key 'HKLM:\SYSTEM\CurrentControlSet\Control\ComputerName' -Value 'ComputerName') -and ( (Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\ComputerName' -Name 'ActiveComputerName').ActiveComputerName -ne (Get-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\ComputerName' -Name 'ActiveComputerName').ComputerName ) } { $knownFalsePositiveGuids = @('117cab2d-82b1-4b5a-a08c-4d62dbee7782') if (Get-ChildItem -Path 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Services\Pending' | Where-Object { $_.PSChildName -notin $knownfalsepositiveguids }) { $true } } ) foreach ($test in $tests) { if (& $test) { $true return } } <<<<<<< HEAD ) foreach ($test in $tests) { if (& $test) { $true break } ======= $false >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } } foreach ($computer in $ComputerName) { try { $connParams = @{ <<<<<<< HEAD 'ComputerName' = $computer ======= 'ComputerName' = $ComputerName >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } if ($PSBoundParameters.ContainsKey('Credential')) { $connParams.Credential = $Credential } <<<<<<< HEAD $output = @{ ComputerName = $computer IsPendingReboot = $false } $psRemotingSession = New-PSSession @connParams if (-not ($output.IsPendingReboot = Invoke-Command -Session $psRemotingSession -ScriptBlock $scriptBlock)) { $output.IsPendingReboot = $false ======= $results = Invoke-Command @connParams -ScriptBlock $remoteScriptblock foreach ($result in $results) { $output = @{ ComputerName = $result.PSComputerName IsPendingReboot = $result } [pscustomobject]$output >>>>>>> dcce019b814013fc8a33b17fd7f2b8a92a5251ce } [pscustomobject]$output } catch { Write-Error -Message $_.Exception.Message } }
combined_dataset/train/non-malicious/sample_57_3.ps1
sample_57_3.ps1
import{a0 as s}from"./index-BzFgRtn_.js";/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
combined_dataset/train/non-malicious/FTP download.ps1
FTP download.ps1
$File = "D:\\Dev\\somefilename.zip" $ftp = "ftp://username:[email protected]/pub/incoming/somefilename.zip" "ftp url: $ftp" $webclient = New-Object System.Net.WebClient $uri = New-Object System.Uri($ftp) "Uploading $File..." $webclient.UploadFile($uri, $File)
combined_dataset/train/non-malicious/Get-WebPage_1.ps1
Get-WebPage_1.ps1
function Get-WebPage { <# .SYNOPSIS Downloads web page from site. .DESCRIPTION Downloads web page from site and displays source code or displays total bytes of webpage downloaded .PARAMETER Url URL of the website to test access to. .PARAMETER UseDefaultCredentials Use the currently authenticated user's credentials .PARAMETER Proxy Used to connect via a proxy .PARAMETER Credential Provide alternate credentials .PARAMETER ShowSize Displays the size of the downloaded page in Kilobytes .NOTES Name: Get-WebPage Author: Boe Prox DateCreated: 08Feb2011 .EXAMPLE Get-WebPage -url "http://www.bing.com" Description ------------ Returns information about Bing.Com to include StatusCode and type of web server being used to host the site. #> [cmdletbinding( DefaultParameterSetName = 'url', ConfirmImpact = 'low' )] Param( [Parameter( Mandatory = $True, Position = 0, ParameterSetName = '', ValueFromPipeline = $True)] [string][ValidatePattern("^(http|https)\\://*")]$Url, [Parameter( Position = 1, Mandatory = $False, ParameterSetName = 'defaultcred')] [switch]$UseDefaultCredentials, [Parameter( Mandatory = $False, ParameterSetName = '')] [string]$Proxy, [Parameter( Mandatory = $False, ParameterSetName = 'altcred')] [switch]$Credential, [Parameter( Mandatory = $False, ParameterSetName = '')] [switch]$ShowSize ) Begin { $psBoundParameters.GetEnumerator() | % { Write-Verbose "Parameter: $_" } #Create the initial WebClient object Write-Verbose "Creating web client object" $wc = New-Object Net.WebClient #Use Proxy address if specified If ($PSBoundParameters.ContainsKey('Proxy')) { #Create Proxy Address for Web Request Write-Verbose "Creating proxy address and adding into Web Request" $wc.Proxy = New-Object -TypeName Net.WebProxy($proxy,$True) } #Determine if using Default Credentials If ($PSBoundParameters.ContainsKey('UseDefaultCredentials')) { #Set to True, otherwise remains False Write-Verbose "Using Default Credentials" $webrequest.UseDefaultCredentials = $True } #Determine if using Alternate Credentials If ($PSBoundParameters.ContainsKey('Credentials')) { #Prompt for alternate credentals Write-Verbose "Prompt for alternate credentials" $wc.Credential = (Get-Credential).GetNetworkCredential() } } Process { Try { If ($ShowSize) { #Get the size of the webpage Write-Verbose "Downloading web page and determining size" "{0:N0}" -f ($wr.DownloadString($url) | Out-String).length -as [INT] } Else { #Get the contents of the webpage Write-Verbose "Downloading web page and displaying source code" $wc.DownloadString($url) } } Catch { Write-Warning "$($Error[0])" } } }
combined_dataset/train/non-malicious/sample_46_52.ps1
sample_46_52.ps1
# # Module manifest for module 'OCI.PSModules.Applicationmigration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Applicationmigration.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'eb3a14f9-0881-4138-8aee-090e2f4145e2' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Applicationmigration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Applicationmigration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIApplicationmigrationMigration', 'Get-OCIApplicationmigrationMigrationsList', 'Get-OCIApplicationmigrationSource', 'Get-OCIApplicationmigrationSourceApplicationsList', 'Get-OCIApplicationmigrationSourcesList', 'Get-OCIApplicationmigrationWorkRequest', 'Get-OCIApplicationmigrationWorkRequestErrorsList', 'Get-OCIApplicationmigrationWorkRequestLogsList', 'Get-OCIApplicationmigrationWorkRequestsList', 'Invoke-OCIApplicationmigrationMigrateApplication', 'Move-OCIApplicationmigrationMigrationCompartment', 'Move-OCIApplicationmigrationSourceCompartment', 'New-OCIApplicationmigrationMigration', 'New-OCIApplicationmigrationSource', 'Remove-OCIApplicationmigrationMigration', 'Remove-OCIApplicationmigrationSource', 'Stop-OCIApplicationmigrationWorkRequest', 'Update-OCIApplicationmigrationMigration', 'Update-OCIApplicationmigrationSource' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Applicationmigration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Set-Blur.ps1
Set-Blur.ps1
Add-Type -Type @" using System; using System.Runtime.InteropServices; namespace Huddled { public class Dwm { [DllImport("user32.dll")] public static extern int SetWindowLong(IntPtr hWnd, int nIndex, int dwNewLong); [DllImport("user32.dll", SetLastError=true)] public static extern int GetWindowLong(IntPtr hWnd, int nIndex); [DllImport("user32.dll")] public static extern bool SetLayeredWindowAttributes(IntPtr hwnd, uint crKey, byte bAlpha, uint dwFlags); [DllImport("dwmapi.dll", PreserveSig = false)] [return: MarshalAs(UnmanagedType.Bool)] public static extern bool DwmIsCompositionEnabled(); [DllImport("dwmapi.dll")] public static extern void DwmEnableBlurBehindWindow(IntPtr hwnd, ref BlurSettings blurBehind); [DllImport("dwmapi.dll", PreserveSig = true)] public static extern int DwmExtendFrameIntoClientArea(IntPtr hwnd, ref Margins margins); [StructLayout(LayoutKind.Sequential)] public struct Margins { public int leftWidth; public int rightWidth; public int topHeight; public int bottomHeight; } [StructLayout(LayoutKind.Sequential)] public struct BlurSettings { public int dwFlags; public bool fEnable; public IntPtr hRgnBlur; public bool fTransitionOnMaximized; public BlurSettings(bool enable) { dwFlags = 5; // enable fEnable = enable; hRgnBlur = IntPtr.Zero; fTransitionOnMaximized = true; } public BlurSettings(bool enable, bool maximizeTransition) { dwFlags = 5; // enable fEnable = enable; fTransitionOnMaximized = maximizeTransition; hRgnBlur = IntPtr.Zero; } } [StructLayout(LayoutKind.Sequential)] public struct ColorRef { public uint ColorDWORD; public ColorRef(System.Drawing.Color color) { ColorDWORD = (uint)color.R + (((uint)color.G) << 8) + (((uint)color.B) << 16); } public System.Drawing.Color Color { get { return System.Drawing.Color.FromArgb((int)(0x000000FFU & ColorDWORD), (int)(0x0000FF00U & ColorDWORD) >> 8, (int)(0x00FF0000U & ColorDWORD) >> 16); } set { ColorDWORD = (uint)value.R + (((uint)value.G) << 8) + (((uint)value.B) << 16); } } } } } "@ -Ref System.Drawing function global:Set-Blur { #.Synopsis # Mess with the transparency and blur of the PowerShell window #.Parameter color # The color to treat as transparent (you can set this to your foreground or background for best effect, but you must pass an actual [Drawing.Color] #.Parameter opacity # On a scale of 0 to 255, how opaque to make the window (255 is no transparency, 0 is invisible) #.Parameter blur # If set, -blur turns on the DWM Blur-Behind, otherwise turns it off #.Parameter Opaque # If set, turns off the color and opacity settings #.Parameter Handle # The handle of the window to act on. Defaults to the current PowerShell window #.Example # Set-Blur -Color ([System.Drawing.Color]::FromArgb( 0xff, 1, 36, 86 )) -Blur # # Makes the PowerShell Blue color transparent, and applies the window blur #.Example # Set-Blur -Color ([System.Drawing.Color]::FromArgb( 0xff, 1, 36, 86 )) # # Makes the PowerShell Blue color completely transparent #.Example # Set-Blur -Opacity 200 # # Sets the window partly transparent param([System.Drawing.Color]$color, [byte]$opacity, [switch]$Blur, [switch]$Opaque, [IntPtr]$handle = (ps -Id $pid).MainWindowHandle) if($opaque) { $style = [Huddled.Dwm]::GetWindowLong($handle, -20) -bor 0x80000 -bxor 0x80000 } else { $style = [Huddled.Dwm]::GetWindowLong($handle, -20) -bor 0x80000 } $style = [Huddled.Dwm]::SetWindowLong($Handle, -20, $style); $flag = 0 if($color) { $flag += 1 } else { $color = [System.Drawing.Color]::Black } if($opacity) { $flag += 2 } else { $opacity = 255 } ## This is why I wanted to console color ... you want to set this to your actual console background color $colorRef = (New-Object Huddled.DWM+ColorRef $color).ColorDWORD $null = [Huddled.Dwm]::SetLayeredWindowAttributes($handle, $colorRef, $opacity, $flag) if([Huddled.Dwm]::DwmIsCompositionEnabled()) { $blurSettings = New-Object Huddled.Dwm+BlurSettings $blur $null = [Huddled.Dwm]::DwmEnableBlurBehindWindow($handle, [ref]$blurSettings); } }
combined_dataset/train/non-malicious/3572.ps1
3572.ps1
function Get-ResourceGroupName { return getAssetName } function Clean-ResourceGroup($rgname) { Remove-AzResourceGroup -Name $rgname -Force } function Create-ResourceGroup { $resourceGroupName = Get-ResourceGroupName return New-AzResourceGroup -Name $resourceGroupName -Location WestUS }
combined_dataset/train/non-malicious/sample_4_65.ps1
sample_4_65.ps1
PARAM ([array]$Principals = ($env:USERNAME), $OSEmulation) #************************************************ # TS_MaxTokenSizeChecks.ps1 # Version 1.0 # Date: 9-4-2013 # Author: Tspring # Description: Script to detect user token sizing problems which may effect # use of domain services which require authentication. # Update 10/2014 to add support for claims and parameters for checking multiple users token sizes. #************************************************ $global:FormatEnumerationLimit = -1 "Within TS_MaxTokenSizeChecks script prior to trap." | WriteTo-StdOut -ShortFormat "OSEmulation is set to $OSEmulation" | WriteTo-StdOut -ShortFormat $OSEmType = $OSEmulation.GetType() "OSEmulation type is $OSEmType" | WriteTo-StdOut -ShortFormat Trap [Exception] { #Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ WriteTo-StdOut "[info]:An exception occurred." -shortformat WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." WriteTo-ErrorDebugReport -ErrorRecord $_ $Error.Clear() continue } #Define output file for token details outputs $MaxTokenfileDescription = "Text file export of token information for groups and migrated SIDs for the user." $DomainInfo = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $DomainName = $DomainInfo.name $MaxTokenSettingssectionDescription = "User Token Size Details" $ExportFile = Join-Path $Pwd.Path ($DomainName + "_KerberosTokenDetails.txt") # | Out-File -Encoding UTF8 -FilePath $MaxTokenSettingsOutput -Append function RC_MaxTokenSize { PARAM( $InformationCollected ) $RootCauseName = "RC_MaxTokenSize" Update-DiagRootCause -id $RootCauseName -Detected $true $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "18628" $PublicContent = "http://support.microsoft.com/kb/327825" Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID } function RC_MaxTokenSizeWarn { PARAM( $InformationCollected ) $RootCauseName = "RC_MaxTokenSizeWarn" Update-DiagRootCause -id $RootCauseName -Detected $true $Verbosity = "Error" $Visibility = "4" $SupportTopicsID = "18628" $PublicContent = "http://support.microsoft.com/kb/327825" Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID } (Get-Date) | Out-File $ExportFile -Encoding utf8 #If OS is not specified to hyptohesize token size let's find the local OS and computer role if (($OSEmulation -ne "12K") -and ($OSEmulation -ne "48K")) { $OS = Get-CimInstance -Class Win32_OperatingSystem $cs = Get-CimInstance -Namespace "root\cimv2" -class win32_computersystem $DomainRole = $cs.domainrole switch -regex ($DomainRole) { [0-1]{ #Workstation. $RoleString = "client" if ($OS.BuildNumber -eq 3790) { $OperatingSystem = "Windows XP" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 6001) -or ($OS.BuildNumber -eq 6002)) { $OperatingSystem = "Windows Vista" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 7600) -or ($OS.BuildNumber -eq 7601)) { $OperatingSystem = "Windows 7" $OSBuild = $OS.BuildNumber } elseif ($OS.BuildNumber -eq 9200) { $OperatingSystem = "Windows 8" $OSBuild = $OS.BuildNumber } elseif ($OS.BuildNumber -eq 9600) { $OperatingSystem = "Windows 8.1" $OSBuild = $OS.BuildNumber } } [2-3]{ #Member server. $RoleString = "member server" if ($OS.BuildNumber -eq 3790) { $OperatingSystem = "Windows Server 2003" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 6001) -or ($OS.BuildNumber -eq 6002)) { $OperatingSystem = "Windows Server 2008 RTM" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 7600) -or ($OS.BuildNumber -eq 7601)) { $OperatingSystem = "Windows Server 2008 R2" $OSBuild = $OS.BuildNumber } elseif ($OS.BuildNumber -eq 9200) { $OperatingSystem = "Windows Server 2012" $OSBuild = $OS.BuildNumber } elseif ($OS.BuildNumber -eq 9600) { $OperatingSystem = "Windows Server 2012 R2" $OSBuild = $OS.BuildNumber } } [4-5]{ #Domain Controller $RoleString = "domain controller" if ($OS.BuildNumber -eq 3790) { $OperatingSystem = "Windows Server 2003" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 6001) -or ($OS.BuildNumber -eq 6002)) { $OperatingSystem = "Windows Server 2008" $OSBuild = $OS.BuildNumber } elseif (($OS.BuildNumber -eq 7600) -or ($OS.BuildNumber -eq 7601)) { $OperatingSystem = "Windows Server 2008 R2" $OSBuild = $OS.BuildNumber } elseif ($OS.BuildNumber -eq 9200) { $OperatingSystem = "Windows Server 2012" $OSBuild = $OS.BuildNumber} elseif ($OS.BuildNumber -eq 9600) { $OperatingSystem = "Windows Server 2012 R2" $OSBuild = $OS.BuildNumber } } } } if (($OSEmulation -eq "12K") -or ($OSEmulation -eq "48K")) { #Prompt user to choose which OS since they chose to emulate. if ($OSEmulation -match "12K") { $OSBuild = "7600" "Gauging Kerberos token size using the Windows 7/Windows Server 2008 R2 and earlier default token size of 12K." | Out-File $ExportFile -Encoding utf8 -Append } elsif ($OSEmulation -match "48K") { $OSBuild = "9200" "Gauging Kerberos token size using the Windows 8/Windows Server 2012 and later default token size of 48K. Note: The 48K setting is optionally configurable for many earlier Windows versions." | Out-File $ExportFile -Encoding utf8 -Append } } else { "The computer is $OperatingSystem and is a $RoleString." | Out-File $ExportFile -Encoding utf8 -Append } function GetSIDHistorySIDs { param ([string]$objectname) Trap [Exception] {$Script:ExceptionMessage = $_ $Error.Clear() continue} $DomainInfo = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain() $RootString = "LDAP://" + $DomainInfo.Name $Root = New-Object System.DirectoryServices.DirectoryEntry($RootString) $searcher = New-Object DirectoryServices.DirectorySearcher($Root) #$searcher.Filter="(&(userprincipalname=$objectname))" $searcher.Filter="(|(userprincipalname=$objectname)(name=$objectname))" $results=$searcher.findone() if ($null -ne $results) { $SIDHistoryResults = $results.properties.sidhistory } #Clean up the SIDs so they are formatted correctly $SIDHistorySids = @() foreach ($SIDHistorySid in $SIDHistoryResults) { $SIDString = (New-Object System.Security.Principal.SecurityIdentifier($SIDHistorySid,0)).Value $SIDHistorySids += $SIDString } return $SIDHistorySids } #Fix up list if needed "Principal list is $Principals" | WriteTo-StdOut -ShortFormat $Users = @() foreach ($Principal in $Principals) { "Within Principals foreach. Current one is $Principal" | WriteTo-StdOut -ShortFormat if ($Principal -match " " ) { [array]$TempUserList = $Principal.Split(" ") foreach ($TempUser in $TempUserList) { if ($TempUser -notmatch " " ) {$Users += $TempUser} } } else {$Users += $Principal} } "Users array is $users" | WriteTo-StdOut -ShortFormat if (($Principals.GetType()) -ne [System.String]) { $NumberofPrincipals = $Users.count $UserCountdown = $NumberofPrincipals "Within Principals ne string" | WriteTo-StdOut -ShortFormat "Principals count for usercountdown is $Usercountdown" | WriteTo-StdOut -ShortFormat } else { $NumberofPrincipals = "1" "in else statement indicating the principals is a string" | WriteTo-StdOut -ShortFormat "PRincipals count for usercountdown is $Usercountdown" | WriteTo-StdOut -ShortFormat } Import-LocalizedData -BindingVariable MaxTokenSizeStrings $Activity = $MaxTokenSizeStrings.ID_TokenSizeCheck_Activity -replace("%allusers%", $NumberofPrincipals) foreach ($Principal in $Users) { "Within token checking Foreach. Current user is $Principal" | WriteTo-StdOut -ShortFormat $UpdatedSeconds = $UserCountdown * 120 $EstimatedTime = New-TimeSpan -seconds $UpdatedSeconds $Minutes = $EstimatedTime.minutes $Seconds = $EstimatedTime.seconds $Status = $MaxTokenSizeStrings.ID_TokenSizeCheck_Status -replace("%userstogo%", $UserCountdown) $Status = $Status.replace("%minutes%", $Minutes) Write-DiagProgress -Activity $Activity -Status $Status Trap [Exception] { #Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ WriteTo-StdOut "[info]:An exception occurred." -shortformat WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." WriteTo-ErrorDebugReport -ErrorRecord $_ $Error.Clear() $UserCountdown-- continue } #Obtain domain SID for group SID comparisons. $UserIdentity = New-Object System.Security.Principal.WindowsIdentity($Principal) $Groups = $UserIdentity.get_Groups() $DomainSID = $UserIdentity.AccountDomainSid $GroupCount = $Groups.Count $GroupDetails = New-Object PSObject $AllGroupSIDHistories = @() $SecurityGlobalScope = 0 $SecurityDomainLocalScope = 0 $SecurityUniversalInternalScope = 0 $SecurityUniversalExternalScope = 0 foreach ($GroupSid in $Groups) { $Group = [adsi]"LDAP://<SID=$GroupSid>" $GroupType = $Group.groupType if ($null -ne $Group.name) { $SIDHistorySids = GetSIDHistorySIDs $Group.name $AllGroupSIDHistories += $SIDHistorySids $GroupName = $Group.name.ToString() #Resolve SIDHistories if possible to give more detail. if ($null -ne $SIDHistorySids) { $GroupSIDHistoryDetails = New-Object PSObject foreach ($GroupSIDHistory in $AllGroupSIDHistories) { #$SIDHistGroup = [adsi]"LDAP://<SID=$GroupSIDHistory>" $SIDHistGroup = New-Object System.Security.Principal.SecurityIdentifier($GroupSIDHistory) $SIDHistGroupName = $SIDHistGroup.Translate([System.Security.Principal.NTAccount]) #$SIDHistGroupName = ($SIDHistGroup.displayname).ToString() $GroupSIDHISTString = $GroupName + "--> " + $SIDHistGroupName add-Member -InputObject $GroupSIDHistoryDetails -MemberType NoteProperty -Name $GroupSIDHistory -Value $GroupSIDHISTString -force } } } #Count number of security groups in different scopes. switch -exact ($GroupType) {"-2147483646" { #Domain Global scope $SecurityGlobalScope++ $GroupNameString = $GroupName + " (" + ($GroupSID.ToString()) + ")" add-Member -InputObject $GroupDetails -MemberType NoteProperty -Name $GroupNameString -Value "Domain Global Group" $GroupNameString = $null } "-2147483644" { #Domain Local scope $SecurityDomainLocalScope++ $GroupNameString = $GroupName + " (" + ($GroupSID.ToString()) + ")" Add-Member -InputObject $GroupDetails -MemberType NoteProperty -Name $GroupNameString -Value "Domain Local Group" $GroupNameString = $null } "-2147483640" { #Universal scope; must separate local #domain universal groups from others. if ($GroupSid -match $DomainSID) { $SecurityUniversalInternalScope++ $GroupNameString = $GroupName + " (" + ($GroupSID.ToString()) + ")" Add-Member -InputObject $GroupDetails -MemberType NoteProperty -Name $GroupNameString -Value "Local Universal Group" $GroupNameString = $null } else { $SecurityUniversalExternalScope++ $GroupNameString = $GroupName + " (" + ($GroupSID.ToString()) + ")" Add-Member -InputObject $GroupDetails -MemberType NoteProperty -Name $GroupNameString -Value "External Universal Group" $GroupNameString = $null } } } #Look for claims if OS supports it if ($OSBuild -ge 9200) { $ClaimCounter = 0 #Set to zero in case the script is *gasp* ran twice in the same PS. $ClaimsTable = @{} $UserIdentity = New-Object System.Security.Principal.WindowsIdentity($Principal) if ($null -ne $UserIdentity.Claims) { foreach ($Claim in $UserIdentity.Claims) { $ClaimCounter++ $LastSlash = $Claim.Type.LastIndexOf('/') $ClaimName = $Claim.Value + " (" + ($Claim.Type.Substring($LastSlash+1)) + ")" $ClaimsTable.Add($ClaimName,$Claim.Value) } } } } #Get user object SIDHistories $SIDHistoryResults = GetSIDHistorySIDs $Principal $SIDHistoryCounter = $SIDHistoryResults.count #Resolve SIDHistories if possible to give more detail. if ($null -ne $SIDHistoryResults) { $UserSIDHistoryDetails = New-Object PSObject foreach ($SIDHistory in $SIDHistoryResults) { $SIDHist = New-Object System.Security.Principal.SecurityIdentifier($SIDHistory) $SIDHistName = $SIDHist.Translate([System.Security.Principal.NTAccount]) add-Member -InputObject $UserSIDHistoryDetails -MemberType NoteProperty -Name $SIDHistName -Value $SIDHistory -force } } $GroupSidHistoryCounter = $AllGroupSIDHistories.Count $AllSIDHistories = $SIDHistoryCounter + $GroupSidHistoryCounter #Calculate the current token size. $TokenSize = 0 #Set to zero in case the script is *gasp* ran twice in the same PS. $TokenSize = 1200 + (40 * ($SecurityDomainLocalScope + $SecurityUniversalExternalScope + $AllSIDHistories + $ClaimCounter)) + (8 * ($SecurityGlobalScope + $SecurityUniversalInternalScope)) $DelegatedTokenSize = 2 * (1200 + (40 * ($SecurityDomainLocalScope + $SecurityUniversalExternalScope + $AllSIDHistories + $ClaimCounter)) + (8 * ($SecurityGlobalScope + $SecurityUniversalInternalScope))) #Begin output of details regarding the user into prompt and outfile. "`n" | Out-File $ExportFile -Encoding utf8 -Append "Token Details for user $Principal" | Out-File $ExportFile -Encoding utf8 -Append "**********************************" | Out-File $ExportFile -Encoding utf8 -Append $Username = $UserIdentity.name $PrincipalsDomain = $Username.Split('\')[0] $KerbKey = get-item -Path Registry::HKLM\SYSTEM\CurrentControlSet\Control\LSA\Kerberos\Parameters $MaxTokenSizeValue = $KerbKey.GetValue('MaxTokenSize') if ($null -eq $MaxTokenSizeValue) { if ($OSBuild -lt 9200) {$MaxTokenSizeValue = 12000} if ($OSBuild -ge 9200) {$MaxTokenSizeValue = 48000} } #Assess OS so we can alert based on default for proper OS version. Windows 8 and Server 2012 allow for a larger token size safely. $ProblemDetected = $false $PotentialProblemDetected = $false if (($OSBuild -lt 9200) -and (($Tokensize -ge 12000) -or ((($Tokensize -gt $MaxTokenSizeValue) -or ($DelegatedTokenSize -gt $MaxTokenSizeValue)) -and ($null -ne $MaxTokenSizeValue)))) { #Write-Host "Problem detected. The token was too large for consistent authorization. Alter the maximum size per KB http://support.microsoft.com/kb/327825 and consider reducing direct and transitive group memberships." -backgroundcolor "red" $ProblemDetected = $true } elseif (($OSBuild -ge 9200) -and (($Tokensize -ge 48000) -or ((($Tokensize -gt $MaxTokenSizeValue) -or ($DelegatedTokenSize -gt $MaxTokenSizeValue)) -and ($null -ne $MaxTokenSizeValue)))) { #Write-Host "Problem detected. The token was too large for consistent authorization. Alter the maximum size per KB http://support.microsoft.com/kb/327825 and consider reducing direct and transitive group memberships." -backgroundcolor "red" $ProblemDetected = $true } elseif (($OSBuild -lt 9200) -and (($Tokensize -ge 6000) -or ($DelegatedTokenSize -ge 6000))) { #Write-Host "WARNING: The token was large enough that it may have problems when being used for Kerberos delegation or for access to Active Directory domain controller services. Alter the maximum size per KB http://support.microsoft.com/kb/327825 and consider reducing direct and transitive group memberships." -backgroundcolor "yellow" $PotentialProblemDetected = $true } else { #Write-Host "Problem not detected." -backgroundcolor "green" $ProblemDetected = $false $PotentialProblemDetected = $false } #####Test Root Cause Triggers - COMMENT IN PROD #####$ProblemDetected = $true #####$PotentialProblemDetected = $true $InformationCollected = New-Object PSObject Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Date" -Value (Get-Date) if (($ProblemDetected -eq $true) -or ($PotentialProblemDetected -eq $true)) {Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Problem Detected" -Value $true} else {Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Problem Detected" -Value $false} Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "User Name" -Value $principal Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Domain" -Value (($UserIdentity.name).split("\")[0]) $TokenSizePropertyName = $principal + "'s Estimated Token Size" Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name $TokenSizePropertyName -Value $Tokensize $DelegTokenSizePropertyName = $principal + "'s Estimated Delegation Token Size" Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name $DelegTokenSizePropertyName -Value $DelegatedTokenSize Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Domain Local Groups Count" -Value $SecurityDomainLocalScope Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Domain Global Groups Count" -Value $SecurityGlobalScope Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Universal Groups Count (Local Domain)" -Value $SecurityUniversalInternalScope Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Universal Groups Count (External Domain)" -Value $SecurityUniversalExternalScope Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "User SidHistory SIDs in Token" -Value $SIDHistoryCounter Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Group SidHistory SIDs in Token" -Value $GroupSidHistoryCounter if ($null -eq $ClaimCounter) {add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Windows Claims in Token" -Value "Not Applicable"} else {add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Windows Claims in Token" -Value $ClaimCounter} if ($OSEmulation -eq "12K") {Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Tested Maximum Token Size" -Value $MaxTokenSize} if ($OSEmulation -eq "48K") {Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Tested Maximum Token Size" -Value $MaxTokenSize} if (($OSEmulation -ne "12K") -and ($OSEmulation -ne "48K")) {Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Tested Maximum Token Size" -Value $Maxtokensizevalue} $InformationCollected | Out-File -Encoding UTF8 -Width 500 -FilePath $ExportFile -append if ($OSBuild -ge 9200) { "There are $ClaimCounter total claims for the user in the token." | Out-File $ExportFile -Encoding utf8 -Append "`n" | Out-File $ExportFile -Encoding utf8 -Append "Claim Details" | Out-File $ExportFile -Encoding utf8 -Append $ClaimsTable.Keys | Out-File $ExportFile -Encoding utf8 -Append } "`n" | Out-File $ExportFile -Encoding utf8 -Append "Group Details" | Out-File $ExportFile -Encoding utf8 -Append $GroupDetails | Out-File $ExportFile -encoding utf8 -Width 500 -Append "`n" | Out-File $ExportFile -Encoding utf8 -Append "Group SIDHistory Details" | Out-File $ExportFile -Encoding utf8 -Append if ($null -eq $GroupSIDHistoryDetails) {"[NONE FOUND]" | Out-File $ExportFile -Encoding utf8 -Append } else {$GroupSIDHistoryDetails | Out-File $ExportFile -encoding utf8 -Width 500 -Append} "`n" | Out-File $ExportFile -Encoding utf8 -Append "User SIDHistory Details" | Out-File $ExportFile -Encoding utf8 -Append if ($null -eq $UserSIDHistoryDetails) {"[NONE FOUND]" | Out-File $ExportFile -Encoding utf8 -Append } else {$UserSIDHistoryDetails | Out-File $ExportFile -encoding utf8 -Width 500 -Append} "`n" | Out-File $ExportFile -Encoding utf8 -Append #insert RC firing here if ($ProblemDetected -eq $true) { #Root cause found #Trigger the root cause. RC_MaxTokenSize $InformationCollected } elseif ($PotentialProblemDetected -eq $true) { RC_MaxTokenSizeWarn $InformationCollected } else { #Green light. #$RootCauseName = "RC_MaxTokenSize" #Update-DiagRootCause -id $RootCauseName -Detected $false } $UserCountdown-- } CollectFiles -filesToCollect $ExportFile -fileDescription $MaxTokenfileDescription -sectionDescription $MaxTokenSettingssectionDescription -renameOutput $false # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBOjwwfZBywAg0i # dGAUzyFBnPQHgD+aXHQn2+cQo4KIVKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICwM # hBDC+xn7m8+p8SUCrL++BlL5G8NhbeVex46Do95pMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAd8j4u6CLUsTgUhaCmEuzdguS7mcvhhfGGyKz # PnDZnt2Tr2omPXHYu7OQo8oKNW9D8x1rq02ik16lau0Nh5kgVImUNxfLECosdNNh # 8So0NvZ0CyI96OI+KsBbN7tCSYIZYR7Agqxox3+3QhZu/ZTSQH8IC68iYD41f6LO # TVAbaCOqgddiSY71n2xn4SZuectKFxex23lwvUiuROIFdMkLEd8199Nt8XGPLE2i # a0Ic2r7G20ff+YfYFqpHmGoboZbKvEjUjG+S7IeJ/Qgl8tdUn1od75X88rCMd+6d # xnFlBoWlpqqM6Jehc4MfJUrtz+HoaF56hVmuH0vBfd9xBACTO6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1mniXUs0+VvwBsGEkSGWjMOQhsDvlQfXm # D296VQByAAIGZuspkdNZGBMyMDI0MTAyODExNDA0Ny44ODhaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOh # JgwMQEj+AAEAAAH4MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjMyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # xR23pXYnD2BuODdeXs2Cu/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMT # xgckvZr1JrW0Mi4F15rx/VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf2 # 70SWAAWxQbpVIhhPWCnVV3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3 # vBuxEX2E8X50IgAHsyaR9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgE # qSrX4UiX0etqi7jUtKypgIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcT # KWtddWpnJtyl5e3gHuYoj8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO6 # 9vo/NmJ4R/f1+KucBPJ4yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXp # cU+TMcOvWP8HBWmWJQImTZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRf # gPHfOhIWQ0D8ALCY+LsiwbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1Ns # Bo9V4GZBikzX7ZjWCRgd1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpP # TAs1gd/vUogcdiL51o7shuHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBS9zsZzz57QlT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAYfk8GzzpEVnGl7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbH # B5rcNiRhFHZ93RefdPpc4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQp # gGUzyw3lETZebNLEA17A/CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJx # IuLzFVHacvWxSCKoF9hlSrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0 # UIMjjp9VRFH7nb3Ng2Q4gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35 # qLo7Daw9AsItqjFhbMcG68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI # 0TZvvUWX9ajm6SfLBTEtoTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2 # gxFlDXHCyLp5qB6BoPpc82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziL # fU1SY240OZW8ld4sS8fnybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcn # f1VTm6cmfasScYtElpjqZ9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH # 00KQq+FJT/62SB70g9g/R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5D # nG+aKRzPELCFE9GggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0 # MTAyOTA3MTU1NlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEA # AgIYGzAHAgEAAgITTTAKAgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQCdo1/IodMsNY0IgWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbgg # j5TzOyaNz/noIF8rSswoSMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQ # FD26RPCKzj29tv+B+uFYo+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZ # RY6ZoVliBz9eAi7lBW9kULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0 # pcf9UEdis9BF366M8Ktt8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yq # F0TVFbiwLm8UNadYHPkbzTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg0DuSgTp1aTI8XchyphEd3dpvojUmFNpwz9OcNvMkG7gwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I # 0Zz3WjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # +KOhJgwMQEj+AAEAAAH4MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6 # crrSMA0GCSqGSIb3DQEBCwUABIICACmqtENtJo495FazUtuj87WwtjCeRZsfMrNH # 0aLGq0q6CZwYQCtAFofvhLEwTAwPpznf9euD42dLQ3lMLFwx0Djs+WAWOE76oQY6 # pYkBt2QWlAGtXKn5m3StLq4mqyXkMvqRFZjxsdn1WE9N0pgbIIqdH6hSGBXZA8QO # MiAweP0wpKWAVgPV2qA6IOEAnaAKNti0qSqseVWjdgc1vbkQbfDGP4+8M83nJomZ # l65ztsJN6NozMimE0YNNPXoEoUJ3X2ceYnAoJeLxxUKlpzaO2783uTqBReT+0oes # MXWtVtBsFmaYGv2gAUPq1jDgCprz3ioN824OxjYt05OlSZ+qf1WLBj5D9HANhgj0 # nePfCzlA/FZO4w6VzBaoxD6m1HQuZPWXkNgOcEPxL3J/5kVhwhMv/EMf/gNxc6H9 # pPCNor9jc0w9AdFDVHS3XyMKeDAGGDZhhCYF+q0acfe9mRNztZczcgVUZM3ji+km # L3KuIE1a5Fifg+kxyjt/67HqMX2UOcHZzwjqnuGsU2rKg0b3b5QxTvkONSaao2dY # nRf2qK9eLAnVrU6pjF0T10pFpMz1/jn+39yl7vIjPaCUTFSAzS+oZwfbWhxMN5j6 # Wl2hZFLfrnW1JLIHSwhJoKgEw3EGH5lAROwP2i7gy6gXyo3aSjBlvNmO1HpkBA1e # AdxFNoOs # SIG # End signature block
combined_dataset/train/non-malicious/3371.ps1
3371.ps1
param( [ValidateNotNullOrEmpty()] [ValidateSet('Debug', 'Release')] [System.String]$BuildConfig ) $ProjectPaths = @( "$PSScriptRoot\..\artifacts\$BuildConfig" ) $DependencyMapPath = "$PSScriptRoot\..\artifacts\StaticAnalysisResults\DependencyMap.csv" $DependencyMap = Import-Csv -Path $DependencyMapPath $ModuleManifestFiles = $ProjectPaths | ForEach-Object { Get-ChildItem -Path $_ -Filter "*.psd1" -Recurse | Where-Object { $_.FullName -like "*$($BuildConfig)*" -and ` $_.FullName -notlike "*Netcore*" -and ` $_.FullName -notlike "*dll-Help.psd1*" -and ` $_.FullName -notlike "*Stack*" } } foreach ($ModuleManifest in $ModuleManifestFiles) { Write-Host "checking $($ModuleManifest.Fullname)" $ModuleName = $ModuleManifest.Name.Replace(".psd1", "") $Assemblies = $DependencyMap | Where-Object { $_.Directory.EndsWith($ModuleName) } Import-LocalizedData -BindingVariable ModuleMetadata -BaseDirectory $ModuleManifest.DirectoryName -FileName $ModuleManifest.Name $LoadedAssemblies = @() if ($ModuleMetadata.RequiredAssemblies.Count -gt 0) { $LoadedAssemblies += $ModuleMetadata.RequiredAssemblies } $LoadedAssemblies += $ModuleMetadata.NestedModules if ($ModuleMetadata.RequiredModules) { $RequiredModules = $ModuleMetadata.RequiredModules | ForEach-Object { $_["ModuleName"] } foreach ($RequiredModule in $RequiredModules) { Write-Output ("ModuleManifest: " + $RequiredModuleManifest) Write-Output ("Required Module: " + $RequiredModule) $RequiredModuleManifest = $ModuleManifestFiles | Where-Object { $_.Name.Replace(".psd1", "") -eq $RequiredModule } | Select-Object -First 1 if (-not $RequiredModuleManifest) { continue } $RequiredModuleManifest | ForEach-Object { Import-LocalizedData -BindingVariable ModuleMetadata -BaseDirectory $_.DirectoryName -FileName $_.Name if ($ModuleMetadata.RequiredAssemblies.Count -gt 0) { $LoadedAssemblies += $ModuleMetadata.RequiredAssemblies } $LoadedAssemblies += $ModuleMetadata.NestedModules } } } $LoadedAssemblies = $LoadedAssemblies | ForEach-Object { $_.Substring(2).Replace(".dll", "") } $Found = @() foreach ($Assembly in $Assemblies) { if ($Found -notcontains $Assembly.AssemblyName -and $LoadedAssemblies -notcontains $Assembly.AssemblyName -and $Assembly.AssemblyName -notlike "System.Management.Automation*") { $Found += $Assembly.AssemblyName Write-Error "ERROR: Assembly $($Assembly.AssemblyName) was not included in the required assemblies field for module $ModuleName" } } if ($Found.Count -gt 0) { throw } }
combined_dataset/train/non-malicious/sample_63_54.ps1
sample_63_54.ps1
# # Module manifest for module 'OCI.PSModules.Marketplacepublisher' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Marketplacepublisher.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16f2e498-6e6b-4e22-8c36-b6c2677410c6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Marketplacepublisher Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplacepublisher.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIMarketplacepublisherAndPublishArtifact', 'Enable-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherArtifact', 'Get-OCIMarketplacepublisherArtifactsList', 'Get-OCIMarketplacepublisherAttachment', 'Get-OCIMarketplacepublisherAttachmentContent', 'Get-OCIMarketplacepublisherAttachmentsList', 'Get-OCIMarketplacepublisherCategoriesList', 'Get-OCIMarketplacepublisherCategory', 'Get-OCIMarketplacepublisherListing', 'Get-OCIMarketplacepublisherListingRevision', 'Get-OCIMarketplacepublisherListingRevisionAttachment', 'Get-OCIMarketplacepublisherListingRevisionAttachmentsList', 'Get-OCIMarketplacepublisherListingRevisionNote', 'Get-OCIMarketplacepublisherListingRevisionNotesList', 'Get-OCIMarketplacepublisherListingRevisionPackage', 'Get-OCIMarketplacepublisherListingRevisionPackagesList', 'Get-OCIMarketplacepublisherListingRevisionsList', 'Get-OCIMarketplacepublisherListingsList', 'Get-OCIMarketplacepublisherMarket', 'Get-OCIMarketplacepublisherMarketsList', 'Get-OCIMarketplacepublisherOffer', 'Get-OCIMarketplacepublisherOfferInternalDetail', 'Get-OCIMarketplacepublisherOffersList', 'Get-OCIMarketplacepublisherProduct', 'Get-OCIMarketplacepublisherProductsList', 'Get-OCIMarketplacepublisherPublisher', 'Get-OCIMarketplacepublisherPublishersList', 'Get-OCIMarketplacepublisherTerm', 'Get-OCIMarketplacepublisherTermsList', 'Get-OCIMarketplacepublisherTermVersion', 'Get-OCIMarketplacepublisherTermVersionsList', 'Get-OCIMarketplacepublisherWorkRequest', 'Get-OCIMarketplacepublisherWorkRequestErrorsList', 'Get-OCIMarketplacepublisherWorkRequestLogsList', 'Get-OCIMarketplacepublisherWorkRequestsList', 'Invoke-OCIMarketplacepublisherCascadingDeleteListing', 'Invoke-OCIMarketplacepublisherCascadingDeleteListingRevision', 'Invoke-OCIMarketplacepublisherCloneListingRevision', 'Invoke-OCIMarketplacepublisherMarkListingRevisionPackageAsDefault', 'Invoke-OCIMarketplacepublisherPublishListingRevision', 'Invoke-OCIMarketplacepublisherPublishListingRevisionAsPrivate', 'Invoke-OCIMarketplacepublisherPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherSubmitListingRevisionForReview', 'Invoke-OCIMarketplacepublisherUnPublishListingRevisionPackage', 'Invoke-OCIMarketplacepublisherWithdrawListingRevision', 'Move-OCIMarketplacepublisherArtifactCompartment', 'Move-OCIMarketplacepublisherListingCompartment', 'Move-OCIMarketplacepublisherListingRevisionToNewStatus', 'Move-OCIMarketplacepublisherTermCompartment', 'New-OCIMarketplacepublisherArtifact', 'New-OCIMarketplacepublisherAttachment', 'New-OCIMarketplacepublisherListing', 'New-OCIMarketplacepublisherListingRevision', 'New-OCIMarketplacepublisherListingRevisionAttachment', 'New-OCIMarketplacepublisherListingRevisionNote', 'New-OCIMarketplacepublisherListingRevisionPackage', 'New-OCIMarketplacepublisherOffer', 'New-OCIMarketplacepublisherTerm', 'New-OCIMarketplacepublisherTermVersion', 'Remove-OCIMarketplacepublisherArtifact', 'Remove-OCIMarketplacepublisherAttachment', 'Remove-OCIMarketplacepublisherListing', 'Remove-OCIMarketplacepublisherListingRevision', 'Remove-OCIMarketplacepublisherListingRevisionAttachment', 'Remove-OCIMarketplacepublisherListingRevisionNote', 'Remove-OCIMarketplacepublisherListingRevisionPackage', 'Remove-OCIMarketplacepublisherOffer', 'Remove-OCIMarketplacepublisherTerm', 'Remove-OCIMarketplacepublisherTermVersion', 'Stop-OCIMarketplacepublisherWorkRequest', 'Update-OCIMarketplacepublisherArtifact', 'Update-OCIMarketplacepublisherListing', 'Update-OCIMarketplacepublisherListingRevision', 'Update-OCIMarketplacepublisherListingRevisionAttachment', 'Update-OCIMarketplacepublisherListingRevisionAttachmentContent', 'Update-OCIMarketplacepublisherListingRevisionIconContent', 'Update-OCIMarketplacepublisherListingRevisionPackage', 'Update-OCIMarketplacepublisherOffer', 'Update-OCIMarketplacepublisherTerm', 'Update-OCIMarketplacepublisherTermVersion', 'Update-OCIMarketplacepublisherTermVersionContent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplacepublisher' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_37.ps1
sample_67_37.ps1
# # Add-AppxDevPackage.ps1 is a PowerShell script designed to install app # packages created by Visual Studio for developers. To run this script from # Explorer, right-click on its icon and choose "Run with PowerShell". # # Visual Studio supplies this script in the folder generated with its # "Prepare Package" command. The same folder will also contain the app # package (a .appx file), the signing certificate (a .cer file), and a # "Dependencies" subfolder containing all the framework packages used by the # app. # # This script simplifies installing these packages by automating the # following functions: # 1. Find the app package and signing certificate in the script directory # 2. Prompt the user to acquire a developer license and to install the # certificate if necessary # 3. Find dependency packages that are applicable to the operating system's # CPU architecture # 4. Install the package along with all applicable dependencies # # All command line parameters are reserved for use internally by the script. # Users should launch this script from Explorer. # # .Link # http://go.microsoft.com/fwlink/?LinkId=243053 param( [switch]$Force = $false, [switch]$GetDeveloperLicense = $false, [switch]$SkipLoggingTelemetry = $false, [string]$CertificatePath = $null ) $ErrorActionPreference = "Stop" # The language resources for this script are placed in the # "Add-AppDevPackage.resources" subfolder alongside the script. Since the # current working directory might not be the directory that contains the # script, we need to create the full path of the resources directory to # pass into Import-LocalizedData $ScriptPath = $null try { $ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path $ScriptDir = Split-Path -Parent $ScriptPath } catch {} if (!$ScriptPath) { PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath } $LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources" Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath $ErrorCodes = Data { ConvertFrom-StringData @' Success = 0 NoScriptPath = 1 NoPackageFound = 2 ManyPackagesFound = 3 NoCertificateFound = 4 ManyCertificatesFound = 5 BadCertificate = 6 PackageUnsigned = 7 CertificateMismatch = 8 ForceElevate = 9 LaunchAdminFailed = 10 GetDeveloperLicenseFailed = 11 InstallCertificateFailed = 12 AddPackageFailed = 13 ForceDeveloperLicense = 14 CertUtilInstallFailed = 17 CertIsCA = 18 BannedEKU = 19 NoBasicConstraints = 20 NoCodeSigningEku = 21 InstallCertificateCancelled = 22 BannedKeyUsage = 23 ExpiredCertificate = 24 '@ } $IMAGE_FILE_MACHINE_i386 = 0x014c $IMAGE_FILE_MACHINE_AMD64 = 0x8664 $IMAGE_FILE_MACHINE_ARM64 = 0xAA64 $IMAGE_FILE_MACHINE_ARM = 0x01c0 $IMAGE_FILE_MACHINE_THUMB = 0x01c2 $IMAGE_FILE_MACHINE_ARMNT = 0x01c4 $MACHINE_ATTRIBUTES_UserEnabled = 0x01 $MACHINE_ATTRIBUTES_KernelEnabled = 0x02 $MACHINE_ATTRIBUTES_Wow64Container = 0x04 # First try to use IsWow64Process2 to determine the OS architecture try { $IsWow64Process2_MethodDefinition = @" [DllImport("kernel32.dll", SetLastError = true)] public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine); "@ $Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru $Proc = Get-Process -id $pid $processMachine = New-Object uint16 $nativeMachine = New-Object uint16 $Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine) if ($Res -eq $True) { switch ($nativeMachine) { $IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" } $IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" } $IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" } $IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" } } } } catch { # Ignore exception and fall back to using environment variables to determine the OS architecture } $Amd64AppsSupportedOnArm64 = $False if ($null -eq $ProcessorArchitecture) { $ProcessorArchitecture = $Env:Processor_Architecture # Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment # variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64. # The value will also be x86 on amd64 machines when running the x86 version of PowerShell. if ($ProcessorArchitecture -eq "x86") { if ($null -ne ${Env:ProgramFiles(Arm)}) { $ProcessorArchitecture = "arm64" } elseif ($null -ne ${Env:ProgramFiles(x86)}) { $ProcessorArchitecture = "amd64" } } } elseif ("arm64" -eq $ProcessorArchitecture) { # If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+ # we need to check for a special case where amd64 apps are supported as well. if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000)) { try { $GetMachineTypeAttributes_MethodDefinition = @" [DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)] public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes); "@ $ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru $machineTypeAttributes = New-Object uint16 $ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes) # We're looking for the case where the UserEnabled flag is set if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0) { $Amd64AppsSupportedOnArm64 = $True } } catch { # Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine } } } function PrintMessageAndExit($ErrorMessage, $ReturnCode) { Write-Host $ErrorMessage try { # Log telemetry data regarding the use of the script if possible. # There are three ways that this can be disabled: # 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false # 2. If the SkipLoggingTelemetry switch is passed to this script. # 3. If Visual Studio telemetry is disabled via the registry. $TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies") if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder)) { $job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture Wait-Job -Job $job -Timeout 60 | Out-Null } } catch { # Ignore telemetry errors } if (!$Force) { Pause } exit $ReturnCode } # # Warns the user about installing certificates, and presents a Yes/No prompt # to confirm the action. The default is set to No. # function ConfirmCertificateInstall { $Answer = $host.UI.PromptForChoice( "", $UiStrings.WarningInstallCert, [System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString), 1) return $Answer -eq 0 } # # Validates whether a file is a valid certificate using CertUtil. # This needs to be done before calling Get-PfxCertificate on the file, otherwise # the user will get a cryptic "Password: " prompt for invalid certs. # function ValidateCertificateFormat($FilePath) { # certutil -verify prints a lot of text that we don't need, so it's redirected to $null here certutil.exe -verify $FilePath > $null if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate } # Check if certificate is expired $cert = Get-PfxCertificate $FilePath if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date))) { PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate } } # # Verify that the developer certificate meets the following restrictions: # - The certificate must contain a Basic Constraints extension, and its # Certificate Authority (CA) property must be false. # - The certificate's Key Usage extension must be either absent, or set to # only DigitalSignature. # - The certificate must contain an Extended Key Usage (EKU) extension with # Code Signing usage. # - The certificate must NOT contain any other EKU except Code Signing and # Lifetime Signing. # # These restrictions are enforced to decrease security risks that arise from # trusting digital certificates. # function CheckCertificateRestrictions { Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant $CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions $HasBasicConstraints = $false $HasCodeSigningEku = $false foreach ($Extension in $CertificateExtensions) { # Certificate must contain the Basic Constraints extension if ($Extension.oid.value -eq $BasicConstraintsExtensionOid) { # CA property must be false if ($Extension.CertificateAuthority) { PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA } $HasBasicConstraints = $true } # If key usage is present, it must be set to digital signature elseif ($Extension.oid.value -eq $KeyUsageExtensionOid) { if ($Extension.KeyUsages -ne "DigitalSignature") { PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage } } elseif ($Extension.oid.value -eq $EkuExtensionOid) { # Certificate must contain the Code Signing EKU $EKUs = $Extension.EnhancedKeyUsages.Value if ($EKUs -contains $CodeSigningEkuOid) { $HasCodeSigningEKU = $True } # EKUs other than code signing and lifetime signing are not allowed foreach ($EKU in $EKUs) { if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid) { PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU } } } } if (!$HasBasicConstraints) { PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints } if (!$HasCodeSigningEKU) { PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku } } # # Performs operations that require administrative privileges: # - Prompt the user to obtain a developer license # - Install the developer certificate (if -Force is not specified, also prompts the user to confirm) # function DoElevatedOperations { if ($GetDeveloperLicense) { Write-Host $UiStrings.GettingDeveloperLicense if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } try { Show-WindowsDeveloperLicenseRegistration } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } } if ($CertificatePath) { Write-Host $UiStrings.InstallingCertificate # Make sure certificate format is valid and usage constraints are followed ValidateCertificateFormat $CertificatePath CheckCertificateRestrictions # If -Force is not specified, warn the user and get consent if ($Force -or (ConfirmCertificateInstall)) { # Add cert to store certutil.exe -addstore TrustedPeople $CertificatePath if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed } } else { PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled } } } # # Checks whether the machine is missing a valid developer license. # function CheckIfNeedDeveloperLicense { $Result = $true try { $Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0 } catch {} return $Result } # # Launches an elevated process running the current script to perform tasks # that require administrative privileges. This function waits until the # elevated process terminates, and checks whether those tasks were successful. # function LaunchElevated { # Set up command line arguments to the elevated process $RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"' if ($Force) { $RelaunchArgs += ' -Force' } if ($NeedDeveloperLicense) { $RelaunchArgs += ' -GetDeveloperLicense' } if ($SkipLoggingTelemetry) { $RelaunchArgs += ' -SkipLoggingTelemetry' } if ($NeedInstallCertificate) { $RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"' } # Launch the process and wait for it to finish try { $PowerShellExePath = (Get-Process -Id $PID).Path $AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed } while (!($AdminProcess.HasExited)) { Start-Sleep -Seconds 2 } # Check if all elevated operations were successful if ($NeedDeveloperLicense) { if (CheckIfNeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } else { Write-Host $UiStrings.AcquireLicenseSuccessful } } if ($NeedInstallCertificate) { $Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose if ($Signature.Status -ne "Valid") { PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed } else { Write-Host $UiStrings.InstallCertificateSuccessful } } } # # Finds all applicable dependency packages according to OS architecture, and # installs the developer package with its dependencies. The expected layout # of dependencies is: # # <current dir> # \Dependencies # <Architecture neutral dependencies>.appx\.msix # \x86 # <x86 dependencies>.appx\.msix # \x64 # <x64 dependencies>.appx\.msix # \arm # <arm dependencies>.appx\.msix # \arm64 # <arm64 dependencies>.appx\.msix # function InstallPackageWithDependencies { $DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies") $DependencyPackages = @() if (Test-Path $DependencyPackagesDir) { # Get architecture-neutral dependencies $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } # Get architecture-specific dependencies if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } } Write-Host $UiStrings.InstallingPackage $AddPackageSucceeded = $False try { if ($DependencyPackages.FullName.Count -gt 0) { Write-Host $UiStrings.DependenciesFound $DependencyPackages.FullName Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown } else { Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown } $AddPackageSucceeded = $? } catch { $Error[0] # Dump details about the last error } if (!$AddPackageSucceeded) { if ($NeedInstallCertificate) { PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed } else { PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed } } } # # Main script logic when the user launches the script without parameters. # function DoStandardOperations { # Check for an .appx or .msix file in the script directory $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } if ($PackagePath -eq $null) { $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } } $PackageCount = ($PackagePath | Measure-Object).Count # Check for an .appxbundle or .msixbundle file in the script directory $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($BundlePath -eq $null) { $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $BundleCount = ($BundlePath | Measure-Object).Count # Check for an .eappx or .emsix file in the script directory $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedPackagePath -eq $null) { $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count # Check for an .eappxbundle or .emsixbundle file in the script directory $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedBundlePath -eq $null) { $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count $NumberOfPackages = $PackageCount + $EncryptedPackageCount $NumberOfBundles = $BundleCount + $EncryptedBundleCount # There must be at least one package or bundle if ($NumberOfPackages + $NumberOfBundles -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound } # We must have exactly one bundle OR no bundle and exactly one package elseif ($NumberOfBundles -gt 1 -or ($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1)) { PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound } # First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages if ($BundleCount -eq 1) { $DeveloperPackagePath = $BundlePath Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedBundleCount -eq 1) { $DeveloperPackagePath = $EncryptedBundlePath Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName) } elseif ($PackageCount -eq 1) { $DeveloperPackagePath = $PackagePath Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedPackageCount -eq 1) { $DeveloperPackagePath = $EncryptedPackagePath Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName) } # The package must be signed $PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath $PackageCertificate = $PackageSignature.SignerCertificate if (!$PackageCertificate) { PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned } # Test if the package signature is trusted. If not, the corresponding certificate # needs to be present in the current directory and needs to be installed. $NeedInstallCertificate = ($PackageSignature.Status -ne "Valid") if ($NeedInstallCertificate) { # List all .cer files in the script directory $DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" } $DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count # There must be exactly 1 certificate if ($DeveloperCertificateCount -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound } elseif ($DeveloperCertificateCount -gt 1) { PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound } Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName) # The .cer file must have the format of a valid certificate ValidateCertificateFormat $DeveloperCertificatePath # The package signature must match the certificate file if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath)) { PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch } } $NeedDeveloperLicense = CheckIfNeedDeveloperLicense # Relaunch the script elevated with the necessary parameters if needed if ($NeedDeveloperLicense -or $NeedInstallCertificate) { Write-Host $UiStrings.ElevateActions if ($NeedDeveloperLicense) { Write-Host $UiStrings.ElevateActionDevLicense } if ($NeedInstallCertificate) { Write-Host $UiStrings.ElevateActionCertificate } $IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544") if ($IsAlreadyElevated) { if ($Force -and $NeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } if ($Force -and $NeedInstallCertificate) { Write-Warning $UiStrings.WarningInstallCert } } else { if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate } else { Write-Host $UiStrings.ElevateActionsContinue Pause } } LaunchElevated } InstallPackageWithDependencies } # # Main script entry point # if ($GetDeveloperLicense -or $CertificatePath) { DoElevatedOperations } else { DoStandardOperations PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success } # SIG # Begin signature block # MIImGwYJKoZIhvcNAQcCoIImDDCCJggCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO # +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghoKMIIaBgIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/8sllbhmdgHazXDKfJje5 # ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBABoeIsmpFKWj+/DHcj7a/ppHvpeKsn0Jb20gbWcbk1BJD4HdDsWMZdZv # JyJjJ4swk9l5qsqRgt+WFtqYMoNul3XnXo2zHpSsAeypDGTTtnvrsTtqR5YXRhfB # ZpESj2UIlW9ESxRpmJscJpEwTymVPf81VR+gXiFTCZ1cLuX6YU6A8RFJTS4YifFL # K+4ENafhVH8Rv1ImQIZt817ttK6lMJHA8TvXKHleAt/jfkrUuLZCIt7a8LRRG14h # urv+OD4yRSNTCFBDBEXni7sqBH7vIrfoVoXs1hbLXcV5JYO2CK3yHBDAZNE2163e # IcwCDObIHWcPa2p9u4USrZuCvPH6InehgheUMIIXkAYKKwYBBAGCNwMDATGCF4Aw # ghd8BgkqhkiG9w0BBwKgghdtMIIXaQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYL # KoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgf6H5HE1KKmmasEjpJd+4pr328u4rgtlnMDMQIe/XhvACBmZGUAxe # UhgTMjAyNDA3MDMxOTM4NTQuNDk5WjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDIt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oIIR6jCCByAwggUIoAMCAQICEzMAAAHuBdMCMLKanacAAQAAAe4wDQYJKoZIhvcN # AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0 # NTQ0WhcNMjUwMzA1MTg0NTQ0WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u # czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYD # VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAvvG8pdeihImvMSkuL1S+0RDjkey82Ai1xLVoHqsj # lZa87hM/gKAmuLQRhEo2x01xAnjDsD/Uz3imimpX01OV0ho6SYaRsefX8TCaE2Fj # 88w9DtkQJcgZjgQZoiw10Q0CS9UbbgI7woi7pVUHojyPFe/h4U0d/dU2wtW3kscF # 33SiamNaJ4w2sKgyQJrcLAP4Jql4B8BfX2VnMCkrl4mQU21OX3Jt24YZUTcOXdOC # 3deWVs1Zf1Q6f4kXqxqNiLP9FsJ/2t3hjnR6738CG35OpVasGzUBNdTnnZ9rr0Yy # lhMHq1y+9Drg2fLy88a8tMhHb0PJMvlX6vJnxF0vdO2O6zfx2F+nArAtrKMlxtzs # ArSwO6NP/pCiWbjqw+R1K0s95H6oA5Zlsuu8/GWT45IgwtXWFtYze+7eYkpeVqdR # ygaeyVPEYkSPr2NotXG+V9kRJMN1qzVv426H1xLPbeG4HfslPLICp/TLVZ0OubOk # Bu9jP8mlGRthzCN9bZvZqKB9vbzwTvYwzDiLtC8M1E5CFn5YHf7xFn0zXD1hEI+3 # 7FrkqFbid7gasDZkUqZkA80nzGiM7srNKb1dYxVqrasMAnGmP1l7G/2sZMQf8wk3 # R0gVCfE5t4uDzPbJIrp12PnEqh+fI1pKR22ywNzn7LO3viWzIypk3XI5kpG+aDfK # lNcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQQiM0/GtncIJ69+8Xftr9f3HamCDAf # BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ # hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQl # MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBe # MFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Nl # cnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAM # BgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQE # AwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAd2cgL2thCjlklaQZ2JM1/H/BmY2jrOe+ # xfaNeAJ4fZSsurUt+MF6D1xMkKdb9YiO6yc2VRu66VM52stp/XLH596esu5GJB6r # UroAhpk4ogZMIRX0gcijyNPDJJYLybyk2W+u98hn6RcD40MGXiOhD4/zgLaWJE+y # FF6jJItQkTCSoHmOMFEQnHCLo3VkZKFb+Cd6v/OyhNKj0JgEfX6jDcYyN2QpVcQO # MIjN7TVZUWxfUoKTp41aNz/yOafCXeNYTUlQsf/I96jO2i0irQ8zhFDbPmbY4c55 # mYFHe/wFhw4cAR3S+e0yPYe54mZHzmTl53GLCsRuIK8k7IVOhurAGKW6nTBP/v4N # bnq+1RiB1LS6t1tAJ5vJQH0vT6rYbJGbeeCRdvAh3bBav+11QbRZcS/yoHEMpSTZ # 4mvmp4sVButMlA7dxTBkiSN+MRvTR7M9waaklrnhrSYUOWTdCvI7tLzVYBfg79Ob # Iqz4NH7Uin/RVRAqfd6PKIBePI4fAk/wd9pc9Q+k67pOBM3MOxNTobTjH+wx4DzF # n+ljnWJ3/h2kice2U1wibFuaDpDNLC4rcQaUqRnI9mI5zc5wqbBD2WrdIfune7pU # WlkeURwFMhRUPY0WuylmjRnRC07Ppx0pWI2HkKSuUEl44oHSpS0DwZV/vczqBgCY # aGX66Y6uJ0AwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqG # SIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkg # MjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4X # YDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTz # xXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7 # uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlw # aQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedG # bsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXN # xF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03 # dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 # ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 # UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReT # wDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZ # MBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8 # RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAE # VTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAww # CgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQD # AgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb # 186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG # CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZI # hvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9 # MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2Lpyp # glYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OO # PcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8 # DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA # 0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1Rt # nWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjc # ZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq7 # 7EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ # C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 # y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYID # TTCCAjUCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpFMDAyLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # iKOm1Tb35RcW1Fgg0N2GCsujvpOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOowEskwIhgPMjAyNDA3MDMxODEx # MjFaGA8yMDI0MDcwNDE4MTEyMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6jAS # yQIBADAHAgEAAgIudjAHAgEAAgITTjAKAgUA6jFkSQIBADA2BgorBgEEAYRZCgQC # MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG # SIb3DQEBCwUAA4IBAQBE4RWivvYSLnMBEnFK3IlLOa+c8fq/mtBr1pDBFWCz4Agt # dhhwyVbiLIh3A4FgZwy1MrIffGTxmBPeftsVL+aueNgYHPVYsaHih1Gsb6GhbbKL # rn/azvuunAo/zH6cFeysdxBKPBxJNKTrfrZQ4fnPRJQPv7bHxavvZlDxjZqxnXqS # XzbEOcz6vd6IBULTKcGxW4SV6+5YgnHEdeLn8FB0KanvOkbQF9gGwyT6ehhAvrEQ # miXSZ0gGRAc2pvWuyJKa7hhR/vj0MivoDIGULBVexFlwuHymJHoj1UIiVC7I3+LV # eYLMhrKO4ckRgbeICULsW+OxbkZVOMq4giAUSBznMYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHuBdMCMLKanacAAQAAAe4w # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQgbvolRUZDbw314nUJ8XMKxrHMLAEZtubhzrhOBbVc8lIw # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBPUHcUlYX6vlXX/gz7PuRCJAc/ # aAkvzkH5R5FUYX4wITCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB7gXTAjCymp2nAAEAAAHuMCIEIES0kyAOP6xxbXOOYYN6bsMwqJkw # a1ptD88td/HD1eVSMA0GCSqGSIb3DQEBCwUABIICALNXOYpnt2CSaiNeTTJ7nobf # 8EQqbPRr0t4yblUfCxk3+4BeTBz2zp41N2OrhUrSzFwsf7RI4rm8hUOnoNOEJl+5 # 4V+jmbt8vp90pnDoAtNDWNfpWBCcc7ZngB8WjWSD5a05+LY6W7sXvamKmcY8m8+I # tanN9a0G2fCxfcJrtuNQIBneuPzdgRgkiR6wa2SxCzqbffMN0psK9i3JGRFD37hp # fAK2/nARbcxhQXJ3ZMqkqTHH81pdBH/pq2ejNKUN6BfHWTmzoMEjwYJbWQZw9Fti # xmkfRM7kRj+PEGKBZa/Y7wvYOemmaPLNR3XJI3KPpPYoUs0S78lJW+41gjWqwrlW # oyO8Ax6p0W6AbCWKfJp0z8KzKduZXR9AO+zA/z0Y9JhCNSeXfSUq/WjNNZgU0yh0 # /tPLug4KjRBjBjMOw9veVeQ1LvqaK0HpJogA5vwB4EtQiKZ6KmRJ702IZVpsu8kO # zD/2zS0EIb3A1iCde9ZTYQyMGrtOaRpVU8d/cCH9FLF8J/SNd7wQPDvmO1rbl8os # NLKoDU2i8zTlu9CEqo90Rkh+eF1VTcV4epAfwp0u9/z0QtAbjGhMweAicwu7ur8R # G/arXTwyFC4UvOJlbi9h6wzdcXQvn2ywsJvSpWlpumoudCP7uKG0/DRoMRmBv3RN # SnibEy3jIaqABSI4A+QN # SIG # End signature block
combined_dataset/train/non-malicious/971.ps1
971.ps1
$SubscriptionId = '<replace with your subscription id>' $resourceGroupName = "myResourceGroup-$(Get-Random)" $location = "westus2" $firstPoolName = "MyFirstPool" $secondPoolName = "MySecondPool" $adminSqlLogin = "SqlAdmin" $password = "<EnterYourComplexPasswordHere>" $serverName = "server-$(Get-Random)" $firstDatabaseName = "myFirstSampleDatabase" $secondDatabaseName = "mySecondSampleDatabase" $startIp = "0.0.0.0" $endIp = "0.0.0.0" Set-AzContext -SubscriptionId $subscriptionId $resourceGroup = New-AzResourceGroup -Name $resourceGroupName -Location $location $server = New-AzSqlServer -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -Location $location ` -SqlAdministratorCredentials $(New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $adminSqlLogin, $(ConvertTo-SecureString -String $password -AsPlainText -Force)) $serverFirewallRule = New-AzSqlServerFirewallRule -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -FirewallRuleName "AllowedIPs" -StartIpAddress $startIp -EndIpAddress $endIp $firstPool = New-AzSqlElasticPool -ResourceGroupName $resourceGroupName ` -ServerName $servername ` -ElasticPoolName $firstPoolName ` -Edition "Standard" ` -Dtu 50 ` -DatabaseDtuMin 10 ` -DatabaseDtuMax 20 $secondPool = New-AzSqlElasticPool -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -ElasticPoolName $secondPoolName ` -Edition "Standard" ` -Dtu 50 ` -DatabaseDtuMin 10 ` -DatabaseDtuMax 50 $firstDatabase = New-AzSqlDatabase -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -DatabaseName $firstDatabaseName ` -ElasticPoolName $firstPoolName $secondDatabase = New-AzSqlDatabase -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -DatabaseName $secondDatabaseName ` -ElasticPoolName $secondPoolName $firstDatabase = Set-AzSqlDatabase -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -DatabaseName $firstDatabaseName ` -ElasticPoolName $secondPoolName $firstDatabase = Set-AzSqlDatabase -ResourceGroupName $resourceGroupName ` -ServerName $serverName ` -DatabaseName $firstDatabaseName ` -RequestedServiceObjectiveName "S0"
combined_dataset/train/non-malicious/sample_51_2.ps1
sample_51_2.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for SmsReceiver. .Description Create an in-memory object for SmsReceiver. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.SmsReceiver .Link https://learn.microsoft.com/powershell/module/Az.Monitor/new-azactiongroupsmsreceiverobject #> function New-AzActionGroupSmsReceiverObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.SmsReceiver')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(Mandatory, HelpMessage="The country code of the SMS receiver.")] [string] $CountryCode, [Parameter(Mandatory, HelpMessage="The name of the SMS receiver. Names must be unique across all receivers within an action group.")] [string] $Name, [Parameter(Mandatory, HelpMessage="The phone number of the SMS receiver.")] [string] $PhoneNumber ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.SmsReceiver]::New() if ($PSBoundParameters.ContainsKey('CountryCode')) { $Object.CountryCode = $CountryCode } if ($PSBoundParameters.ContainsKey('Name')) { $Object.Name = $Name } if ($PSBoundParameters.ContainsKey('PhoneNumber')) { $Object.PhoneNumber = $PhoneNumber } return $Object } } # SIG # Begin signature block # MIIoKwYJKoZIhvcNAQcCoIIoHDCCKBgCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBZSc59V4EVLg0v # BHu4GG8TolNn788sxe+4lKQbOy1hyqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgswghoHAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICMjiOoa9i0IysTpS6G61f1p # 3i4eZDYCIs0s9jWr1c2cMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAFtCDYuitGBB7QEEd9/JiztuyZhTujfAOC/HnF+UbO+3yhsFAQuRIB+E6 # Z439VMizAi3ArJz+WH17rITNxGuWbd2D8E/WKDLnE6y4bdTX13lnz+oBc4ONhPi8 # gV7b59rr2FOmgY1Doj9yQzxGyursggCu0yiknCuqaVCwD/fnkNWGcIjf0oZ/TTY7 # dqFKcx/5zJwV4rIJfTM7atB365/94jj0HzaEOrz/tumxXwhEUfsPHZ6E2UBrn1qL # nLDKBuBzmnJV2ba3KyTXtEv1tTzDlMnn3gjqlAjfdEfMQfmDplL70ZfQxasli5GO # 7IG9uwhk693oUFVNkixMF4SllilDgaGCF5UwgheRBgorBgEEAYI3AwMBMYIXgTCC # F30GCSqGSIb3DQEHAqCCF24wghdqAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFQBgsq # hkiG9w0BCRABBKCCAT8EggE7MIIBNwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCvF+gdS7AtEJsLQSjfwZGQawOrNAi+dVuTfcyDz1rRegIGZjOaa5v+ # GBEyMDI0MDUxNjA2NDIxMi4xWjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # 7TCCByAwggUIoAMCAQICEzMAAAHviT9WoVjMqNoAAQAAAe8wDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTQ4 # WhcNMjUwMzA1MTg0NTQ4WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEAowtY4p8M4B8ITmpGaste6BOASASrJuZF+A1JggViNJRV # aRIiuZmdioefbKC+J7OdqYRTEGBhuZMqQoqbp4MD/TaG+FRlROmqDKOYWfTcrV0e # WUYG/WfDUehJiyiAkYQ+LKIzzIP0ZxkU3HX+/02L8jNdIy45i8ihHoDB37yMD5jP # gD+4c0C3xMQ3agidruuBneV5Z6xTpLuVPYyzipNcu9HPk8LdOP0S6q7r9Xxj/C5m # JrR76weE3AbAA10pnBY4dFYEJF+M1xcKpyBvK4GPsw6iWEDWT/DtWKOJEnJB0+N1 # wtKDONMntvvZf602IgxTN55WXto4bTpBgjuhqok6edMSPSE6SV4tLxHpPAHo0+Dy # jBDtmz8VOt6et7mW43TeS/pYCHAjTAjSNEiKKUuIGlUeEsvyKA79bw1qXviNvPys # vI1k3nndDtx8TyTGal+EAdyOg58Gax4ip+qBN/LYAUwggCrxKGDk4O69pRdCLm7f # 9/lT7yrUwlG2TxThvI2bfaugBaHZb0J7YqJWCGLakqy8lwECJVxoWeIDXL+Hb9WA # IpZ21gPQrJ2IfjihBa/+MODOvZSPsmqGdy/7f1H16U//snO4UvxaJXJqxhSUwWJU # uJxNXLim5cGf1Dhtuki4QzjVlxmQyjCSjed6Di0kpOJXUdB5bG0+IXi5VpThJSUC # AwEAAaOCAUkwggFFMB0GA1UdDgQWBBTtTFqihcKwm7a8PT/AOt2wFUicyzAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIH # gDANBgkqhkiG9w0BAQsFAAOCAgEAGBmWt2gg7nW5PRFXZD/MXEBmbiACD0cfStQg # O7kcwbfNHwtGlpLmGIUDLxxyUR1KG0jOFMN8ze3xxDfIYWgQ2/TUWhpxVnbR8Zif # XjM+iaZ+ioiMovVOToO0Ak2TJde59sOHnXaub7ZOK0Vjlb6YgwRiQESol1gfbtos # dFh9hDBRh6oyIY1lF4T4EeAujShTVx71r13nCdll6yZ770BlwHzSRhEyWRqUeNZ1 # Dd4o34gkoxQ8Wphj7MuYmLvdOB7/brkl2HeZtCcX9ljSUl5DxpTYaztu6T8YE9dd # ZsgEetUt0toXOe9szfcqCRDmxPfFcuShDN2V+d3C3nzfNRdQvaf3ACpBOrvVeq8s # pf6koMbtVKnjmQrRv4mh0ijKMTOzKuEjBbD0//InjncApWKXMNAo2XuSgcdsS2uA # dZ3hYm/CfP4EqLIzHRd5x4sh8dWHnWQ7cUkoHoHibItH21IHc7FTCWL6lcOdlqkD # btBkQu/Wbla3lFSnQiZlDARwaU6elRaKS9CX+Eq4IPs0Q/YsG3Pbma5/vPaHaSJ2 # 852K5zyh4jtuqntXpDcJf3e66NiLT/5YIc9A6A+5BBnopCiVh3baO3lSaCYZK1HG # p07lB9PIPjWMBukvj4wUgfzcjRemx2v8UfnHgGIXI8dIgYr/dDJ9CYhn5wNv4S4+ # Xr4U3AIwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3 # DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw # MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx # MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/ # XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1 # hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7 # M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K # Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy # 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80 # 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc # NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha # YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL # iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV # 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG # CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp # zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT # MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI # KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG # MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a # GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br # aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG # AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN # AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 # OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA # A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz # aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L # GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m # Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0 # SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko # JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm # PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482 # 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7 # vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC # AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAl # BgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1RTAtRDk0NzElMCMGA1UEAxMc # TWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAS3CP # NYMW3mtRMdphW18e3JPtIP+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnv5GowIhgPMjAyNDA1MTYwMTQ4MjZa # GA8yMDI0MDUxNzAxNDgyNlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6e/kagIB # ADAKAgEAAgIEtwIB/zAHAgEAAgITdDAKAgUA6fE16gIBADA2BgorBgEEAYRZCgQC # MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG # SIb3DQEBCwUAA4IBAQC7QUpOJ/q0k3jGUFIaCfdhhnYY/45O8TFy7tlhe4U/aUQ6 # 3A88rj2/y6ylXKh6+I0IW45Ivq2PIS9Os5B+p7HieFtOvM3goT7TbNJ7Em05/Xy+ # 1N0Obrx76wxCRY+or06Hs/BBgWmlm+dSpcvFFToMTkztysARxLOwEplVRfYKXHQh # bRwYAFHeN5eocv5Q+Br5quCLBj6oWqrB4UTQx9hfs1DTY14UQiWej91kggkK7r2q # 96b0H6B84jyUfl8XvXLZej0nFwBoxpQ3PDN4+1zqcUyt+Av3B+UbJbeTUFwnG2xu # BKhXP4xrxobJ7wgPIkty2EbWz+qTntFlhAfkHxkcMYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8w # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQg0eR7UVrveIT0FJsV/6NGLHUCKwo+tkdAF+zawFSGvnIw # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDwYShFuBaN8FM9PTUMdmtA23Hb # F/I6LzOS4sx5p8l/ozCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB74k/VqFYzKjaAAEAAAHvMCIEIHIP4YJx5JQK8xmwZKJ/os7bJIq/ # XrSpE7QctoSYNpfjMA0GCSqGSIb3DQEBCwUABIICAA65Fd4GxsmYZyhleyZ6q8Lk # GfnmbMEszgqvcz7SW3TNw5RFTPpQwcfpU5rdmKom69zZyAPqX/tk8VV5cY/1Gf1f # oHowQK26BVLuB7NCP0YJN0F3Y1mi50oRo7zQCAwYz86fiIvL7+7vE1nmWkMPNsdh # pSoh5bQ8E8USbl5CzA+KNDBUorcVZOw2yMdt8pGfLhbWTJ05+PfXkikdOn2SBCAU # A5RfqCK05ouHUmKubdx5TEF1/bQ8xF8KmPy6Ih9ztg0P8FUMYIOtJzJY5K7ycXde # 7GM3W3YyQBsJIW+hZQUsBO+nKMjIC01HfDJ+B9ypVnLZ3xIDiO3KK/mhjrjQhOGo # Xfxv+RfCKBLxk0fOLV0HmJYANT/P+jgCODFAkFG1oUB/Xj0ArKkIefZlNqagtKWs # rXQ8LrAPNPTFKg8CdE3lfLLmErPHnevqzxERXuaMO5/kJxsl0LBMN/T78xcnlQ0W # XEKjinjZtu0/8L5rwOzwEsD4cn8XBhvHkMxboaaoRgluXvRhjsmSZvGPrUXFkHCn # 4bXwg+PGIeOzfrY/ToZedN3bw31V9gcIhIYRk243g15GXJfsXHqGC1xegufmflkl # iKdyE/0LJEg/TeLHUX7qEOv8U7RmTPhMIWCMJ59M7DOB8O2fFdb405p/a+imuuzI # BLMWpGpPftw5NktN+FKI # SIG # End signature block
combined_dataset/train/non-malicious/1957.ps1
1957.ps1
Describe "Select-String" -Tags "CI" { BeforeAll { $nl = [Environment]::NewLine $currentDirectory = $pwd.Path } AfterAll { Push-Location $currentDirectory } Context "String actions" { $testinputone = "hello","Hello","goodbye" $testinputtwo = "hello","Hello" it "Should be called without errors" { { $testinputone | Select-String -Pattern "hello" } | Should -Not -Throw } it "Should return an array data type when multiple matches are found" { $result = $testinputtwo | Select-String -Pattern "hello" ,$result | Should -BeOfType "System.Array" } it "Should return an object type when one match is found" { $result = $testinputtwo | Select-String -Pattern "hello" -CaseSensitive ,$result | Should -BeOfType "System.Object" } it "Should return matchinfo type" { $result = $testinputtwo | Select-String -Pattern "hello" -CaseSensitive ,$result | Should -BeOfType "Microsoft.PowerShell.Commands.MatchInfo" } it "Should be called without an error using ca for casesensitive " { {$testinputone | Select-String -Pattern "hello" -ca } | Should -Not -Throw } it "Should use the ca alias for casesensitive" { $firstMatch = $testinputtwo | Select-String -Pattern "hello" -CaseSensitive $secondMatch = $testinputtwo | Select-String -Pattern "hello" -ca $equal = @(Compare-Object $firstMatch $secondMatch).Length -eq 0 $equal | Should -Be True } it "Should only return the case sensitive match when the casesensitive switch is used" { $testinputtwo | Select-String -Pattern "hello" -CaseSensitive | Should -Be "hello" } it "Should accept a collection of strings from the input object" { { Select-String -InputObject "some stuff", "other stuff" -Pattern "other" } | Should -Not -Throw } it "Should return system.object when the input object switch is used on a collection" { $result = Select-String -InputObject "some stuff", "other stuff" -pattern "other" ,$result | Should -BeOfType "System.Object" } it "Should return null or empty when the input object switch is used on a collection and the pattern does not exist" { Select-String -InputObject "some stuff", "other stuff" -Pattern "neither" | Should -BeNullOrEmpty } it "Should return a bool type when the quiet switch is used" { ,($testinputtwo | Select-String -Quiet "hello" -CaseSensitive) | Should -BeOfType "System.Boolean" } it "Should be true when select string returns a positive result when the quiet switch is used" { ($testinputtwo | Select-String -Quiet "hello" -CaseSensitive) | Should -BeTrue } it "Should be empty when select string does not return a result when the quiet switch is used" { $testinputtwo | Select-String -Quiet "goodbye" | Should -BeNullOrEmpty } it "Should return an array of non matching strings when the switch of NotMatch is used and the string do not match" { $testinputone | Select-String -Pattern "goodbye" -NotMatch | Should -BeExactly "hello", "Hello" } it "Should output a string with the first match highlighted" { if ($Host.UI.SupportsVirtualTerminal -and !(Test-Path env:__SuppressAnsiEscapeSequences)) { $result = $testinputone | Select-String -Pattern "l" | Out-String $result | Should -Be "${nl}he`e[7ml`e[0mlo${nl}He`e[7ml`e[0mlo${nl}${nl}" } else { $result = $testinputone | Select-String -Pattern "l" | Out-String $result | Should -Be "${nl}hello${nl}Hello${nl}${nl}" } } it "Should output a string with all matches highlighted when AllMatch is used" { if ($Host.UI.SupportsVirtualTerminal -and !(Test-Path env:__SuppressAnsiEscapeSequences)) { $result = $testinputone | Select-String -Pattern "l" -AllMatch | Out-String $result | Should -Be "${nl}he`e[7ml`e[0m`e[7ml`e[0mo${nl}He`e[7ml`e[0m`e[7ml`e[0mo${nl}${nl}" } else { $result = $testinputone | Select-String -Pattern "l" -AllMatch | Out-String $result | Should -Be "${nl}hello${nl}Hello${nl}${nl}" } } it "Should output a string with the first match highlighted when SimpleMatch is used" { if ($Host.UI.SupportsVirtualTerminal -and !(Test-Path env:__SuppressAnsiEscapeSequences)) { $result = $testinputone | Select-String -Pattern "l" -SimpleMatch | Out-String $result | Should -Be "${nl}he`e[7ml`e[0mlo${nl}He`e[7ml`e[0mlo${nl}${nl}" } else { $result = $testinputone | Select-String -Pattern "l" -SimpleMatch | Out-String $result | Should -Be "${nl}hello${nl}Hello${nl}${nl}" } } it "Should output a string without highlighting when NoEmphasis is used" { $result = $testinputone | Select-String -Pattern "l" -NoEmphasis | Out-String $result | Should -Be "${nl}hello${nl}Hello${nl}${nl}" } it "Should return an array of matching strings without virtual terminal sequences" { $testinputone | Select-String -Pattern "l" | Should -Be "hello", "hello" } It "Should return a string type when -Raw is used" { $result = $testinputtwo | Select-String -Pattern "hello" -CaseSensitive -Raw $result | Should -BeOfType "System.String" } It "Should return ParameterBindingException when -Raw and -Quiet are used together" { { $testinputone | Select-String -Pattern "hello" -Raw -Quiet -ErrorAction Stop } | Should -Throw -ExceptionType ([System.Management.Automation.ParameterBindingException]) } } Context "Filesystem actions" { $testDirectory = $TestDrive $testInputFile = Join-Path -Path $testDirectory -ChildPath testfile1.txt BeforeEach { New-Item $testInputFile -Itemtype "file" -Force -Value "This is a text string, and another string${nl}This is the second line${nl}This is the third line${nl}This is the fourth line${nl}No matches" } AfterEach { Remove-Item $testInputFile -Force } It "Should return an object when a match is found is the file on only one line" { $result = Select-String $testInputFile -Pattern "string" ,$result | Should -BeOfType "System.Object" } It "Should return an array when a match is found is the file on several lines" { $result = Select-String $testInputFile -Pattern "in" ,$result | Should -BeOfType "System.Array" $result[0] | Should -BeOfType "Microsoft.PowerShell.Commands.MatchInfo" } It "Should return the name of the file and the string that 'string' is found if there is only one lines that has a match" { $expected = $testInputFile + ":1:This is a text string, and another string" Select-String $testInputFile -Pattern "string" | Should -BeExactly $expected } It "Should return all strings where 'second' is found in testfile1 if there is only one lines that has a match" { $expected = $testInputFile + ":2:This is the second line" Select-String $testInputFile -Pattern "second"| Should -BeExactly $expected } It "Should return all strings where 'in' is found in testfile1 pattern switch is not required" { $expected1 = "This is a text string, and another string" $expected2 = "This is the second line" $expected3 = "This is the third line" $expected4 = "This is the fourth line" (Select-String in $testInputFile)[0].Line | Should -BeExactly $expected1 (Select-String in $testInputFile)[1].Line | Should -BeExactly $expected2 (Select-String in $testInputFile)[2].Line | Should -BeExactly $expected3 (Select-String in $testInputFile)[3].Line | Should -BeExactly $expected4 (Select-String in $testInputFile)[4].Line | Should -BeNullOrEmpty } It "Should return empty because 'for' is not found in testfile1 " { Select-String for $testInputFile | Should -BeNullOrEmpty } It "Should return the third line in testfile1 and the lines above and below it " { $expectedLine = "testfile1.txt:2:This is the second line" $expectedLineBefore = "testfile1.txt:3:This is the third line" $expectedLineAfter = "testfile1.txt:4:This is the fourth line" Select-String third $testInputFile -Context 1 | Should -Match $expectedLine Select-String third $testInputFile -Context 1 | Should -Match $expectedLineBefore Select-String third $testInputFile -Context 1 | Should -Match $expectedLineAfter } It "Should return the number of matches for 'is' in textfile1 " { (Select-String is $testInputFile -CaseSensitive).count| Should -Be 4 } It "Should return the third line in testfile1 when a relative path is used" { $expected = "testfile1.txt:3:This is the third line" $relativePath = Join-Path -Path $testDirectory -ChildPath ".." $relativePath = Join-Path -Path $relativePath -ChildPath $TestDirectory.Name $relativePath = Join-Path -Path $relativePath -ChildPath testfile1.txt Select-String third $relativePath | Should -Match $expected } It "Should return the fourth line in testfile1 when a relative path is used" { $expected = "testfile1.txt:5:No matches" Push-Location $testDirectory Select-String matches (Join-Path -Path $testDirectory -ChildPath testfile1.txt) | Should -Match $expected Pop-Location } It "Should return the fourth line in testfile1 when a regular expression is used" { $expected = "testfile1.txt:5:No matches" Select-String 'matc*' $testInputFile -CaseSensitive | Should -Match $expected } It "Should return the fourth line in testfile1 when a regular expression is used, using the alias for casesensitive" { $expected = "testfile1.txt:5:No matches" Select-String 'matc*' $testInputFile -ca | Should -Match $expected } It "Should return all strings where 'in' is found in testfile1, when -Raw is used." { $expected1 = "This is a text string, and another string" $expected2 = "This is the second line" $expected3 = "This is the third line" $expected4 = "This is the fourth line" (Select-String in $testInputFile -Raw)[0] | Should -BeExactly $expected1 (Select-String in $testInputFile -Raw)[1] | Should -BeExactly $expected2 (Select-String in $testInputFile -Raw)[2] | Should -BeExactly $expected3 (Select-String in $testInputFile -Raw)[3] | Should -BeExactly $expected4 (Select-String in $testInputFile -Raw)[4] | Should -BeNullOrEmpty } It "Should ignore -Context parameter when -Raw is used." { $expected = "This is the second line" Select-String second $testInputFile -Raw -Context 2,2 | Should -BeExactly $expected } } }
combined_dataset/train/non-malicious/sample_61_62.ps1
sample_61_62.ps1
#------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. #------------------------------------------------------------------------- Function CheckConfigureAccountPermissionsPrerequisites { # Check if all the features installed by RSAT-AD-Tools are available. These are required for the AdSyncConfig module if (((Get-WindowsFeature RSAT-AD-PowerShell).InstallState -ne "Installed") -or ((Get-WindowsFeature RSAT-AD-AdminCenter).InstallState -ne "Installed") -or ((Get-WindowsFeature RSAT-ADDS-Tools).InstallState -ne "Installed") -or ((Get-WindowsFeature RSAT-ADLDS).InstallState -ne "Installed")) { $installRSATOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No") $canInstall = !($host.UI.PromptForChoice("RSAT-AD-Tools Warning", "The use of these options requires 'Remote Server Administration Tools for AD DS' to be installed. Is it okay to install them now?", $installRSATOptions, 0)) if (!$canInstall) { return $false } Try { $installState = $null $osVersion = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" -Name ProductName).ProductName if ($osVersion -Like "*Windows Server 2008 R2*") { $installState = Add-WindowsFeature RSAT-AD-Tools } else { $installState = Install-WindowsFeature RSAT-AD-Tools } if ($installState.RestartNeeded -eq "Yes") { $restartOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Restart Now", "&Back to Previous Menu") $confirmRestart = !($host.UI.PromptForChoice("Feature Install Warning", "A restart is required to complete installation of the RSAT-AD-Tools Windows Feature. Is it okay to restart now?", $installRSATOptions, 0)) if ($confirmRestart) { Restart-Computer } else { return $false } } } Catch { Write-Host "[ERROR]`t Installing RSAT-AD-Tools Windows Feature failed." Exit 1 } } if (-not (Get-Module ActiveDirectory)) { Import-Module ActiveDirectory -ErrorAction Stop } # These options make use of the AdSyncConfig module included with the product Try { $aadConnectRegKey = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Azure AD Connect" $aadConnectWizardPath = $aadConnectRegKey.WizardPath $aadConnectWizardFileName = "AzureADConnect.exe" $aadConnectPathLength = $aadConnectWizardPath.IndexOf($aadConnectWizardFileName) $aadConnectPath = $aadConnectWizardPath.Substring(0, $aadConnectPathLength) $adSyncConfigModulePath = [System.IO.Path]::Combine($aadConnectPath, "AdSyncConfig\AdSyncConfig.psm1") Import-Module $adSyncConfigModulePath -ErrorAction Stop } Catch { Write-Host "[ERROR]`t Importing the AdSyncTools module failed." Exit 1 } return $true } Function ConfigureAccountPermissions { param ( [string] [parameter(mandatory=$true)] $ConfigurationOption ) Write-Host "`r`n" if ($ConfigurationOption -eq "GetADSyncADConnectorAccount") { $allAccounts = Get-ADSyncADConnectorAccount Write-Host ($allAccounts | Format-Table -Wrap -AutoSize -Property ADConnectorName, ADConnectorForest, ADConnectorAccountName,ADConnectorAccountDomain | Out-String) } elseif ($ConfigurationOption -eq "GetADSyncObjectsWithInheritanceDisabled") { Write-Host "`r`n" $targetForest = Read-Host "Please enter the forest to search for objects" Write-Host "`r`n" $searchBase = Read-Host "Please enter the search base for the LDAP query, it can be an AD Domain DistinguishedName or a FQDN" Write-Host "`r`n" $objectClass = Read-Host "Please enter the object class. It can be '*' (for any object class), 'user', 'group', 'container', etc. Giving no input will use the default, 'organizationalUnit'" if ($targetForest -ne (Get-ADForest).Name) { $targetForestCredentials = Get-Credential -Message "Please enter credentials for target forest '$targetForest' in DOMAIN\username format" if ($objectClass) { Write-Host (Get-ADSyncObjectsWithInheritanceDisabled -SearchBase $searchBase -ObjectClass $objectClass -TargetForest $targetForest -TargetForestCredential $targetForestCredentials | Out-String) } else { Write-Host (Get-ADSyncObjectsWithInheritanceDisabled -SearchBase $searchBase -TargetForest $targetForest -TargetForestCredential $targetForestCredentials | Out-String) } } else { if ($objectClass) { Write-Host (Get-ADSyncObjectsWithInheritanceDisabled -SearchBase $searchBase -ObjectClass $objectClass | Out-String) } else { Write-Host (Get-ADSyncObjectsWithInheritanceDisabled -SearchBase $searchBase | Out-String) } } } elseif ($ConfigurationOption -eq "ShowADSyncADObjectPermissions") { Write-Host "`r`n" $targetForest = Read-Host "Please enter the forest where the object exists" $objectToCheck = Read-Host "Please enter the DistinguishedName of the object to view the permissions on" if ($targetForest -ne (Get-ADForest).Name) { $targetForestCredentials = Get-Credential -Message "Please enter credentials for target forest '$targetForest' in DOMAIN\username format" Write-Host (Show-ADSyncADObjectPermissions -ADobjectDN $objectToCheck -TargetForestCredential $targetForestCredentials | Out-String) } else { Write-Host (Show-ADSyncADObjectPermissions -ADobjectDN $objectToCheck | Out-String) } } else { if ($ConfigurationOption -eq "SetADSyncDefaultPermssions") { Write-Host "`r`n" Write-Host "This option will set permissions required for the following:" Write-Host " Password Hash Sync" Write-Host " Password Writeback" Write-Host " Hybrid Exchange" Write-Host " Exchange Mail Public Folder" Write-Host " MsDsConsistencyGuid" Write-Host "It will then restrict permissions" $confirmDefaultOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No") $confirmDefaultChoice = !($host.UI.PromptForChoice("Confirm", "Would you like to continue with these options?", $confirmDefaultOptions, 0)) if (!$confirmDefaultChoice) { return } } $configureArguments = @{ } $accountTypeOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Existing Connector Account", "&Custom Account") $accountTypeChoice = $host.UI.PromptForChoice("Account to Configure", "Would you like to configure an existing connector account or a custom account?", $accountTypeOptions, 0) if ($accountTypeChoice) { Write-Host "`r`n" $accountChoiceOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Distinguished Name", "&Account Name and Account Domain") $accountInputChoice = $host.UI.PromptForChoice("Account Information", "How would you like to input the account information?", $accountChoiceOptions, 0) Write-Host "`r`n" $targetForest = Read-Host "Please enter the forest on which to configure the account" if ($accountInputChoice) { $connectorAccountName = Read-Host "Please enter the Account Name" $connectorAccountDomain = Read-Host "Please enter the Account Domain" $configureArguments.Add("ADConnectorAccountName", $connectorAccountName) $configureArguments.Add("ADConnectorAccountDomain", $connectorAccountDomain) } else { Write-Host "`r`n" $connectorAccountDN = Read-Host "Please enter the Account Distinguished Name" $configureArguments.Add("ADConnectorAccountDN", $connectorAccountDN) } } else { $allAccounts = Get-ADSyncADConnectorAccount $selectedConnector = $null while ($selectedConnector -eq $null) { Write-Host "`r`n" Write-Host "Configured connectors and their related accounts:" Write-Host ($allAccounts | Out-String) Write-Host "`r`n" $connectorSelection = Read-Host "Name of the connector who's account to configure" if ($allAccounts.ADConnectorName -contains $connectorSelection) { $selectedConnector = $allAccounts | Where-Object { $_.ADConnectorName -like $connectorSelection } $configureArguments.Add("ADConnectorAccountName", $selectedConnector.ADConnectorAccountName) $configureArguments.Add("ADConnectorAccountDomain", $selectedConnector.ADConnectorAccountDomain) $targetForest = $selectedConnector.ADConnectorForest } else { Write-Host "`r`n" ReportWarning "'$connectorSelection' is not a configured connector. Please try again!" } } } if ($targetForest -ne (Get-ADForest).Name) { $targetForestCredentials = Get-Credential -Message "Please enter credentials for target forest '$targetForest' in DOMAIN\username format" $configureArguments.Add("TargetForest", $targetForest) $configureArguments.Add("TargetForestCredential", $targetForestCredentials) } Write-Host "`r`n" if (($ConfigurationOption -eq "SetADSyncRestrictedPermissions") -or ($ConfigurationOption -eq "SetADSyncDefaultPermssions")) { if ($configureArguments.ContainsKey("ADConnectorAccountName")) { $ldapFilter = "(|(Name=" + $configureArguments.ADConnectorAccountName + ")(sAMAccountName=" + $configureArguments.ADConnectorAccountName + "))" if ($targetForest -ne (Get-ADForest).Name) { $adObject = Get-ADObject -LDAPFilter $ldapFilter -Server $configureArguments.ADConnectorAccountDomain -Properties distinguishedName -Credential $configureArguments.TargetForestCredential -ErrorAction Stop } else { $adObject = Get-ADObject -LDAPFilter $ldapFilter -Server $configureArguments.ADConnectorAccountDomain -Properties distinguishedName -ErrorAction Stop } $configureArguments.Remove("ADConnectorAccountName") $configureArguments.Remove("ADConnectorAccountDomain") $configureArguments.Add("ADConnectorAccountDN", $adObject.distinguishedName) } $adminCredential = Get-Credential -Message "Please enter Administrator credentials that have the necessary privileges to restrict the permissions on the Connector Account" if ($ConfigurationOption -eq "SetADSyncDefaultPermssions") { Write-Host (Set-ADSyncPasswordHashSyncPermissions @configureArguments | Out-String) Write-Host (Set-ADSyncPasswordWritebackPermissions @configureArguments | Out-String) Write-Host (Set-ADSyncExchangeHybridPermissions @configureArguments | Out-String) Write-Host (Set-ADSyncExchangeMailPublicFolderPermissions @configureArguments | Out-String) Write-Host (Set-ADSyncMsDsConsistencyGuidPermissions @configureArguments | Out-String) $configureArguments.Add("Credential", $adminCredential) if ($configureArguments.ContainsKey("TargetForestCredential")) { $configureArguments.Remove("TargetForestCredential") } Write-Host (Set-ADSyncRestrictedPermissions @configureArguments | Out-String) } else { $configureArguments.Add("Credential", $adminCredential) if ($configureArguments.ContainsKey("TargetForestCredential")) { $configureArguments.Remove("TargetForestCredential") } Write-Host "`r`n" $validationChoiceOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No") $disableCredentialValidation = !($host.UI.PromptForChoice("Disable Credential Validation", "Skip checking if the credentials provided are valid in AD and if they have the necessary privileges to restrict the permissions on the Connector account.", $validationChoiceOptions, 1)) if ($disableCredentialValidation) { $configureArguments.Add("DisableCredentialValidation", $true) } Write-Host "`r`n" Write-Host (Set-ADSyncRestrictedPermissions @configureArguments | Out-String) } } elseif ($ConfigurationOption -eq "SetADSyncPasswordHashSyncPermissions") { Write-Host (Set-ADSyncPasswordHashSyncPermissions @configureArguments | Out-String) } else { $adObjectDN = Read-Host "To set permissions for a single target object, enter the DistinguishedName of the target AD object. Giving no input will set root permissions for all Domains in the Forest" Write-Host "`r`n" $includeChoiceOptions = [System.Management.Automation.Host.ChoiceDescription[]] @("&Yes", "&No") $includeAdminSDHolders = !($host.UI.PromptForChoice("Update AdminSdHolders", "Update AdminSDHolder container when updating with these permissions?", $includeChoiceOptions, 1)) if ($adObjectDN) { $configureArguments.Add("ADobjectDN", $adObjectDN) } if ($includeAdminSDHolders) { $configureArguments.Add("IncludeAdminSDHolders", $true) } Write-Host "`r`n" if ($ConfigurationOption -eq "SetADSyncBasicReadPermissions") { Write-Host (Set-ADSyncBasicReadPermissions @configureArguments | Out-String) } elseif ($ConfigurationOption -eq "SetADSyncExchangeHybridPermissions") { Write-Host (Set-ADSyncExchangeHybridPermissions @configureArguments | Out-String) } elseif ($ConfigurationOption -eq "SetADSyncExchangeMailPublicFolderPermissions") { Write-Host (Set-ADSyncExchangeMailPublicFolderPermissions @configureArguments | Out-String) } elseif ($ConfigurationOption -eq "SetADSyncMsDsConsistencyGuidPermissions") { Write-Host (Set-ADSyncMsDsConsistencyGuidPermissions @configureArguments | Out-String) } elseif ($ConfigurationOption -eq "SetADSyncPasswordWritebackPermissions") { Write-Host (Set-ADSyncPasswordWritebackPermissions @configureArguments | Out-String) } elseif ($ConfigurationOption -eq "SetADSyncUnifiedGroupWritebackPermissions") { Write-Host (Set-ADSyncUnifiedGroupWritebackPermissions @configureArguments | Out-String) } } } } # SIG # Begin signature block # MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDZ7I+XwaUhLp33 # bPHQpAN5xYlDd9kR8siFMxxQw8Wbp6CCDYIwggYAMIID6KADAgECAhMzAAADuZSQ # 5gjwdFOBAAAAAAO5MA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwMTExMjAxMzMwWhcNMjUwMTEwMjAxMzMwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCuMRRznApQNs/LOrnZoZEEkTVcxr/SBiWzwnt5IStcn2ZV9St4nQOu/19A1o5X # UNbsooWSwcBZ3gqj0EuyW2LGA+frxpfH0l/Vq6+JeHItE5Es1CT2VnxruQQ4w7qS # C89CVUiyHHnsLzfbJ+pU7c+vvqirG1emPbj4L19ubH8HqkMIKuBeHlDv1OZdpTB3 # 4noZNjk3jOmmbg+h2SDFtrS59CEJTjo2XAnlSRXJocPP3t850fgsYo6oT576li3S # fABCaHiA2/42IbZftbzO4kKaTPbOcLadq/6xo6j+VXyMtdR9iNKnuw9tFnR7gEPr # emLd5Fgb6U6Ljo6bbaT7N2mXAgMBAAGjggF/MIIBezArBgNVHSUEJDAiBgorBgEE # AYI3TBMBBgorBgEEAYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUT5XGTsAJlIfj # arqwd67UuflM/UowRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEWMBQGA1UEBRMNMjMzMTEwKzUwMTkxMzAfBgNVHSMEGDAWgBRI # bmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEt # MDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAKCV # jrYNj2pcz6AsLXOJe9rD+EP+hYB0MOfpD/4nf4blmAZ1X21cxPW+/T6oew+TJrBI # 9rNUnNpdoPTgqElQ7C5rJIXTWZdVNgTawKjdOfAAn2fAs+tdwHSIOKnKGhj4P9M5 # EVVfqh3X5z9BQdX1YMQOLgcrhopO/YjZEZHnrevos+kXWEuZ60fe44JbZKtOiY6K # 6z1YN/uKMr1aQF7StU72DMEwafAP90d1kQOt85FO2sx00GvVuxFCaJJT2w2olYjg # ryWSkUABSaxLfEfE+h+nhxshuclIZwUwqlAwkaC66fIK2qcyZohxJWtdHQOdeFG3 # ea1c23MwVvGygD352eyVWRH/3cEaUCM5Guw68eoOIf8APlXgwnU5oKly19ZIMhWH # ZFukVFtmKqwuIPtvHIeU0ymkh+o3vyqp+cFvE/jSGyJah7HtnKSOpU/k5zRouKd1 # dbFE+yis+Eh4bS/gVMQUAA5iMCTHhgiQ5j3NpCqvtc8VlnR/FNWSHpdQnC3i8cWR # ZUGIW+nw9k2meJwJVGmHrj2JaDqYqCeyS8pvDGIoCn+g7d3q4UsomCS/djBCTZHY # d84zg1aD/hbkQs56bf/y6m/9evO11swR8Fua/Ind9zS72mZXbiUf7dpxyU4qeFEO # lOT96yOD9MRpQTnxc2RZRWFgA3KNXt0Qq/PGMdP4MIIHejCCBWKgAwIBAgIKYQ6Q # 0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5 # WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQD # Ex9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4 # BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe # 0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato # 88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v # ++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDst # rjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN # 91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4ji # JV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmh # D+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbi # wZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8Hh # hUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaI # jAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTl # UAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNV # HQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQF # TuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29m # dC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNf # MjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNf # MjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcC # ARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnlj # cHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5 # AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oal # mOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0ep # o/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1 # HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtY # SWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInW # H8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZ # iWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMd # YzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7f # QccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKf # enoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOpp # O6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZO # SEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jv # c29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAO5lJDmCPB0U4EAAAAAA7kw # DQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYK # KwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ2efEzX # txOc3nQ2Ll5GC0G90qbA8lFkzofh667vytDUMEIGCisGAQQBgjcCAQwxNDAyoBSA # EgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20w # DQYJKoZIhvcNAQEBBQAEggEAceU7UO/cOn17aLFM7LT4Awz1cz58m9Y8ySJZr3SF # K1XBV/4bHBn58iuV/9sf9wZbkFjKdIO1iH4mIMJYlvhsIsO2IwkFpxHkn0KOV+S9 # N43dqM3ivv7r5rFecupgjWCiXn8PMg7xkdIui5KElHWIBIjkmVXzQ8nGJEuS4lYE # qwY+C0t5oQMEQDKWCbULXtNEkA+zkVASToQds63FLAEMKn7aUP5PLQn5Q9WJ2V2Z # yhG4tgXhj5QIRZqKcSBZV4AK5ZC99UDN8PGAvdzDBg37xIfeVxC2Ya/VamNwm2+j # rUhJfveHLcIinV79Xxye1OzFR65PlmRW6evQS9SG82L4FaGCFykwghclBgorBgEE # AYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUD # BAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoD # ATAxMA0GCWCGSAFlAwQCAQUABCDEuY3PdlFJB+p5dm/aK4CmRN2UsCMmzRiXfOxo # lkf20AIGZnLFcpa5GBMyMDI0MDcwOTE5MzUwOS44OThaMASAAgH0oIHYpIHVMIHS # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN # aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo # YWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQg # VGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDR # EbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 # IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNT # IEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2 # tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2c # ruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7Oid # XpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K5 # 9wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxV # hqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczv # Gd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6Rxv # Mcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk # 1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2d # hzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gF # V/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2d # I6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4E # FgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXS # ZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw # MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0 # YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8E # DDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIB # ALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2 # vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgSc # Y8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExb # BSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/ # rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dO # fDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfI # OPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf # 0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7K # L8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4 # Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP377 # 00vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgIT # MwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJv # b3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcN # MzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw # DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT # /e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYj # DLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/Y # JlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d # 9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVU # j9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFK # u75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231f # gLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C # 89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC # +hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2 # XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W # cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMG # CSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cV # XQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/ # BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2Nz # L1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcU # AgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8G # A1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeG # RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUH # MAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2Vy # QXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n # ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP # +2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27Y # P0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8Z # thISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNh # cy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7G # dP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4J # vbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjo # iV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TO # PqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ # 1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NN # je6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWlj # cm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFs # ZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp # bWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhX # Rn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq # hkiG9w0BAQUFAAIFAOo3n+UwIhgPMjAyNDA3MDkxOTM5MTdaGA8yMDI0MDcxMDE5 # MzkxN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6jef5QIBADAHAgEAAgIEEjAH # AgEAAgIRnzAKAgUA6jjxZQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ # CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACuv # Yzsr7aC7v5zy5jz+LtzwqFTZhwpPOma1tMBnTaEo8AjsQQ0deZ8K4xl0DeryzQOk # 0Unc2bApelqZoK6KEV6ZVQr/5jwFOEHNKKv78jGp7L368KlpwYoViKvAL/ell/cT # UqxnqhPeucvOCKybd5zL7IpP+nbCAbf3bU777bi2MYIEDTCCBAkCAQEwgZMwfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdow # DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv # BgkqhkiG9w0BCQQxIgQgAhjVO2hOgV7fYleeQEL3i6hvf5XwnIkcC3Y68l9BmEow # gfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I # 5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEILv5ULRCJGvYlHzh27+3ZOObo6qt # 4Do3dD0XuyeHiNj5MA0GCSqGSIb3DQEBCwUABIICAE27OwY6do3fkPQUmpNlQmfL # sTHNoxfJVnsuJms1MvCgvcjrifAT9l5XGhejlVPqIUb7eNoZf2hKrhjCbDIqc5qp # xsAzD0qVs/hF8PwZ8bOTtSiPqXdYIhW8fwugdiaqFBBihTrnPq+0jpwb1D7llrZm # gmrHYG0kzgnVMBa8R8rpw0JyCPGXQmDTS0vxmmjWgBNluJJzegCF8cYCo7QpkMXM # ibTKd6bwzHpTiiqjDFKEOK7/8H2w6r9bkDdbZBQM7Lktn21G39w1sd1eG+90nZwB # 2IWRcVQ4k2801kKoyZ31djDcfwacbqGmCsi1Zo/35av+SWP56SYFPs795A+nDd+7 # lTqiYnEntb+oMtEtm7VlT6lT3mb3lKTmhDf9kSW52gEbCrtgPd+Pa2YQbTr1TkLE # TiwSvlNAmfkxXOF9gPo7MnnFoHw3TbV60tZsXrMBDIKnDQiUjGS74jhU7iokRGf7 # uH/Xk1E2oDX1TcEtOlIhGSKP2QXgeLFARkrnccG2LI7vSfkKduPYjDgpl8fqQxWU # feUwvRV9F+rxEqQNDRZkZEUxV6pyAWOf5B4puF54NwEa99mppLD1S7V+KbNkk3f5 # 1E6f7/ghK93rUpcazMxjkCS+hIUz+scqobNDsmgruIimsAwJzB1rZGgbF1/Jborq # /K2kShFPI3epTixrkr9v # SIG # End signature block
combined_dataset/train/non-malicious/2180.ps1
2180.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateNotNullOrEmpty()] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [string]$SiteServer, [parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation")] [switch]$ShowProgress ) Begin { try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [Exception] { Write-Warning -Message "Unable to determine SiteCode" ; break } try { Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.dll") Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.Extender.dll") Add-Type -Path (Join-Path (Get-Item $env:SMS_ADMIN_UI_PATH).Parent.FullName "Microsoft.ConfigurationManagement.ApplicationManagement.MsiInstaller.dll") } catch [Exception] { Write-Warning -Message "Unable to load required assemblies" ; break } } Process { if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } $Applications = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class "SMS_Application" -ComputerName $SiteServer -Filter 'IsLatest = "True"' $ApplicationCount = ($Applications | Measure-Object).Count foreach ($Application in $Applications) { if ($PSBoundParameters["ShowProgress"]) { $ProgressCount++ } $LocalizedDisplayName = $Application.LocalizedDisplayName $CurrentApplication = [wmi]$Application.__PATH $ApplicationXML = [Microsoft.ConfigurationManagement.ApplicationManagement.Serialization.SccmSerializer]::DeserializeFromString($CurrentApplication.SDMPackageXML,$True) foreach ($DeploymentType in $ApplicationXML.DeploymentTypes) { if ($PSBoundParameters["ShowProgress"]) { Write-Progress -Activity "Enumerating Applications for Primary User requirement rule" -Id 1 -Status "$($ProgressCount) / $($ApplicationCount)" -CurrentOperation "Current application: $($LocalizedDisplayName)" -PercentComplete (($ProgressCount / $ApplicationCount) * 100) } if (($DeploymentType.Requirements.Expression.Operands.LogicalName -like "PrimaryDevice") -and ($DeploymentType.Requirements.Expression.Operator.OperatorName -like "Equals") -and ($DeploymentType.Requirements.Expression.Operands.Value -eq $true)) { $PSObject = [PSCustomObject]@{ ApplicationName = $LocalizedDisplayName DeploymentTypeName = $DeploymentType.Title RequirementEnabled = $true LogicalName = $DeploymentType.Requirements.Expression.Operands.LogicalName OperatorName = $DeploymentType.Requirements.Expression.Operator.OperatorName Value = $DeploymentType.Requirements.Expression.Operands.Value } Write-Output $PSObject } } } } End { if ($PSBoundParameters["ShowProgress"]) { Write-Progress -Activity "Enumerating Applications for Primary User requirement rule" -Id 1 -Completed } }
combined_dataset/train/non-malicious/1186.ps1
1186.ps1
$serviceBaseName = 'CarbonUninstallServiceTest' $serviceName = $serviceBaseName $servicePath = Join-Path -Path $PSScriptRoot -ChildPath 'Service\NoOpService.exe' -Resolve & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) function Uninstall-TestService { if( (Get-Service $serviceName -ErrorAction SilentlyContinue) ) { Stop-Service $serviceName & C:\Windows\system32\sc.exe delete $serviceName } } function GivenServiceStillRunsAfterStop { Mock -CommandName 'Stop-Service' -ModuleName 'Carbon' } function Init { $Global:Error.Clear() Uninstall-TestService Install-Service -Name $serviceName -Path $servicePath } function ThenServiceUninstalled { param( [Parameter(Mandatory)] [string] $Named ) while( (Get-Service $Named -ErrorAction Ignore) ) { Write-Verbose -Message ('Waiting for "{0}" to get uninstalled.' -f $Named) -Verbose Start-Sleep -Seconds 1 } It ('should uninstall service') { Get-Service $Named -ErrorAction Ignore | Should -BeNullOrEmpty } } function WhenUninstalling { param( [Parameter(Mandatory)] [string] $Named, $WithTimeout ) $optionalParams = @{ } if( $WithTimeout ) { $optionalParams['StopTimeout'] = $WithTimeout } Uninstall-Service -Name $Named @optionalParams } Describe 'Uninstall-Service' { It 'should remove service' { Init $service = Get-Service -Name $serviceName $service | Should Not BeNullOrEmpty $output = Uninstall-Service -Name $serviceName $output | Should BeNullOrEmpty $service = Get-Service -Name $serviceName -ErrorAction SilentlyContinue $service | Should BeNullOrEmpty } It 'should not remove non existent service' { Init $error.Clear() Uninstall-Service -Name "IDoNotExist" $error | Should BeNullOrEmpty } It 'should support what if' { Init Uninstall-Service -Name $serviceName -WhatIf $service = Get-Service -Name $serviceName $service | Should Not BeNullOrEmpty } } Describe 'Uninstall-Service.when service doesn''t stop' { Init GivenServiceStillRunsAfterStop WhenUninstalling $serviceName ThenServiceUninstalled $serviceName } Describe 'Uninstall-Service.when waiting for service to really stop' { Init GivenServiceStillRunsAfterStop WhenUninstalling $serviceName -WithTimeout (New-TimeSpan -Seconds 1) ThenServiceUninstalled $serviceName } Describe 'Uninstall-Service.when service never stops' { Init GivenServiceStillRunsAfterStop Mock -CommandName 'Get-Process' -ModuleName 'Carbon' { return [pscustomobject]@{ Id = $Id[0] } } Mock -CommandName 'Start-Sleep' -ModuleName 'Carbon' WhenUninstalling $serviceName -ErrorAction SilentlyContinue $Global:Error[0] | Should -Match 'Failed to kill' ThenServiceUninstalled $serviceName } Describe 'Uninstall-Service.when service stops before getting killed' { Init GivenServiceStillRunsAfterStop $global:callCount = 0 Mock -CommandName 'Get-Process' -ModuleName 'Carbon' -MockWith { $global:callCount++ if( $global:callCount -eq 1 ) { [pscustomobject]@{ Id = $Id[0] } } else { foreach( $item in $ID ) { $process = [Diagnostics.Process]::GetProcessById($item) if( $process ) { $process.Kill() $process.WaitForExit() } } } } Mock -CommandName 'Stop-Process' -ModuleName 'Carbon' -MockWith { Write-Error 'FUBAR!' -ErrorAction $ErrorActionPreference } WhenUninstalling $serviceName $Global:Error | Where-Object { $_ -match 'FUBAR' } | Should -BeNullOrEmpty ThenServiceUninstalled $serviceName Remove-Variable -Name 'callCount' -Scope Global } Uninstall-TestService
combined_dataset/train/non-malicious/Get-WebFile 3.5.ps1
Get-WebFile 3.5.ps1
## Get-WebFile.ps1 (aka wget for PowerShell) ############################################################################################################## ## Downloads a file or page from the web ## History: ## v3.5 - Add -Quiet switch to turn off the progress reports ... ## v3.4 - Add progress report for files which don't report size ## v3.3 - Add progress report for files which report their size ## v3.2 - Use the pure Stream object because StreamWriter is based on TextWriter: ## it was messing up binary files, and making mistakes with extended characters in text ## v3.1 - Unwrap the filename when it has quotes around it ## v3 - rewritten completely using HttpWebRequest + HttpWebResponse to figure out the file name, if possible ## v2 - adds a ton of parsing to make the output pretty ## added measuring the scripts involved in the command, (uses Tokenizer) ############################################################################################################## #function wget { param( $url = (Read-Host "The URL to download"), $fileName, [switch]$quiet ) $req = [System.Net.HttpWebRequest]::Create($url); $res = $req.GetResponse(); if($fileName -and !(Split-Path $fileName)) { $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } elseif(($fileName -eq $null) -or (Test-Path -PathType "Container" $fileName)) { # if( -and !((Test-Path -PathType "Leaf" $fileName) -or ((Test-Path -PathType "Container" (Split-Path $fileName)) -and -not ))) [string]$fileName = ([regex]'(?i)filename=(.*)$').Match( $res.Headers["Content-Disposition"] ).Groups[1].Value $fileName = $fileName.trim("\\/""'") if(!$fileName) { $fileName = $res.ResponseUri.Segments[-1] $fileName = $fileName.trim("\\/") if(!$fileName) { $fileName = Read-Host "Please provide a file name" } $fileName = $fileName.trim("\\/") if(!([IO.FileInfo]$fileName).Extension) { $fileName = $fileName + "." + $res.ContentType.Split(";")[0].Split("/")[1] } } $fileName = Join-Path (Get-Location -PSProvider "FileSystem") $fileName } if($res.StatusCode -eq 200) { [int]$goal = $res.ContentLength $reader = $res.GetResponseStream() $writer = new-object System.IO.FileStream $fileName, "Create" [byte[]]$buffer = new-object byte[] 4096 [int]$total = [int]$count = 0 do { $count = $reader.Read($buffer, 0, $buffer.Length); $writer.Write($buffer, 0, $count); if(!$quiet) { $total += $count if($goal -gt 0) { Write-Progress "Downloading $url" "Saving $total of $goal" -id 0 -percentComplete (($total/$goal)*100) } else { Write-Progress "Downloading $url" "Saving $total bytes..." -id 0 } } } while ($count -gt 0) $writer.Flush() $reader.Close() $writer.Close() } $res.Close(); ls $fileName #}
combined_dataset/train/non-malicious/1016.ps1
1016.ps1
$random = (New-Guid).ToString().Substring(0,8) $subscriptionId = "my-azure-subscription-id" $apimServiceName = "apim-$random" $resourceGroupName = "apim-rg-$random" $location = "Japan East" $organisation = "Contoso" $adminEmail = "[email protected]" Select-AzSubscription -SubscriptionId $subscriptionId New-AzResourceGroup -Name $resourceGroupName -Location $location New-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apimServiceName -Location $location -Organization $organisation -AdminEmail $adminEmail $proxyHostname = "proxy.contoso.net" $proxyCertificatePath = "C:\proxycert.pfx" $proxyCertificatePassword = "certPassword" $portalHostname = "portal.contoso.net" $portalCertificatePath = "C:\portalcert.pfx" $portalCertificatePassword = "certPassword" $proxyCertUploadResult = Import-AzApiManagementHostnameCertificate -Name $apimServiceName -ResourceGroupName $resourceGroupName ` -HostnameType "Proxy" -PfxPath $proxyCertificatePath -PfxPassword $proxyCertificatePassword $portalCertUploadResult = Import-AzApiManagementHostnameCertificate -Name $apimServiceName -ResourceGroupName $resourceGroupName ` -HostnameType "Portal" -PfxPath $portalCertificatePath -PfxPassword $portalCertificatePassword $PortalHostnameConf = New-AzApiManagementHostnameConfiguration -Hostname $proxyHostname -CertificateThumbprint $proxyCertUploadResult.Thumbprint $ProxyHostnameConf = New-AzApiManagementHostnameConfiguration -Hostname $portalHostname -CertificateThumbprint $portalCertUploadResult.Thumbprint Set-AzApiManagementHostnames -Name $apimServiceName -ResourceGroupName $resourceGroupName ` -PortalHostnameConfiguration $PortalHostnameConf -ProxyHostnameConfiguration $ProxyHostnameConf
combined_dataset/train/non-malicious/sample_40_68.ps1
sample_40_68.ps1
############################################################################## # PREVIEW VERSION OF PSAKE SCRIPT FOR MODULE BUILD & PUBLISH TO THE PSGALLERY ############################################################################## # # We are hoping to add support for publishing modules to the PowerShell gallery # and private repositories in a future release of this extension. This is an # early look at the approach we are considering which is to supply a # PSake-based script that will: # # 1. Create a directory from which to publish your module. # 2. Copy the appropriate module files to that directory excluding items like # the .vscode directory, Pester tests, etc. These are configurable in Build.ps1. # 3. Verify all existing Pester tests pass. # 4. Publish the module to the desired repository (defaulting to the PSGallery). # # Requirements: PSake. If you don't have this module installed use the following # command to install it: # # PS C:\> Install-Module PSake -Scope CurrentUser # ############################################################################## # This is a PSake script that supports the following tasks: # clean, build, test and publish. The default task is build. # # The publish task uses the Publish-Module command to publish # to either the PowerShell Gallery (the default) or you can change # the $Repository property to the name of an alternate repository. # # The test task invokes Pester to run any Pester tests in your # workspace folder. Name your test scripts <TestName>.Tests.ps1 # and Pester will find and run the tests contained in the files. # # You can run this build script directly using the invoke-psake # command which will execute the build task. This task "builds" # a temporary folder from which the module can be published. # # PS C:\> invoke-psake build.ps1 # # You can run your Pester tests (if any) by running the following command. # # PS C:\> invoke-psake build.ps1 -taskList test # # You can execute the publish task with the following command. Note that # the publish task will run the test task first. The Pester tests must pass # before the publish task will run. The first time you run the publish # command, you will be prompted to enter your PowerShell Gallery NuGetApiKey. # After entering the key, it is encrypted and stored so you will not have to # enter it again. # # PS C:\> invoke-psake build.ps1 -taskList publish # # You can verify the stored and encrypted NuGetApiKey by running the following # command. This will display your NuGetApiKey in plain text! # # PS C:\> invoke-psake build.ps1 -taskList showKey # # You can store a new NuGetApiKey with this command. You can leave off # the -properties parameter and you'll be prompted for the key. # # PS C:\> invoke-psake build.ps1 -taskList storeKey -properties @{NuGetApiKey='test123'} # ############################################################################### # Customize these properties for your module. ############################################################################### Properties { # The name of your module should match the basename of the PSD1 file. $ModuleName = (Get-Item $PSScriptRoot\*.psd1 | Foreach-Object {$null = Test-ModuleManifest -Path $_ -ErrorAction SilentlyContinue; if ($?) {$_}})[0].BaseName # Path to the release notes file. Set to $null if the release notes reside in the manifest file. $ReleaseNotesPath = "$PSScriptRoot\ReleaseNotes.md" # The directory used to publish the module from. If you are using Git, the # $PublishRootDir should be ignored if it is under the workspace directory. $PublishRootDir = "$PSScriptRoot\Release" $PublishDir = "$PublishRootDir\$ModuleName" # The following items will not be copied to the $PublishDir. # Add items that should not be published with the module. $Exclude = @( (Split-Path $PSCommandPath -Leaf), 'Release', 'Tests', '.git*', '.vscode', # These files are unique to this examples dir. 'DebugTest.ps1', 'PSScriptAnalyzerSettings.psd1', 'Readme.md', 'Stop*.ps1' ) # Name of the repository you wish to publish to. Default repo is the PSGallery. $PublishRepository = $null # Your NuGet API key for the PSGallery. Leave it as $null and the first time # you publish you will be prompted to enter your API key. The build will # store the key encrypted in a file, so that on subsequent publishes you # will no longer be prompted for the API key. $NuGetApiKey = $null $EncryptedApiKeyPath = "$env:LOCALAPPDATA\vscode-powershell\NuGetApiKey.clixml" } ############################################################################### # Customize these tasks for performing operations before and/or after publish. ############################################################################### Task PrePublish { } Task PostPublish { } ############################################################################### # Core task implementations - this possibly "could" ship as part of the # vscode-powershell extension and then get dot sourced into this file. ############################################################################### Task default -depends Build Task Publish -depends Test, PrePublish, PublishImpl, PostPublish { } Task PublishImpl -depends Test -requiredVariables EncryptedApiKeyPath, PublishDir { if ($NuGetApiKey) { "Using script embedded NuGetApiKey" } elseif (Test-Path -LiteralPath $EncryptedApiKeyPath) { $NuGetApiKey = LoadAndUnencryptNuGetApiKey $EncryptedApiKeyPath "Using stored NuGetApiKey" } else { $cred = PromptUserForNuGetApiKeyCredential -DestinationPath $EncryptedApiKeyPath $NuGetApiKey = $cred.GetNetworkCredential().Password "The NuGetApiKey has been stored in $EncryptedApiKeyPath" } $publishParams = @{ Path = $PublishDir NuGetApiKey = $NuGetApiKey } if ($PublishRepository) { $publishParams['Repository'] = $PublishRepository } # Consider not using -ReleaseNotes parameter when Update-ModuleManifest has been fixed. if ($ReleaseNotesPath) { $publishParams['ReleaseNotes'] = @(Get-Content $ReleaseNotesPath) } "Calling Publish-Module..." Publish-Module @publishParams -WhatIf } Task Test -depends Build { Import-Module Pester Invoke-Pester $PSScriptRoot } Task Build -depends Clean, Init -requiredVariables PublishDir, Exclude, ModuleName { Copy-Item -Path $PSScriptRoot\* -Destination $PublishDir -Recurse -Exclude $Exclude # Get contents of the ReleaseNotes file and update the copied module manifest file # with the release notes. # DO NOT USE UNTIL UPDATE-MODULEMANIFEST IS FIXED - DOES NOT HANDLE SINGLE QUOTES CORRECTLY. # if ($ReleaseNotesPath) { # $releaseNotes = @(Get-Content $ReleaseNotesPath) # Update-ModuleManifest -Path $PublishDir\${ModuleName}.psd1 -ReleaseNotes $releaseNotes # } } Task Clean -requiredVariables PublishRootDir { # Sanity check the dir we are about to "clean". If $PublishRootDir were to # inadvertently get set to $null, the Remove-Item commmand removes the # contents of \*. That's a bad day. Ask me how I know? :-( if ((Test-Path $PublishRootDir) -and $PublishRootDir.Contains($PSScriptRoot)) { Remove-Item $PublishRootDir\* -Recurse -Force } } Task Init -requiredVariables PublishDir { if (!(Test-Path $PublishDir)) { $null = New-Item $PublishDir -ItemType Directory } } Task RemoveKey -requiredVariables EncryptedApiKeyPath { if (Test-Path -LiteralPath $EncryptedApiKeyPath) { Remove-Item -LiteralPath $EncryptedApiKeyPath } } Task StoreKey -requiredVariables EncryptedApiKeyPath { $nuGetApiKeyCred = PromptUserForNuGetApiKeyCredential -DestinationPath $EncryptedApiKeyPath "The NuGetApiKey has been stored in $EncryptedApiKeyPath" } Task ShowKey -requiredVariables EncryptedApiKeyPath { if ($NuGetApiKey) { "The embedded (partial) NuGetApiKey is: $($NuGetApiKey[0..7])" } else { $NuGetApiKey = LoadAndUnencryptNuGetApiKey -Path $EncryptedApiKeyPath "The stored (partial) NuGetApiKey is: $($NuGetApiKey[0..7])" } "To see the full key, use the task 'ShowFullKey'" } Task ShowFullKey -requiredVariables EncryptedApiKeyPath { if ($NuGetApiKey) { "The embedded NuGetApiKey is: $NuGetApiKey" } else { $NuGetApiKey = LoadAndUnencryptNuGetApiKey -Path $EncryptedApiKeyPath "The stored NuGetApiKey is: $NuGetApiKey" } } Task ? -description 'Lists the available tasks' { "Available tasks:" $PSake.Context.Peek().Tasks.Keys | Sort-Object } ############################################################################### # Helper functions ############################################################################### function PromptUserForNuGetApiKeyCredential { [Diagnostics.CodeAnalysis.SuppressMessage("PSProvideDefaultParameterValue", '')] param( [Parameter()] [ValidateNotNullOrEmpty()] [string] $DestinationPath ) $message = "Enter your NuGet API Key in the password field (or nothing, this isn't used yet in the preview)" $nuGetApiKeyCred = Get-Credential -Message $message -UserName "ignored" if ($DestinationPath) { EncryptAndSaveNuGetApiKey -NuGetApiKeySecureString $nuGetApiKeyCred.Password -Path $DestinationPath } $nuGetApiKeyCred } function EncryptAndSaveNuGetApiKey { [Diagnostics.CodeAnalysis.SuppressMessage("PSAvoidUsingConvertToSecureStringWithPlainText", '')] [Diagnostics.CodeAnalysis.SuppressMessage("PSProvideDefaultParameterValue", '')] param( [Parameter(Mandatory, ParameterSetName='SecureString')] [ValidateNotNull()] [SecureString] $NuGetApiKeySecureString, [Parameter(Mandatory, ParameterSetName='PlainText')] [ValidateNotNullOrEmpty()] [string] $NuGetApiKey, [Parameter(Mandatory)] $Path ) if ($PSCmdlet.ParameterSetName -eq 'PlainText') { $NuGetApiKeySecureString = ConvertTo-SecureString -String $NuGetApiKey -AsPlainText -Force } $parentDir = Split-Path $Path -Parent if (!(Test-Path -LiteralPath $parentDir)) { $null = New-Item -Path $parentDir -ItemType Directory } elseif (Test-Path -LiteralPath $Path) { Remove-Item -LiteralPath $Path } $NuGetApiKeySecureString | ConvertFrom-SecureString | Export-Clixml $Path Write-Verbose "The NuGetApiKey has been encrypted and saved to $Path" } function LoadAndUnencryptNuGetApiKey { [Diagnostics.CodeAnalysis.SuppressMessage("PSProvideDefaultParameterValue", '')] param( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string] $Path ) $storedKey = Import-Clixml $Path | ConvertTo-SecureString $cred = New-Object -TypeName PSCredential -ArgumentList 'jpgr',$storedKey $cred.GetNetworkCredential().Password Write-Verbose "The NuGetApiKey has been loaded and unencrypted from $Path" } # SIG # Begin signature block # MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD/5MXddBd257WE # 1lvU0pIfZQTSlMxbJO2Jui1HaY1x06CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEsULMb84+YVgO5PHET/t6bMs7CrLy/w # vYcny3W2T2/DMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # CwQIqyIPu+htkz0f2rUTN1NKDOzoyKEwvwecpDlnQBbDm8mEI+RKjpDfqDKR72+B # Ub/CapufLutwhH/5+AfXsUoMYIHQ13Aa82ICQewo6N5lJMEbQAFtTqe0YWI/ZtP7 # tknk6bhPpX52Zo5d+CwRRxxayy50PsAJCRMm1+Eru6Fff5v+hxyzhbkgdBn80YwL # Bi+JGXbmxWViwjQunybgzUZhCEh/b++auFrPs5h7xHiXbSu+TsWvk9HdeCCubspn # MaHVn5JLwvL0PZHkA1nrSXCkZINIujuzLVdhkKF4b9sQJJkPjTfSgXpyKF+X/gpn # frQ9LgbXYo+LuSPJvwMS/KGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG # SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCAr+FE9Q01otDLA76vyiRK+Xmc5jrkZkfmWBx12R5tXIwIGZfxpKAHTGBMyMDI0 # MDQwMzIyNTgxNi43NThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH # IDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NDFaFw0y # NTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbzCVyYQNsz # 8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCddseF2i+aM # MjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4xLqv7DZUz # 8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+TgnrLR7A # TRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJsGEo3QrM # 2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9f7B0Ayh1 # 4Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stPaojR+PDA # 2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22XjaVVRwCgjg # JnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOnWRfe8N21 # tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/91QcGoZFm # VbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2MwqQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4emancp6KPN+ # xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eoifm0Nud7 # /4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5EdeafH2A # oG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+xoD1qRz2 # QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7ws5YrA2I # 8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zHu2oGGeCB # g4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ03833Tsv # Tgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D18rZni9pU # wN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CINZmoirEWm # CtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvhy5ku/inU # ++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0SbQgS9qs # dzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDuHayKTCaY # sYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgJ9jAiGA8yMDI0MDQwMzE3MDE0MloYDzIw # MjQwNDA0MTcwMTQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAn2AgEAMAoC # AQACAgSUAgH/MAcCAQACAhQ5MAoCBQDpuVt2AgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQELBQADggEBAD3Vla1jFcZVCUHeWybFSR/TXbfm6GGYLdMNaxcaZ4g4lneuf/Eq # Ep4fbwb8sWEF73tQFDTADNU5B/MXQ+Mi07oORkY4eXZfneDPAfcAJ1R5WFAmRzsF # EGJrz83IWcDF/fQnhIBN1glqCKxmckocX6+++QXWX04P5Tx9B+Pj9VZcayYbFH6e # F7l0BE9K+OKjNNtFYXE5RlmRTEy89btw82vdsUttKbqKwUda6W+9kpgCCUJipFxM # kGALgaRLvBTAUHfC7luPHhE2LNYj9ccBGKpzeJx5GaBeBeB8uptkYMlyO64bMmrq # XJatodVYkRR3A4Se6Tqm8LVw4KeZMB1U7VMxggQNMIIECQIBATCBkzB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TANBglg # hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG # SIb3DQEJBDEiBCD3vTg3SSAieZRpwGXgiCiuGRCogZuK1L7eGOicm7pBXjCB+gYL # KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsSDrXZ # 6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHt4V/L1felXXMAAQAAAe0wIgQgdGoqzWxBTvwHvsTIxYqr5oiVCTGJOeKF # nbWbhY8yNTgwDQYJKoZIhvcNAQELBQAEggIAWBGzLnR1Y6UngDbfTQzZINb+Ei2A # ZLR9MHX5779XLn+kIsuDepvIYr8Sps8VH4MQmEKN25qn0NZHISEl6cWsgtfRL8wf # aXPoKx/XLfrXIuUKzgelKmcgyz+ihzvLIUZZQ9YAMLHEX/FE9qw2WdS1BHB0lKmJ # o2que4diWyL0glFMRSzAHBwbs+5RrINmPFliqN9pDCz7FsM9Yc0WPRPorWrewbvM # qzHmwsIgrTMn2WXEcVXujRQgN7Ckif2qJ2/aeyyVh3XgExukEiJ7jqp5rjeAB4zm # xXcybvy9WbdDXW5QuMUpYbalcwt7BPkcJz52m+k9YjOPn3+TLo7eLSPSlaxmiRqu # 75XxfqJpGQTn4BSslT4kEGTfvkY+sk5/mw3nCA6lLXncXKUo7JpWYOCH2yLiu5fE # CGk5318Uj5i3fDFYnZ3q7GGLar5oLaD9ObUnmfTtdkhLOG+cUZzvU0pI72zM1dCw # UG0YjbyAPRRPAt/Kq1y5LB8r/df+NrHzuW8J3tEEq7Fjk9PH9Bv2HEDLUUK8aWDk # fVLRxtYIw4prt6kTwabCJfc1RvLGcZO0XDZ1N99A8rYFMTrFb9H8qdbpRkkDBwIa # VXee86IbKhOk7rbELZnxO868Y7fPBa5mcakRuEs5HBakb91IFZPwGnrkLRW151WW # luT/J9R30x/rLBI= # SIG # End signature block
combined_dataset/train/non-malicious/sample_61_98.ps1
sample_61_98.ps1
Y表“%{oii_IMBITableName/}”的列“%{oii_IMBIColumnName/}”中包含空白值,这对于多对一关系中的一方上的列或用作表的主键的列而言是不允许的。=表未处于可查询状态,因为基础增量表“%{oii_deltaTableName/}”中的数据已更改。请查看更改并刷新数据集。ă无法将值“%{ccon_value/}”转换为 Direct Lake 表列“%{oii_tableName/}”[“%{oii_columnName/}”] 的类型“%{semanticType/}”、基础 parquet 逻辑类型“%{logicalType/}”和物理类型“%{physicalType/}”。请将列的数据类型转换为兼容的数据类型,或者从 Direct Lake 表中排除该列。请参阅 https://go.microsoft.com/fwlink/?linkid=2215281,了解详细信息。导出命令中指定了无效的压缩编解码器。删除向量已损坏。删除向量已损坏。Ú查询 Direct Lake 表(TableTMID='%I64u{tableTMID/}', ColumnTMID='%I64u{columnTMID/}')时发现无效的行计数。源 parquet 文件可能已损坏或格式错误。RowgroupSize: '%I64d{rowgroupSize/}', currentRows: '%I64d{currentRows/}', inputRows: '%I64d{inputRows/}'。¢查询 Direct Lake 表(TableTMID='%I64u{tableTMID/}', ColumnTMID='%I64u{columnTMID/}')时发现无效的数据字典 ID。源 parquet 文件可能已损坏或格式错误。MaxId: '%d{maxId/}', inputId: '%d{inputId/}'。š我们在“%{oii_tableName/}”[“%{oii_columnName/}”]列中检测到不受支持的值“%{ccon_value/}”。请将不受支持的值转换为 null 或排除该列。请参阅 https://go.microsoft.com/fwlink/?linkid=2215281,了解详细信息。无法查询字符串列 '%{oii_tableName/}'['%{oii_columnName/}']。此错误可能是因为输入字节数组的大小太大。请减小列区块大小或排除列。请参阅 https://go.microsoft.com/fwlink/?linkid=2215281,以了解详细信息。ĕ查询 Direct Lake 表列“%{oii_tableName/}”[“%{oii_columnName/}”]失败,因为 Parquet 文件“%{oii_fileLocation/}”中的页面大小过大。CompressedPageSize:“%I64u{compressedPageSize/}”,UncompressedPageSize:“%I64u{unCompressedPageSize/}”。请减小页面大小或排除列。请参阅 https://go.microsoft.com/fwlink/?linkid=2215281,以了解详细信息。f处理 Direct Lake 表时检测到损坏的元数据(TableTMID='%I64u{tableTMID/}')。源 parquet 文件“%{oii_fileLocation/}”已损坏或格式不正确。C传入的迁移状态值(%{strIncomingRevision/})与迁移状态值(%{strCurrentRevision/})不兼容。
combined_dataset/train/non-malicious/1660.ps1
1660.ps1
function Check-Flags ($sam = $env:USERNAME) { $uac = [int](([adsisearcher]"samaccountname=$sam").FindOne().Properties.useraccountcontrol | Out-String).Trim() if ($uac -eq 0) { throw 'UAC is 0' } $flags = @{ SCRIPT = 1 ACCOUNTDISABLE = 2 HOMEDIR_REQUIRED = 8 LOCKOUT = 16 PASSWD_NOTREQD = 32 PASSWD_CANT_CHANGE = 64 ENCRYPTED_TEXT_PWD_ALLOWED = 128 TEMP_DUPLICATE_ACCOUNT = 256 NORMAL_ACCOUNT = 512 INTERDOMAIN_TRUST_ACCOUNT = 2048 WORKSTATION_TRUST_ACCOUNT = 4096 SERVER_TRUST_ACCOUNT = 8192 DONT_EXPIRE_PASSWORD = 65536 MNS_LOGON_ACCOUNT = 131072 SMARTCARD_REQUIRED = 262144 TRUSTED_FOR_DELEGATION = 524288 NOT_DELEGATED = 1048576 USE_DES_KEY_ONLY = 2097152 DONT_REQ_PREAUTH = 4194304 PASSWORD_EXPIRED = 8388608 TRUSTED_TO_AUTH_FOR_DELEGATION = 16777216 PARTIAL_SECRETS_ACCOUNT = 67108864 } $hash = New-Object System.Collections.Specialized.OrderedDictionary $hash.Add('SAM', $sam) $hash.Add('UAC', $uac) foreach ($key in $flags.Keys) { if (($uac -band $flags[$key]) -ne 0) { $hash.Add($key, $true) } else { $hash.Add($key, $false) } } New-Object psobject -Property $hash }
combined_dataset/train/non-malicious/3795.ps1
3795.ps1
$global:ps_test_tag_name = 'crptestps6050' function get_vm_config_object { param ([string] $rgname, [string] $vmsize) $st = Write-Verbose "Creating VM Config Object - Start"; $vmname = $rgname + 'vm'; $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize; $st = Write-Verbose "Creating VM Config Object - End"; return $p; } function get_created_storage_account_name { param ([string] $loc, [string] $rgname) $st = Write-Verbose "Creating and getting storage account for '${loc}' and '${rgname}' - Start"; $stoname = $rgname + 'sto'; $stotype = 'Standard_GRS'; $st = Write-Verbose "Creating and getting storage account for '${loc}' and '${rgname}' - '${stotype}' & '${stoname}'"; $st = New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $st = Set-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Tags (Get-ComputeTestTag $global:ps_test_tag_name); $st = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; $st = Write-Verbose "Creating and getting storage account for '${loc}' and '${rgname}' - End"; return $stoname; } function create_and_setup_nic_ids { param ([string] $loc, [string] $rgname, $vmconfig) $st = Write-Verbose "Creating and getting NICs for '${loc}' and '${rgname}' - Start"; $subnet = New-AzVirtualNetworkSubnetConfig -Name ($rgname + 'subnet') -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ($rgname + 'vnet') -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet -Tag (Get-ComputeTestTag $global:ps_test_tag_name); $vnet = Get-AzVirtualNetwork -Name ($rgname + 'vnet') -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $nic_ids = @($null) * 1; $nic0 = New-AzNetworkInterface -Force -Name ($rgname + 'nic0') -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -Tag (Get-ComputeTestTag $global:ps_test_tag_name); $nic_ids[0] = $nic0.Id; $vmconfig = Add-AzVMNetworkInterface -VM $vmconfig -Id $nic0.Id; $st = Write-Verbose "Creating and getting NICs for '${loc}' and '${rgname}' - End"; return $nic_ids; } function create_and_setup_vm_config_object { param ([string] $loc, [string] $rgname, [string] $vmsize) $st = Write-Verbose "Creating and setting up the VM config object for '${loc}', '${rgname}' and '${vmsize}' - Start"; $vmconfig = get_vm_config_object $rgname $vmsize $user = "Foo12"; $password = $rgname + "BaR $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = $rgname + "cn"; $vmconfig = Set-AzVMOperatingSystem -VM $vmconfig -Windows -ComputerName $computerName -Credential $cred; $st = Write-Verbose "Creating and setting up the VM config object for '${loc}', '${rgname}' and '${vmsize}' - End"; return $vmconfig; } function setup_image_and_disks { param ([string] $loc, [string] $rgname, [string] $stoname, $vmconfig) $st = Write-Verbose "Setting up image and disks of VM config object jfor '${loc}', '${rgname}' and '${stoname}' - Start"; $osDiskName = 'osDisk'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $osDiskCaching = 'ReadWrite'; $vmconfig = Set-AzVMOSDisk -VM $vmconfig -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; $imgRef = Get-DefaultCRPImage -loc $loc; $vmconfig = ($imgRef | Set-AzVMSourceImage -VM $vmconfig); $vmconfig.StorageProfile.DataDisks = $null; $st = Write-Verbose "Setting up image and disks of VM config object jfor '${loc}', '${rgname}' and '${stoname}' - End"; return $vmconfig; } function ps_vm_dynamic_test_func_1_crptestps5352 { $rgname = 'crptestps5352'; try { $loc = 'East US 2'; $vmsize = 'Standard_A1'; $st = Write-Verbose "Running Test ps_vm_dynamic_test_func_1_crptestps5352 - Start ${rgname}, ${loc} & ${vmsize}"; $st = Write-Verbose 'Running Test ps_vm_dynamic_test_func_1_crptestps5352 - Creating Resource Group'; $st = New-AzResourceGroup -Location $loc -Name $rgname -Tag (Get-ComputeTestTag $global:ps_test_tag_name) -Force; $vmconfig = create_and_setup_vm_config_object $loc $rgname $vmsize; $stoname = get_created_storage_account_name $loc $rgname; $nicids = create_and_setup_nic_ids $loc $rgname $vmconfig; $st = setup_image_and_disks $loc $rgname $stoname $vmconfig; $st = Write-Verbose 'Running Test ps_vm_dynamic_test_func_1_crptestps5352 - Creating VM'; $vmname = $rgname + 'vm'; $st = New-AzVM -ResourceGroupName $rgname -Location $loc -VM $vmconfig -Tags (Get-ComputeTestTag $global:ps_test_tag_name); $st = Write-Verbose 'Running Test ps_vm_dynamic_test_func_1_crptestps5352 - Getting VM'; $vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname; $st = Write-Verbose 'Running Test ps_vm_dynamic_test_func_1_crptestps5352 - Removing VM'; $st = Remove-AzVM -Name $vmname -ResourceGroupName $rgname -Force; $st = Write-Verbose 'Running Test ps_vm_dynamic_test_func_1_crptestps5352 - End'; } finally { Clean-ResourceGroup $rgname } }