full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/1182.ps1
1182.ps1
$appPoolName = 'CarbonInstallIisAppPool' $username = 'CarbonInstallIisAppP' $password = '!QAZ2wsx8fk3' & (Join-Path -Path $PSScriptRoot 'Initialize-CarbonTest.ps1' -Resolve) Install-User -Credential (New-Credential -Username $username -Password $password) -Description 'User for testing Carbon''s Install-IisAppPool function.' function Assert-AppPoolExists { $exists = Test-IisAppPool -Name $appPoolname $exists | Should Be $true } function Assert-ManagedRuntimeVersion($Version) { $apppool = Get-IisAppPool -Name $appPoolName $apppool.ManagedRuntimeVersion | Should Be $Version } function Assert-ManagedPipelineMode($expectedMode) { $apppool = Get-IisAppPool -Name $appPoolName $apppool.ManagedPipelineMode | Should Be $expectedMode } function Assert-IdentityType($expectedIdentityType) { $appPool = Get-IisAppPool -Name $appPoolName $appPool.ProcessModel.IdentityType | Should Be $expectedIdentityType } function Assert-IdleTimeout($expectedIdleTimeout) { $appPool = Get-IisAppPool -Name $appPoolName $expectedIdleTimeoutTimespan = New-TimeSpan -minutes $expectedIdleTimeout $appPool.ProcessModel.IdleTimeout | Should Be $expectedIdleTimeoutTimespan } function Assert-Identity($expectedUsername, $expectedPassword) { $appPool = Get-IisAppPool -Name $appPoolName $appPool.ProcessModel.UserName | Should Be $expectedUsername $appPool.ProcessModel.Password | Should Be $expectedPassword } function Assert-AppPool32BitEnabled([bool]$expected32BitEnabled) { $appPool = Get-IisAppPool -Name $appPoolName $appPool.Enable32BitAppOnWin64 | Should Be $expected32BitEnabled } function Assert-AppPool { param( [Parameter(Position=0)] $AppPool, $ManangedRuntimeVersion = 'v4.0', [Switch] $ClassicPipelineMode, $IdentityType = (Get-IISDefaultAppPoolIdentity), [Switch] $Enable32Bit, [TimeSpan] $IdleTimeout = (New-TimeSpan -Seconds 0) ) Set-StrictMode -Version 'Latest' Assert-AppPoolExists if( -not $AppPool ) { $AppPool = Get-IisAppPool -Name $appPoolName } $AppPool.ManagedRuntimeVersion | Should Be $ManangedRuntimeVersion $pipelineMode = 'Integrated' if( $ClassicPipelineMode ) { $pipelineMode = 'Classic' } $AppPool.ManagedPipelineMode | Should Be $pipelineMode $AppPool.ProcessModel.IdentityType | Should Be $IdentityType $AppPool.Enable32BitAppOnWin64 | Should Be ([bool]$Enable32Bit) $AppPool.ProcessModel.IdleTimeout | Should Be $IdleTimeout $MAX_TRIES = 20 for ( $idx = 0; $idx -lt $MAX_TRIES; ++$idx ) { $AppPool = Get-IisAppPool -Name $appPoolName $AppPool | Should Not BeNullOrEmpty if( $AppPool.State ) { $AppPool.State | Should Be ([Microsoft.Web.Administration.ObjectState]::Started) break } Start-Sleep -Milliseconds 1000 } } function Start-Test { Uninstall-IisAppPool -Name $appPoolName Revoke-Privilege -Identity $username -Privilege SeBatchLogonRight } Describe 'Install-IisAppPool when running no manage code' { Start-Test Install-IisAppPool -Name $appPoolName -ManagedRuntimeVersion '' It 'should set managed runtime to nothing' { Assert-ManagedRuntimeVersion -Version '' } } Describe 'Install-IisAppPool' { BeforeEach { Start-Test } function Get-IISDefaultAppPoolIdentity { $iisVersion = Get-IISVersion if( $iisVersion -eq '7.0' ) { return 'NetworkService' } return 'ApplicationPoolIdentity' } It 'should create new app pool' { $result = Install-IisAppPool -Name $appPoolName -PassThru $result | Should Not BeNullOrEmpty Assert-AppPool $result } It 'should create new app pool but not r eturn object' { $result = Install-IisAppPool -Name $appPoolName $result | Should BeNullOrEmpty $appPool = Get-IisAppPool -Name $appPoolName $appPool | Should Not BeNullOrEmpty Assert-AppPool $appPool } It 'should set managed runtime version' { $result = Install-IisAppPool -Name $appPoolName -ManagedRuntimeVersion 'v2.0' $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-ManagedRuntimeVersion 'v2.0' } It 'should set managed pipeline mode' { $result = Install-IisAppPool -Name $appPoolName -ClassicPipelineMode $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-ManagedPipelineMode 'Classic' } It 'should set identity as service account' { $result = Install-IisAppPool -Name $appPoolName -ServiceAccount 'NetworkService' $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-IdentityType 'NetworkService' } It 'should set identity as specific user' { $warnings = @() $result = Install-IisAppPool -Name $appPoolName -UserName $username -Password $password -WarningVariable 'warnings' $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-Identity $username $password Assert-IdentityType 'SpecificUser' Get-Privilege $username | Where-Object { $_ -eq 'SeBatchLogonRight' } | Should Not BeNullOrEmpty $warnings.Count | Should Be 1 ($warnings[0] -like '*obsolete*') | Should Be $true } It 'should set identity with credential' { $credential = New-Credential -UserName $username -Password $password $credential | Should Not BeNullOrEmpty $result = Install-IisAppPool -Name $appPoolName -Credential $credential $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-Identity $credential.UserName $credential.GetNetworkCredential().Password Assert-IdentityType 'Specificuser' Get-Privilege $username | Where-Object { $_ -eq 'SeBatchLogonRight' } | Should Not BeNullOrEmpty } It 'should set idle timeout' { $result = Install-IisAppPool -Name $appPoolName -IdleTimeout 55 $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-Idletimeout 55 } It 'should enable32bit apps' { $result = Install-IisAppPool -Name $appPoolName -Enable32BitApps $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-AppPool32BitEnabled $true } It 'should handle app pool that exists' { $result = Install-IisAppPool -Name $appPoolName $result | Should BeNullOrEmpty $result = Install-IisAppPool -Name $appPoolName $result | Should BeNullOrEmpty } It 'should change settings on existing app pool' { $result = Install-IisAppPool -Name $appPoolName $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-ManagedRuntimeVersion 'v4.0' Assert-ManagedPipelineMode 'Integrated' Assert-IdentityType (Get-IISDefaultAppPoolIdentity) Assert-AppPool32BitEnabled $false $result = Install-IisAppPool -Name $appPoolName -ManagedRuntimeVersion 'v2.0' -ClassicPipeline -ServiceAccount 'LocalSystem' -Enable32BitApps $result | Should BeNullOrEmpty Assert-AppPoolExists Assert-ManagedRuntimeVersion 'v2.0' Assert-ManagedPipelineMode 'Classic' Assert-IdentityType 'LocalSystem' Assert-AppPool32BitEnabled $true } It 'should accept secure string for app pool password' { $securePassword = ConvertTo-SecureString -String $password -AsPlainText -Force Install-IisAppPool -Name $appPoolName -Username $username -Password $securePassword Assert-Identity $username $password } It 'should convert32 bit app poolto64 bit' { Install-IisAppPool -Name $appPoolName -ServiceAccount NetworkService -Enable32BitApps Assert-AppPool32BitEnabled $true Install-IisAppPool -Name $appPoolName -ServiceAccount NetworkService Assert-AppPool32BitEnabled $false } It 'should switch to app pool identity if service account not given' { Install-IisAppPool -Name $appPoolName -ServiceAccount NetworkService Assert-IdentityType 'NetworkService' Install-IisAppPool -Name $appPoolName Assert-IdentityType (Get-IISDefaultAppPoolIdentity) } It 'should start stopped app pool' { Install-IisAppPool -Name $appPoolName $appPool = Get-IisAppPool -Name $appPoolName $appPool | Should Not BeNullOrEmpty if( $appPool.state -ne [Microsoft.Web.Administration.ObjectState]::Stopped ) { Start-Sleep -Seconds 1 $appPool.Stop() } Install-IisAppPool -Name $appPoolName $appPool = Get-IisAppPool -Name $appPoolName $appPool.state | Should Be ([Microsoft.Web.Administration.ObjectState]::Started) } It 'should fail if identity does not exist' { $error.Clear() Install-IisAppPool -Name $appPoolName -Username 'IDoNotExist' -Password 'blahblah' -ErrorAction SilentlyContinue (Test-IisAppPool -Name $appPoolName) | Should Be $true ($error.Count -ge 2) | Should Be $true } } Start-Test
combined_dataset/train/non-malicious/SqlProxy_3.psm1.ps1
SqlProxy_3.psm1.ps1
# --------------------------------------------------------------------------- ### <Author> ### Chad Miller ### </Author> ### <Description> ### Based on functions in SQLPSX. SqlProxy.psm1 module is used for administering ### SQL Server logins, users, and roles. Designed to be used with PS Remoting. ### All actions audited to a custom Eventlog. ### See Write-SqlProxyLog for log setup details ### </Description> # --------------------------------------------------------------------------- try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"} try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"; $smoVersion = 9} try {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum"; $smoVersion = 9} try { try {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended" -EA Stop} } catch {Write-Warning "SMOExtended not available"} $EventID = @{ "Add-SqlDatabaseRoleMember"=0 "Add-SqlLogin"=1 "Add-SqlServerRoleMember"=2 "Add-SqlUser"=3 "Remove-SqlDatabaseRoleMember"=4 "Remove-SqlLogin"=5 "Remove-SqlServerRoleMember"=6 "Remove-SqlUser"=7 "Rename-SqlLogin"=8 "Set-SqlLogin"=9 "Set-SqlLoginDefaultDatabase"=10 } ####################### <# .SYNOPSIS Gets a ServerConnection. .DESCRIPTION The Get-SqlConnection function gets a ServerConnection to the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlConnection .OUTPUTS Microsoft.SqlServer.Management.Common.ServerConnection Get-SqlConnection returns a Microsoft.SqlServer.Management.Common.ServerConnection object. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" This command gets a ServerConnection to SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" "sa" "Passw0rd" This command gets a ServerConnection to SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlConnection #> function Get-SqlConnection { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password ) Write-Verbose "Get-SqlConnection $sqlserver" try { if($Username -and $Password) { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver,$username,$password } else { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver } $con.Connect() Write-Output $con } catch { $message = $_.Exception.GetBaseException().Message write-error $message } } #Get-ServerConnection ####################### <# .SYNOPSIS Gets an SMO Server object. .DESCRIPTION The Get-SqlServer function gets a SMO Server object for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlServer .OUTPUTS Microsoft.SqlServer.Management.Smo.Server Get-SqlServer returns a Microsoft.SqlServer.Management.Smo.Server object. .EXAMPLE Get-SqlServer "Z002\\sql2K8" This command gets an SMO Server object for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" This command gets a SMO Server object for SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlServer #> function Get-SqlServer { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password, [Parameter(Position=3, Mandatory=$false)] [string]$StatementTimeout=0 ) #When $sqlserver passed in from the SMO Name property, brackets #are automatically inserted which then need to be removed $sqlserver = $sqlserver -replace "\\[|\\]" Write-Verbose "Get-SqlServer $sqlserver" $con = Get-SqlConnection $sqlserver $Username $Password $server = new-object ("Microsoft.SqlServer.Management.Smo.Server") $con #Some operations might take longer than the default timeout of 600 seconnds (10 minutes). Set new default to unlimited $server.ConnectionContext.StatementTimeout = $StatementTimeout $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.StoredProcedure], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.Table], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.View], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.UserDefinedFunction], "IsSystemObject") #trap { "Check $SqlServer Name"; continue} $server.ConnectionContext.Connect() Write-Output $server } #Get-SqlServer ####################### <# .SYNOPSIS Gets an SMO Database object. .DESCRIPTION The Get-SqlDatabase function gets an SMO Database object for the specified SQL Database or collection of Database objects. .INPUTS None You cannot pipe objects to Get-SqlDatabase .OUTPUTS Microsoft.SqlServer.Management.Smo.Database Get-SqlDatabase returns a Microsoft.SqlServer.Management.Smo.Database object. .EXAMPLE Get-SqlDatabase "Z002\\sql2K8" This command gets a collection of SMO Database objects for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlDatabase $(Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd") "pubs" This command gets a SMO Database object for SQL database pubs on the SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlDatabase #> function Get-SqlDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$dbname, [Parameter(Position=2, Mandatory=$false)] [switch]$force ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlDatabase $($server.Name) $dbname" if ($dbname) { if ($server.Databases.Contains("$dbname") -and $server.Databases[$dbname].IsAccessible) {$server.Databases[$dbname]} else {throw "Database $dname does not exist or is not accessible."} } elseif ($force) { $server.Databases | where {$_.IsAccessible -eq $true} } #Skip systems databases else { $server.Databases | where {$_.IsSystemObject -eq $false -and $_.IsAccessible -eq $true} } } # Get-SqlDatabase ####################### <# .SYNOPSIS Executes a query and returns an array of System.Data.DataRow. .DESCRIPTION The Get-SqlData function executes a query and returns an array of System.Data.DataRow. .INPUTS None You cannot pipe objects to Get-SqlData .OUTPUTS System.Data.DataRow Get-SqlData returns an array of System.Data.DataRow. .EXAMPLE Get-SqlData "Z002\\sql2K8" "pubs" "select * from authors" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Get-SqlData $server "pubs" "select * from authors" This command executes the specified SQL query using SQL authentication. .LINK Get-SqlData #> function Get-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Get-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name)" $ds = $database.ExecuteWithResults("$qry") $ds.Tables | foreach { $_.Rows} }# Get-SqlData ####################### <# .SYNOPSIS Executes a query that does not return a result set. .DESCRIPTION The Set-SqlData function executes a query that does not return a result set. .INPUTS None You cannot pipe objects to Set-SqlData .OUTPUTS None Set-SqlData does not produce any output. .EXAMPLE Set-SqlData "Z002\\sql2K8" "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Set-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Set-SqlData $server "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using SQL authentication. .LINK Set-SqlData #> function Set-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Set-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name)" $database.ExecuteNonQuery("$qry") }# Set-SqlData ####################### <# .SYNOPSIS Gets an SMO Login object. .DESCRIPTION The Get-SqlLogin function gets a collection of SMO Login objects for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlLogin .OUTPUTS Microsoft.SqlServer.Management.Smo.Login Get-SqlLogin returns a Microsoft.SqlServer.Management.Smo.Login object. .EXAMPLE Get-SqlLogin "Z002\\sql2K8" This command gets a collection of SMO Login objects for SQL Server Z002\\SQL2K8. .LINK Get-SqlLogin #> function Get-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlLogin $($server.Name)" foreach ($login in $server.Logins | where {$_.LoginType.ToString() -ne 'Certificate'}) { #Return Login Object $login } } # Get-SqlLogin ####################### <# .SYNOPSIS Adds a login to a SQL Server. .DESCRIPTION The Add-SqlLogin function adds a new login to the specified SQL server. .INPUTS None You cannot pipe objects to Add-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlLogin "Z002\\sql2k8" "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlLogin $server "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .LINK Add-SqlLogin #> function Add-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$false)] [System.Security.SecureString]$password, [Parameter(Position=3, Mandatory=$false)] [Microsoft.SqlServer.Management.Smo.LoginType]$logintype='WindowsUser', [Parameter(Position=4, Mandatory=$false)] [string]$DefaultDatabase='master', [Parameter(Position=5, Mandatory=$false)] [switch]$PasswordExpirationEnabled, [Parameter(Position=6, Mandatory=$false)] [switch]$PasswordPolicyEnforced, [Parameter(Position=7, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=8, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlLogin $($server.Name) $name" $login = new-object ('Microsoft.SqlServer.Management.Smo.Login') $server, $name $login.DefaultDatabase = $defaultDatabase if ($logintype -eq 'SqlLogin') { $login.LoginType = $logintype if ($server.Information.Version.Major -ne '8') { $login.PasswordExpirationEnabled = $($PasswordExpirationEnabled.IsPresent) $login.PasswordPolicyEnforced = $($PasswordPolicyEnforced.IsPresent) } try { $login.Create($password) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } elseif ($logintype -eq 'WindowsUser' -or $logintype -eq 'WindowsGroup') { $login.LoginType = $logintype try { $login.Create() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | % {"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } } #Add-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Remove-SqlLogin function removes a login from the specified SQL server. .INPUTS None You cannot pipe objects to Remove-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlLogin "Z002\\sql2k8" "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlLogin $server "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .LINK Remove-SqlLogin #> function Remove-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=3, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlLogin $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLogin function changes a SQL Login Password. .INPUTS None You cannot pipe objects to Set-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE $pwd_secure_string = read-host "Enter a Password:" -assecurestring Set-SqlLogin "Z002\\sql2k8" "TestPSUnit" $pwd_secure_string This command sets the password for TestPSUnit login. .LINK Set-SqlLogin #> function Set-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [System.Security.SecureString]$password, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLogin $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.ChangePassword($password,$true,$false) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLoginDefaultDatabase function changes a SQL Login default database. .INPUTS None You cannot pipe objects to Set-SqlLoginDefaultDatabase .OUTPUTS None This function does not generate any output. .EXAMPLE Set-SqlLoginDefaultDatabase "Z002\\sql2k8" "TestPSUnit" 'master' This command sets the default database for TestPSUnit login. .LINK Set-SqlLoginDefaultDatabase #> function Set-SqlLoginDefaultDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$DefaultDatabase, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLoginDefaultDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLoginDefaultDatabase $($server.Name) $name" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.DefaultDatabase = $DefaultDatabase $login.Alter() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLoginDefaultDatabase ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Rename-SqlLogin function renames a SQL Login. .INPUTS None You cannot pipe objects to Rename-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Rename-SqlLogin "Z002\\sql2k8" "TestPSUnit" "CheckPSUnit" This command renames the login TestPSUnit. .LINK Rename-SqlLogin #> function Rename-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$newname, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Rename-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Rename-SqlLogin $($server.Name) $name $newname" $login = Get-SqlLogin $server | where {$_.name -eq $name} try { if ($login) { $login.Rename("$newName") $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Rename-SqlLogin ####################### <# .SYNOPSIS Adds a new user to a database. .DESCRIPTION The Add-SqlUser function adds a new user to the specified database. .INPUTS None You cannot pipe objects to Add-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlUser -dbname $database "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .LINK Add-SqlUser #> function Add-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$false)] [string]$login=$name, [Parameter(Position=4, Mandatory=$false)] [string]$defaultSchema='dbo', [Parameter(Position=5, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=6, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlUser $($database.Name) $name" $user = new-object ('Microsoft.SqlServer.Management.Smo.User') $database, $name $user.Login = $login if ($database.parent.Information.Version.Major -ne '8') { $user.DefaultSchema = $defaultschema } try { $user.Create() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Add-SqlUser ####################### <# .SYNOPSIS Removes a user from a database. .DESCRIPTION The Remove-SqlUser function removes a user from the specified database. .INPUTS None You cannot pipe objects to Remove-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlUser -dbname $database "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .LINK Remove-SqlUser #> function Remove-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlUser $($database.Name) $name" $user = $database.Users[$name] try { if ($user) { $user.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "User $name does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlUser ####################### <# .SYNOPSIS Gets an SMO ServerRole object. .DESCRIPTION The Get-SqlServerRole function gets a collection of SMO ServerRole objects for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlServerRole .OUTPUTS Microsoft.SqlServer.Management.Smo.ServerRole Get-SqlServerRole returns a Microsoft.SqlServer.Management.Smo.ServerRole object. .EXAMPLE Get-SqlServerRole "Z002\\sql2K8" This command gets a collection of SMO ServerRole objects for SQL Server Z002\\SQL2K8. .LINK Get-SqlServerRole #> function Get-SqlServerRole { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlServerRole:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlServerRole $($server.Name)" foreach ($svrole in $server.Roles) { #Return ServerRole Object $svrole } } #Get-SqlServerRole ####################### <# .SYNOPSIS Adds a login to a server role. .DESCRIPTION The Add-SqlServerRoleMember function adds a login to the specified server role. .INPUTS None You cannot pipe objects to Add-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .LINK Add-SqlServerRoleMember #> function Add-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlServerRoleMember $($server.Name) $name" if($server.Logins | where {$_.name -eq $loginame}) { $svrole = Get-SqlServerRole $server | where {$_.name -eq $rolename} try { if ($svrole) { $svrole.AddMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Add-SqlServerRoleMember ####################### <# .SYNOPSIS Removes a login from a server role. .DESCRIPTION The Remove-SqlServerRoleMember function removes a login from the specified server role. .INPUTS None You cannot pipe objects to Remove-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .LINK Remove-SqlServerRoleMember #> function Remove-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlServerRoleMember $($server.Name) $name" if($server.Logins | where {$_.name -eq $loginame}) { $svrole = Get-SqlServerRole $server | where {$_.name -eq $rolename} try { if ($svrole) { $svrole.DropMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Remove-SqlServerRoleMember ####################### <# .SYNOPSIS Returns a SMO DatabaseRole object with additional properties. .DESCRIPTION The Get-SqlDatabaseRole function gets a collection of SMO DatabaseRole objects for the specified SQL Database. .INPUTS Microsoft.SqlServer.Management.Smo.Database You can pipe database objects to Get-SqlDatabaseRole .OUTPUTS Microsoft.SqlServer.Management.Smo.DatabaseRole Get-SqlDatabaseRole returns a Microsoft.SqlServer.Management.Smo.DatabaseRole object. .EXAMPLE Get-SqlDatabaseRole $(Get-SqlDatabase "Z002\\sql2K8" pubs) This command gets a collection of SMO DatabaseRole objects for SQL Server Z002\\SQL2K8, pubs database. .EXAMPLE Get-SqlDatabase "Z002\\sql2K8" | Get-SqlDatabaseRole This command gets a collection SMO DatabaseRole objects for all SQL databases on the SQL Server Z002\\SQL2K8. .LINK Get-SqlDatabaseRole #> function Get-SqlDatabaseRole { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline = $true)] [Microsoft.SqlServer.Management.Smo.Database]$database ) process { foreach ($role in $database.Roles) { #Return DatabaseRole Object $role } } } #Get-SqlDatabaseRole ####################### <# .SYNOPSIS Adds a user or role to a database role. .DESCRIPTION The Add-SqlDatabaseRoleMember function adds a user or role to the specified database role. .INPUTS None You cannot pipe objects to Add-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .LINK Add-SqlDatabaseRoleMember #> function Add-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlDatabaseRoleMember $($database.Name) $name $rolename" if(($database.Users | where {$_.name -eq $name}) -or ($database.Roles | where {$_.name -eq $name})) { $role = Get-SqlDatabaseRole $database | where {$_.name -eq $rolename} try { if ($role) { $role.AddMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Role or User $name does not exist in database $($database.Name)." } } #Add-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Removes a user or role from a database role. .DESCRIPTION The Remove-SqlDatabaseRoleMember function removes a user or role from the specified database role. .INPUTS None You cannot pipe objects to Remove-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .LINK Remove-SqlDatabaseRoleMember #> function Remove-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlDatabaseRoleMember $($database.Name) $name $rolename" if(($database.Users | where {$_.name -eq $name}) -or ($database.Roles | where {$_.name -eq $name})) { $role = Get-SqlDatabaseRole $database | where {$_.name -eq $rolename} try { if ($role) { $role.DropMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Role or User $name does not exist in database $($database.Name)." } } #Remove-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Writes an entry to SqlProxy Log File. .DESCRIPTION The Write-SqlProxyLog function writes an entry to the SqlProxy Log File. .INPUTS None You cannot pipe objects to Write-SqlProxyLog .OUTPUTS None This function does not generate any output. .EXAMPLE $message = "PSUserName=$PSUserName`n" + $($psBoundParameters.GetEnumerator() | %{"$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $message This command writes a message to the SQLProxy Log .NOTES This must be run as administrator to create the new EventLog and EventLog Source!!! New-EventLog -LogName SqlProxy -Source SqlProxy .LINK Write-SqlProxyLog #> function Write-SqlProxyLog { param( [Parameter(Position=0, Mandatory=$true)] $EventID, [Parameter(Position=1, Mandatory=$true)] $Message, [Parameter(Position=2, Mandatory=$false)] $EntryType='SuccessAudit' ) write-eventlog -logname SqlProxy -source SqlProxy -eventID $eventID -message $message -EntryType $EntryType } #Write-SqlProxyLog
combined_dataset/train/non-malicious/375.ps1
375.ps1
Describe "Get-PSFConfig Unit Tests" -Tag "CI", "Config", "Unit" { BeforeAll { Get-PSFConfig -Module PSFTests -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } AfterAll { Get-PSFConfig -Module PSFTests -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } It "Should have the designed for parameters & sets" { (Get-Command Get-PSFConfig).ParameterSets.Name | Should -Be 'FullName', 'Module' (Get-Command Get-PSFConfig).Parameters.Keys | Should -Be 'FullName', 'Name', 'Module', 'Force', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable' } It "Should find the correct Configuration item" { $config = New-Object PSFramework.Configuration.Config $config.Module = "psftests" $config.Name = "get-psfconfig.test1" [PSFramework.Configuration.ConfigurationHost]::Configurations[$config.FullName] = $config (Get-PSFConfig -FullName 'PSFTests.Get-PSFConfig.Test1').GetHashCode() | Should -Be ($config.GetHashCode()) } }
combined_dataset/train/non-malicious/2200.ps1
2200.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server name with SMS Provider installed")] [ValidateNotNullorEmpty()] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Name of the device that will be removed from any specified device collections")] [ValidateNotNullorEmpty()] [string]$DeviceName ) Begin { try { Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Debug "SiteCode: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message $_.Exception.Message ; break } } Process { function Write-LogFile { param( [parameter(Mandatory=$true, HelpMessage="Name of the log file, e.g. 'FileName'. File extension should not be specified")] [ValidateNotNullOrEmpty()] [string]$Name, [parameter(Mandatory=$true, HelpMessage="Value added to the specified log file")] [ValidateNotNullOrEmpty()] [string]$Value, [parameter(Mandatory=$true, HelpMessage="Choose a location where the log file will be created")] [ValidateNotNullOrEmpty()] [ValidateSet("UserTemp","WindowsTemp")] [string]$Location ) switch ($Location) { "UserTemp" { $LogLocation = ($env:TEMP + "\") } "WindowsTemp" { $LogLocation = ($env:SystemRoot + "\Temp\") } } $LogFile = ($LogLocation + $Name + ".log") if (-not(Test-Path -Path $LogFile -PathType Leaf)) { New-Item -Path $LogFile -ItemType File -Force | Out-Null } Add-Content -Value $Value -LiteralPath $LogFile -Force } Write-LogFile -Name "RemoveDeviceFromCollection" -Location WindowsTemp -Value "Determine ResourceID for DeviceName: $($DeviceName)" $ResourceIDs = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_R_System -Filter "Name like '$($DeviceName)'" | Select-Object -ExpandProperty ResourceID foreach ($ResourceID in $ResourceIDs) { Write-LogFile -Name "RemoveDeviceFromCollection" -Location WindowsTemp -Value "ResourceID: $($ResourceID)" $CollectionIDList = New-Object -TypeName System.Collections.ArrayList $CollectionIDList.AddRange(@("PS100052","PS1000A8","PS1000A1","PS100053")) foreach ($CollectionID in $CollectionIDList) { $Collection = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_Collection -Filter "CollectionID like '$($CollectionID)'" $Collection.Get() foreach ($CollectionRule in $Collection.CollectionRules) { if ($CollectionRule.ResourceID -like $ResourceID) { Write-LogFile -Name "RemoveDeviceFromCollection" -Location WindowsTemp -Value "Removing '$($DeviceName)' from '$($Collection.Name)" $Collection.DeleteMembershipRule($CollectionRule) } } } } }
combined_dataset/train/non-malicious/1731.ps1
1731.ps1
function New-ServiceNowTableEntry{ Param ( [parameter(mandatory=$true)] [parameter(ParameterSetName='SpecifyConnectionFields')] [parameter(ParameterSetName='UseConnectionObject')] [parameter(ParameterSetName='SetGlobalAuth')] [string]$Table, [parameter(mandatory=$false)] [parameter(ParameterSetName='SpecifyConnectionFields')] [parameter(ParameterSetName='UseConnectionObject')] [parameter(ParameterSetName='SetGlobalAuth')] [hashtable]$Values, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$True)] [ValidateNotNullOrEmpty()] [PSCredential] $ServiceNowCredential, [Parameter(ParameterSetName='SpecifyConnectionFields', Mandatory=$True)] [ValidateNotNullOrEmpty()] [string] $ServiceNowURL, [Parameter(ParameterSetName='UseConnectionObject', Mandatory=$True)] [ValidateNotNullOrEmpty()] [Hashtable] $Connection ) if ($Connection -ne $null) { $SecurePassword = ConvertTo-SecureString $Connection.Password -AsPlainText -Force $ServiceNowCredential = New-Object System.Management.Automation.PSCredential ($Connection.Username, $SecurePassword) $ServiceNowURL = 'https://' + $Connection.ServiceNowUri + '/api/now/v1' } elseif ($ServiceNowCredential -ne $null -and $ServiceNowURL -ne $null) { $ServiceNowURL = 'https://' + $ServiceNowURL + '/api/now/v1' } elseif((Test-ServiceNowAuthIsSet)) { $ServiceNowCredential = $Global:ServiceNowCredentials $ServiceNowURL = $global:ServiceNowRESTURL } else { throw "Exception: You must do one of the following to authenticate: `n 1. Call the Set-ServiceNowAuth cmdlet `n 2. Pass in an Azure Automation connection object `n 3. Pass in an endpoint and credential" } $Body = $Values | ConvertTo-Json; $utf8Bytes = [System.Text.Encoding]::UTf8.GetBytes($Body) $Uri = $ServiceNowURL + "/table/$Table" return (Invoke-RestMethod -Uri $uri -Method Post -Credential $ServiceNowCredential -Body $utf8Bytes -ContentType "application/json" -UseBasicParsing).result }
combined_dataset/train/non-malicious/1956.ps1
1956.ps1
Describe "Format-Table" -Tags "CI" { It "Should call format table on piped input without error" { { Get-Date | Format-Table } | Should -Not -Throw } It "Should return a format object data type" { $val = Get-Date | Format-Table | Get-Member $val2 = Get-Date | Format-Table | Get-Member $val.TypeName | Should -Match "Microsoft.Powershell.Commands.Internal.Format" $val2.TypeName | Should -Match "Microsoft.Powershell.Commands.Internal.Format" } It "Should be able to be called with optional parameters" { $v1 = Get-Date | Format-Table * $v2 = Get-Date | Format-Table -Property Hour $v3 = Get-Date | Format-Table -GroupBy Hour } It "Format-Table with not existing table with force should throw PipelineStoppedException"{ $obj = New-Object -typename PSObject $e = { $obj | Format-Table -view bar -force -ErrorAction Stop } | Should -Throw -ErrorId "FormatViewNotFound,Microsoft.PowerShell.Commands.FormatTableCommand" -PassThru $e.CategoryInfo | Should -Match "PipelineStoppedException" } It "Format-Table with array should work" { $al = (0..255) $info = @{} $info.array = $al $result = $info | Format-Table | Out-String $result | Should -Match "array\s+{0, 1, 2, 3`u{2026}}" } It "Format-Table with Negative Count should work" { $FormatEnumerationLimit = -1 $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{1, 2}" } It "Format-Table with Zero Count should work" -Pending { $FormatEnumerationLimit = 0 $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{...}" } It "Format-Table with Less Count should work" { $FormatEnumerationLimit = 1 $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{1...}" } It "Format-Table with More Count should work" { $FormatEnumerationLimit = 10 $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{1, 2}" } It "Format-Table with Equal Count should work" { $FormatEnumerationLimit = 2 $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{1, 2}" } It "Format-Table with Bogus Count should throw Exception" -Pending { $FormatEnumerationLimit = "abc" $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result|Out-String $resultStr | Should -Match "test\s+{1, 2}" } It "Format-Table with Var Deleted should throw Exception" -Pending { $FormatEnumerationLimit = 2 Remove-Variable FormatEnumerationLimit $result = Format-Table -inputobject @{'test'= 1, 2} $resultStr = $result | Out-String $resultStr | Should -Match "test\s+{1, 2}" } It "Format-Table with new line should work" { $info = @{} $info.name = "1\n2" $result = $info | Format-Table | Out-String $result | Should -Match "name\s+1.+2" } It "Format-Table with ExposeBug920454 should work" { $IP1 = [System.Net.IPAddress]::Parse("1.1.1.1") $IP2 = [System.Net.IPAddress]::Parse("4fde:0000:0000:0002:0022:f376:255.59.171.63") $IPs = New-Object System.Collections.ArrayList $IPs.Add($IP1) $IPs.Add($IP2) $info = @{} $info.test = $IPs $result = $info | Format-Table | Out-String $result | Should -Match "test\s+{1.1.1.1, 4fde::2:22:f376:ff3b:ab3f}" } It "Format-Table with Autosize should work" { $IP1 = [PSCustomObject]@{'name'='Bob';'size'=1234;'booleanValue'=$true;} $IP2 = [PSCustomObject]@{'name'='Jim';'size'=5678;'booleanValue'=$false;} $IPs = New-Object System.Collections.ArrayList $IPs.Add($IP1) $IPs.Add($IP2) $result = $IPs | Format-Table -Autosize | Out-String $result | Should -Match "name size booleanValue" $result | Should -Match "---- ---- ------------" $result | Should -Match "Bob\s+1234\s+True" $result | Should -Match "Jim\s+5678\s+False" } It "Format-Table with '<testName>' should return `$null" -TestCases @( @{ testName = "empty array"; testObject = @{} }, @{ testName = "null" ; testObject = $null } ) { param ($testObject) $result = $testObject | Format-Table -Property "foo","bar" | Out-String $result | Should -BeNullOrEmpty } It "Format-Table with '<testName>' string and -Force should output table with requested properties" -TestCases @( @{ testName = "single line"; testString = "single line string" }, @{ testName = "multi line" ; testString = "line1`nline2" }, @{ testName = "array" ; testString = "line1","line2" } ) { param ($testString) $result = $testString | Format-Table -Property "foo","bar" -Force | Out-String $result.Replace(" ","").Replace([Environment]::NewLine,"") | Should -BeExactly "foobar------" } It "Format-Table with complex object for End-To-End should work" { Add-Type -TypeDefinition "public enum MyDayOfWeek{Sun,Mon,Tue,Wed,Thu,Fri,Sat}" $eto = New-Object MyDayOfWeek $info = @{} $info.intArray = 1,2,3,4 $info.arrayList = "string1","string2" $info.enumerable = [MyDayOfWeek]$eto $info.enumerableTestObject = $eto $result = $info|Format-Table|Out-String $result | Should -Match "intArray\s+{1, 2, 3, 4}" $result | Should -Match "arrayList\s+{string1, string2}" $result | Should -Match "enumerable\s+Sun" $result | Should -Match "enumerableTestObject\s+Sun" } It "Format-Table with Expand Enumerable should work" { $obj1 = "x 0","y 0" $obj2 = "x 1","y 1" $objs = New-Object System.Collections.ArrayList $objs.Add($obj1) $objs.Add($obj2) $mo = [PSCustomObject]@{name = "this is name";sub = $objs} $result1 = $mo|Format-Table -Expand CoreOnly|Out-String $result1 | Should -Match "name\s+sub" $result1 | Should -Match "this is name" $result2 = $mo|Format-Table -Expand EnumOnly|Out-String $result2 | Should -Match "name\s+sub" $result2 | Should -Match "this is name\s+{x 0 y 0, x 1 y 1}" $result3 = $mo|Format-Table -Expand Both|Out-String $result3 | Should -Match "name\s+sub" $result3 | Should -Match "this is name\s+{x 0 y 0, x 1 y 1}" } It "Format-Table should not add trailing whitespace to the header" { $out = "hello" | Format-Table -Property foo -Force | Out-String $out.Replace([System.Environment]::NewLine, "") | Should -BeExactly "foo---" } It "Format-Table should not add trailing whitespace to rows" { $out = [pscustomobject]@{a=1;b=2} | Format-Table -HideTableHeaders | Out-String $out.Replace([System.Environment]::NewLine, "") | Should -BeExactly "1 2" } It "Format-Table should have correct alignment" { $ps1xml = @" <Configuration> <ViewDefinitions> <View> <Name>Test.Format</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>Left</Label> <Alignment>left</Alignment> </TableColumnHeader> <TableColumnHeader> <Label>Center</Label> <Alignment>center</Alignment> </TableColumnHeader> <TableColumnHeader> <Label>Right</Label> <Alignment>right</Alignment> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Left</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Center</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Right</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ $ps1xmlPath = Join-Path -Path $TestDrive -ChildPath "alignment.format.ps1xml" Set-Content -Path $ps1xmlPath -Value $ps1xml $ps = [powershell]::Create() $ps.AddScript( { param($ps1xmlPath) Update-FormatData -AppendPath $ps1xmlPath $a = [PSCustomObject]@{Left=1;Center=2;Right=3} $a.PSObject.TypeNames.Insert(0,"Test.Format") $a | Out-String } ).AddArgument($ps1xmlPath) | Out-Null $output = $ps.Invoke() $expectedTable = @" Left Center Right ---- ------ ----- 1 2 3 "@ $output.Replace("`n","").Replace("`r","") | Should -BeExactly $expectedTable.Replace("`n","").Replace("`r","") } It "Format-Table should not have trailing whitespace if there is truncation: <view>" -TestCases @( @{view="Test.Format.Left" ; object=[pscustomobject]@{Left="123`u{2B758}"} ; expected="Left----123`u{2026}" }, @{view="Test.Format.Center"; object=[pscustomobject]@{Center="12345`u{2B758}"}; expected="Center------12345`u{2026}"} ) { param($view, $object, $expected) $ps1xml = @" <Configuration> <ViewDefinitions> <View> <Name>Test.Format.Left</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>Left</Label> <Alignment>left</Alignment> <Width>4</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Left</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> <View> <Name>Test.Format.Center</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>Center</Label> <Alignment>center</Alignment> <Width>6</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Center</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ $ps1xmlPath = Join-Path -Path $TestDrive -ChildPath "truncation.format.ps1xml" Set-Content -Path $ps1xmlPath -Value $ps1xml $ps = [powershell]::Create() $ps.AddScript( { param($ps1xmlPath,$view,$object) Update-FormatData -AppendPath $ps1xmlPath $object.PSObject.TypeNames.Insert(0,"Test.Format") $object | Format-Table -View $view | Out-String } ).AddArgument($ps1xmlPath).AddArgument($view).AddArgument($object) | Out-Null $output = $ps.Invoke() $output.Replace("`n","").Replace("`r","") | Should -BeExactly $expected } It "Format-Table should correctly render headers that span multiple rows: <variation>" -TestCases @( @{ view = "Default"; widths = 7,7,7; variation = "2 row, 1 row, 1 row"; expectedTable = @" LongLon Header2 Header3 gHeader ------- ------- ------- 1 2 3 "@ }, @{ view = "Default"; widths = 4,7,4; variation = "4 row, 1 row, 2 row"; expectedTable = @" Long Header2 Head Long er3 Head er ---- ------- ---- 1 2 3 "@ }, @{ view = "Default"; widths = 4,4,7; variation = "4 row, 2 row, 1 row"; expectedTable = @" Long Head Header3 Long er2 Head er ---- ---- ------- 1 2 3 "@ }, @{ view = "Default"; widths = 14,7,3; variation = "1 row, 1 row, 3 row"; expectedTable = @" LongLongHeader Header2 Hea der 3 -------------- ------- --- 1 2 3 "@ }, @{ view = "One"; widths = 4,1,1; variation = "1 column"; expectedTable = @" Long Long Head er ---- 1 "@ } ) { param($view, $widths, $expectedTable) $ps1xml = @" <Configuration> <ViewDefinitions> <View> <Name>Default</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>LongLongHeader</Label> <Width>{0}</Width> </TableColumnHeader> <TableColumnHeader> <Label>Header2</Label> <Width>{1}</Width> </TableColumnHeader> <TableColumnHeader> <Label>Header3</Label> <Width>{2}</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>First</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Second</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Third</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> <View> <Name>One</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>LongLongHeader</Label> <Width>{0}</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>First</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ $ps1xml = $ps1xml.Replace("{0}", $widths[0]).Replace("{1}", $widths[1]).Replace("{2}", $widths[2]) $ps1xmlPath = Join-Path -Path $TestDrive -ChildPath "span.format.ps1xml" Set-Content -Path $ps1xmlPath -Value $ps1xml $ps = [powershell]::Create() $ps.AddScript( { param($ps1xmlPath, $view) Update-FormatData -AppendPath $ps1xmlPath $a = [PSCustomObject]@{First=1;Second=2;Third=3} $a.PSObject.TypeNames.Insert(0,"Test.Format") $a | Format-Table -View $view | Out-String } ).AddArgument($ps1xmlPath).AddArgument($view) | Out-Null $output = $ps.Invoke() foreach ($e in $ps.Streams.Error) { Write-Verbose $e.ToString() -Verbose } $ps.HadErrors | Should -BeFalse $output.Replace("`r","").Replace(" ",".").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } It "Format-Table should correctly render rows: <variation>" -TestCases @( @{ view = "Default"; widths = 4,7,5; variation = "narrow values"; values = [PSCustomObject]@{First=1;Second=2;Third=3}; wrap = $false; expectedTable = @" Long*Header2*Heade Long**********r3 Head er ----*-------*----- 1**********2***3 "@ }, @{ view = "Default"; widths = 4,7,5; variation = "narrow values with wrap"; values = [PSCustomObject]@{First=1;Second=2;Third=3}; wrap = $true; expectedTable = @" Long*Header2*Heade Long**********r3 Head er ----*-------*----- 1**********2***3 "@ }, @{ view = "Default"; widths = 4,7,5; variation = "wide values"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $false; expectedTable = @" Long*Header2*Heade Long**********r3 Head er ----*-------*----- 123`u{2026}*`u{2026}345678*1234`u{2026} "@ }, @{ view = "One"; widths = 3,1,1; variation = "wide values, 1 column"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $false; expectedTable = @" Lon gLo ngH ead er --- 12`u{2026} "@ }, @{ view = "Default"; widths = 4,8,6; variation = "wide values with wrap, 1st column"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $true; expectedTable = @" Long**Header2*Header Long************3 Head er ----**-------*------ 1234*12345678*123456 5 "@ }, @{ view = "Default"; widths = 5,7,6; variation = "wide values with wrap, 2nd column"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $true; expectedTable = @" LongL*Header2*Header ongHe***********3 ader -----*-------*------ 12345*1234567*123456 ************8 "@ }, @{ view = "Default"; widths = 5,8,5; variation = "wide values with wrap, 3rd column"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $true; expectedTable = @" LongL**Header2*Heade ongHe***********r3 ader -----**-------*----- 12345*12345678*12345 *****************6 "@ }, @{ view = "Default"; widths = 4,7,5; variation = "wide values with wrap, all 3 columns"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $true; expectedTable = @" Long*Header2*Heade Long**********r3 Head er ----*-------*----- 1234*1234567*12345 5**********8***6 "@ }, @{ view = "One"; widths = 3,1,1; variation = "wide values with wrap, with 1 column"; values = [PSCustomObject]@{First="12345";Second="12345678";Third="123456"}; wrap = $true; expectedTable = @" Lon gLo ngH ead er --- 123 45 "@ } ) { param($view, $widths, $values, $wrap, $expectedTable) $ps1xml = @" <Configuration> <ViewDefinitions> <View> <Name>Default</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Alignment>left</Alignment> <Label>LongLongHeader</Label> <Width>{0}</Width> </TableColumnHeader> <TableColumnHeader> <Alignment>right</Alignment> <Label>Header2</Label> <Width>{1}</Width> </TableColumnHeader> <TableColumnHeader> <Alignment>center</Alignment> <Label>Header3</Label> <Width>{2}</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>First</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Second</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Third</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> <View> <Name>One</Name> <ViewSelectedBy> <TypeName>Test.Format</TypeName> </ViewSelectedBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>LongLongHeader</Label> <Width>{0}</Width> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>First</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> "@ $ps1xml = $ps1xml.Replace("{0}", $widths[0]).Replace("{1}", $widths[1]).Replace("{2}", $widths[2]) $ps1xmlPath = Join-Path -Path $TestDrive -ChildPath "render.format.ps1xml" Set-Content -Path $ps1xmlPath -Value $ps1xml $ps = [powershell]::Create() $ps.AddScript( { param($ps1xmlPath, $view, $values, $wrap) Update-FormatData -AppendPath $ps1xmlPath $values.PSObject.TypeNames.Insert(0,"Test.Format") $values | Format-Table -View $view -Wrap:$wrap | Out-String } ).AddArgument($ps1xmlPath).AddArgument($view).AddArgument($values).AddArgument($wrap) | Out-Null $output = $ps.Invoke() foreach ($e in $ps.Streams.Error) { Write-Verbose $e.ToString() -Verbose } $ps.HadErrors | Should -BeFalse $output.Replace("`r","").Replace(" ","*").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } It "Should render header/row correctly where values are wider than header w/ implicit autosize: <variation>" -TestCases @( @{ variation = "first column"; obj = [pscustomobject]@{abc="1234";bcd="123"},[pscustomobject]@{abc="1";bcd="1234"}; expectedTable = @" abc bcd --- --- 1234 123 1 1234 "@ }, @{ variation = "both columns"; obj = [pscustomobject]@{abc="1234";bcd="1234"},[pscustomobject]@{abc="1";bcd="1"}; expectedTable = @" abc bcd --- --- 1234 1234 1 1 "@ }, @{ variation = "second column"; obj = [pscustomobject]@{abc="123";bcd="1234"},[pscustomobject]@{abc="1";bcd="123"}; expectedTable = @" abc bcd --- --- 123 1234 1 123 "@ } ) { param($obj, $expectedTable) $output = $obj | Format-Table | Out-String $output.Replace("`r","").Replace(" ",".").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } It "Should render header correctly where header is shorter than column width with justification: <variation>" -TestCases @( @{ variation = "left/right"; obj = [PSCustomObject]@{a="abc";b=123}; expectedTable = @" a b - - abc 123 "@ }, @{ variation = "left/left"; obj = [PSCustomObject]@{a="abc";b="abc"}; expectedTable = @" a b - - abc abc "@ }, @{ variation = "right/left"; obj = [PSCustomObject]@{a=123;b="abc"}; expectedTable = @" a b - - 123 abc "@ }, @{ variation = "right/right"; obj = [PSCustomObject]@{a=123;b=123}; expectedTable = @" a b - - 123 123 "@ } ) { param($obj, $expectedTable) $output = $obj | Format-Table | Out-String $output.Replace("`r","").Replace(" ",".").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } It "Should render rows correctly when wrapped: <variation>" -TestCases @( @{ variation = "right"; obj = [pscustomobject] @{A=1;B=2;Name="This`nIs some random`nmultiline content"}; expectedTable = @" A B Name - - ---- 1 2 This Is some random multiline content "@ }, @{ variation = "left"; obj = [pscustomobject] @{Name="This`nIs some random`nmultiline content";A=1;B=2}; expectedTable = @" Name A B ---- - - This 1 2 Is some random multiline content "@ }, @{ variation = "middle"; obj = [pscustomobject] @{A=1;Name="This`nIs some random`nmultiline content";B=2}; expectedTable = @" A Name B - ---- - 1 This 2 Is some random multiline content "@ } ) { param($obj, $expectedTable) $output = $obj | Format-Table -Wrap | Out-String $output.Replace("`r","").Replace(" ",".").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } It "Should not return null when the Console width is equal to 0" { [system.management.automation.internal.internaltesthooks]::SetTestHook('SetConsoleWidthToZero', $true) try { $testObject = @{ test = '1' * 200} Format-table -inputobject $testObject | Out-String -Stream | ForEach-Object{$_.length} | Sort-Object -Bottom 1 | Should -Be 120 } finally { [system.management.automation.internal.internaltesthooks]::SetTestHook('SetConsoleWidthToZero', $false) } } It "-RepeatHeader should output the header at every screen full" -Skip:([Console]::WindowHeight -eq 0) { $numHeaders = 4 $numObjects = [Console]::WindowHeight * $numHeaders $out = 1..$numObjects | ForEach-Object { @{foo=$_} } | Format-Table -RepeatHeader | Out-String $lines = $out.Split([System.Environment]::NewLine) ($lines | Select-String "Name\s*Value").Count | Should -Be ($numHeaders + 1) } It "Should be formatted correctly if width is declared and using center alignment" { $expectedTable = @" one --- 1 "@ $output = [pscustomobject] @{ one = 1 } | Format-Table @{ l='one'; e='one'; width=10; alignment='center' } | Out-String $output.Replace("`r","").Replace(" ",".").Replace("`n","^") | Should -BeExactly $expectedTable.Replace("`r","").Replace(" ",".").Replace("`n","^") } }
combined_dataset/train/non-malicious/SharpSsh Functions.ps1
SharpSsh Functions.ps1
## USING the binaries from: ## http://downloads.sourceforge.net/sharpssh/SharpSSH-1.1.1.13.bin.zip [void][reflection.assembly]::LoadFrom( (Resolve-Path "~\\Documents\\WindowsPowerShell\\Libraries\\Tamir.SharpSSH.dll") ) ## NOTE: These are bare minimum functions, and only cover ssh, not scp or sftp ## also, if you "expect" something that doesn't get output, you'll be completely stuck. ## ## As a suggestion, the best way to handle the output is to "expect" your prompt, and then do ## select-string matching on the output that was captured before the prompt. function New-SshSession { Param( [string]$UserName , [string]$HostName , [string]$RSAKeyFile , [switch]$Passthru ) if($RSAKeyFile -and (Test-Path $RSAKeyFile)){ $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName $global:LastSshSession.AddIdentityFile( (Resolve-Path $RSAKeyFile) ) } else { $cred = $host.UI.PromptForCredential("SSH Login Credentials", "Please specify credentials in user@host format", "$UserName@$HostName","") $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName, $cred.GetNetworkCredential().Password } $global:LastSshSession.Connect() $global:LastSshSession.RemoveTerminalEmulationCharacters = $true if($Passthru) { return $global:LastSshSession } } function Remove-SshSession { Param([Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession) $SshShell.WriteLine( "exit" ) sleep -milli 500 if($SshShell.ShellOpened) { Write-Warning "Shell didn't exit cleanly, closing anyway." } $SshShell.Close() $SshShell = $null } function Invoke-Ssh { Param( [string]$command , [regex]$expect ## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } } function Send-Ssh { Param( [string]$command , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) } else { throw "The ssh shell isn't open!" } } function Receive-Ssh { Param( [RegEx]$expect ## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } }
combined_dataset/train/non-malicious/sample_15_41.ps1
sample_15_41.ps1
trap { # If we except, lets report it visually. Can help with debugging if there IS a problem # in here. Write-Host "EXCEPTION: $($PSItem.ToString())" -ForegroundColor Red Write-Host "$($PSItem.ScriptStackTrace)" Start-Sleep 10 } # Get an environment variable with default value if not present function VGet($varname, $default) { if (Test-Path "$varname") { $val = (Get-Item $varname).Value if ("$val".Length -gt 0) { return $val } } return $default } # Get an array as an option separated list of values --glob x --glob y etc... function VOptGet($varname,$opt) { $ARR=@() $DATA=(VGet "$varname" "") if ("$DATA".Length -gt 0) { $DATA = $DATA.Split(":") foreach ($ENTRY in $DATA) { if ("$ENTRY".Length -gt 0) { $ARR+=" $opt " $ARR+="'$ENTRY'" } } } return $ARR } $USE_GITIGNORE_OPT="" if ( (VGet "env:USE_GITIGNORE" 0) -eq 0) { $USE_GITIGNORE_OPT="--no-ignore" } $TYPE_FILTER_ARR=VOptGet "env:TYPE_FILTER" "--type" $GLOBS=VOptGet "env:GLOBS" "--glob" # If we only have one directory to search, invoke commands relative to that directory $PATHS=$args $SINGLE_DIR_ROOT="" if ($PATHS.Count -eq 1) { $SINGLE_DIR_ROOT=$PATHS[0] if ( -not (Test-Path "$SINGLE_DIR_ROOT")) { Write-Host "Failed to push into: $SINGLE_DIR_ROOT" -ForegroundColor Red exit 1 } Push-Location "$SINGLE_DIR_ROOT" $PATHS="" } $PREVIEW_ENABLED=VGet "env:FIND_WITHIN_FILES_PREVIEW_ENABLED" 0 $PREVIEW_COMMAND=VGet "env:FIND_WITHIN_FILES_PREVIEW_COMMAND" 'bat --decorations=always --color=always --plain {}' $PREVIEW_WINDOW=VGet "env:FIND_WITHIN_FILES_PREVIEW_WINDOW_CONFIG" 'right:50%:border-left' $HAS_SELECTION=VGet "env:HAS_SELECTION" 0 $QUERY="" if ($HAS_SELECTION -eq 1) { $QUERY=Get-Content "$SELECTION_FILE" -Raw } $fzf_command = "fzf --cycle --multi" if ("$QUERY".Length -gt 0) { $fzf_command+=" --query" $fzf_command+=" " $fzf_command+="${QUERY}" } if ( $PREVIEW_ENABLED -eq 1){ $fzf_command+=" --preview '$PREVIEW_COMMAND' --preview-window $PREVIEW_WINDOW" } $expression = "rg --files --hidden $USE_GITIGNORE_OPT --glob '!**/.git/' $GLOBS $TYPE_FILTER_ARR $PATHS" + " | " + $fzf_command $result = Invoke-Expression( $expression ) # Output is filename, line number, character, contents if ("$result".Length -lt 1) { Write-Host canceled "1" | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 exit 1 } else { if ("$SINGLE_DIR_ROOT".Length -gt 0) { Join-Path -Path "$SINGLE_DIR_ROOT" -ChildPath "$result" | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 } else { $result | Out-File -FilePath "$Env:CANARY_FILE" -Encoding UTF8 } }
combined_dataset/train/non-malicious/3780.ps1
3780.ps1
function Test-RegisteredServer { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Get RegisteredServer by ParentObject" $registeredServers = Get-AzStorageSyncServer -ParentObject $storageSyncService -Verbose Assert-AreEqual $registeredServers.Length 1 $registeredServer = $registeredServers[0] Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Get RegisteredServer by ParentResourceId" $registeredServers = Get-AzStorageSyncServer -ParentResourceId $storageSyncService.ResourceId -Verbose Assert-AreEqual $registeredServers.Length 1 $registeredServer = $registeredServers[0] Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RegisteredServerPipeline1 { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" Register-AzStorageSyncServer -ParentObject $storageSyncService | Get-AzStorageSyncServer | Unregister-AzStorageSyncServer -Force -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RegisteredServerPipeline2 { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" Register-AzStorageSyncServer -ParentResourceId $storageSyncService.ResourceId | Unregister-AzStorageSyncServer -Force -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-NewRegisteredServer { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-NewRegisteredServerParentObject { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ParentObject $storageSyncService -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-NewRegisteredServerParentResourceId { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ParentResourceId $storageSyncService.ResourceId -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetRegisteredServer { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by StorageSyncService" $registeredServers = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Verbose Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetRegisteredServers { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by StorageSyncService" $registeredServers = Get-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -Verbose Assert-AreEqual $registeredServers.Length 1 $registeredServer = $registeredServers[0] Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetRegisteredServerParentObject { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ParentObject $storageSyncService -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-GetRegisteredServerParentResourceId { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Get RegisteredServer by ServerId" $registeredServer = Get-AzStorageSyncServer -ParentResourceId $storageSyncService.ResourceId -ServerId $expectedRegisteredServer.ServerId -Verbose Write-Verbose "Validating RegisteredServer Properties" Assert-AreEqual $registeredServer.ServerId $expectedRegisteredServer.ServerId Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveRegisteredServer { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -ServerId $expectedRegisteredServer.ServerId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveRegisteredServerInputObject { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -InputObject $expectedRegisteredServer -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } } function Test-RemoveRegisteredServerResourceId { $resourceGroupName = Get-ResourceGroupName Write-Verbose "RecordMode : $(Get-StorageTestMode)" try { $storageSyncServiceName = Get-ResourceName("sss") $resourceGroupLocation = Get-ResourceGroupLocation $resourceLocation = Get-StorageSyncLocation("Microsoft.StorageSync/storageSyncServices") Write-Verbose "RGName: $resourceGroupName | Loc: $resourceGroupLocation | Type : ResourceGroup" New-AzResourceGroup -Name $resourceGroupName -Location $resourceGroupLocation Write-Verbose "Resource: $storageSyncServiceName | Loc: $resourceLocation | Type : StorageSyncService" $storageSyncService = New-AzStorageSyncService -ResourceGroupName $resourceGroupName -Location $resourceLocation -StorageSyncServiceName $storageSyncServiceName Write-Verbose "Resource: <auto-generated> | Loc: $resourceLocation | Type : RegisteredServer" $job = Register-AzStorageSyncServer -ResourceGroupName $resourceGroupName -StorageSyncServiceName $storageSyncServiceName -AsJob $job | Wait-Job $expectedRegisteredServer = get-job -Id $job.Id | receive-job -Keep $expectedRegisteredServer Write-Verbose "Unregister Server: $($expectedRegisteredServer.ServerId)" Unregister-AzStorageSyncServer -Force -ResourceId $expectedRegisteredServer.ResourceId -AsJob | Wait-Job Write-Verbose "Removing StorageSyncService: $storageSyncServiceName" Remove-AzStorageSyncService -Force -ResourceGroupName $resourceGroupName -Name $storageSyncServiceName -AsJob | Wait-Job } finally { Write-Verbose "Removing ResourceGroup : $resourceGroupName" Clean-ResourceGroup $resourceGroupName } }
combined_dataset/train/non-malicious/sample_4_58.ps1
sample_4_58.ps1
#************************************************ # TS_ModernAppsFailureForUserProfileDirCheck.ps1 # Version 1.0.1 # Date: 3/13/2013 # Author: v-kaw # Description: [Idea ID 7546] [Windows] WinStore - Modern Apps Fail to Start if the User Profile directory is Moved from default # Rule number: 7546 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=7546 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 7546 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ModernAppsFailureForUserProfileDirCheck" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Windows 8 return (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) } # ************** # Detection Logic # ************** #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if((Split-Path $Env:USERPROFILE) -ne (Join-Path 'C:' 'Users')) { $RootCauseDetected = $true Add-Member -InputObject $InformationCollected -MemberType NoteProperty -Name "Current User Profile folder" -Value $Env:USERPROFILE } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC6Dg65lqDgmgEM # dR53TS33wKJuqameYf9onh8rk993WqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfr2voPWgLeDApsp3kOnsTj # DMgfbWN4iQH5co2ULmLrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEABUpnWBF4CgXictRvx/Hac8x22Fza7+H3AhjBuLebQQzywsY4eYPlIAes # joxDqRMv74iCZohID6h3vYWUcv5/Ctm4s2mqu3xKX+I3scaGnEWMxV6XXBgN4s9U # 7gg4lNXRyahIE99BTxtNRug5CRDEMghmO9LPRY6snFNpxP5SacP+IdQriu28llQT # SKlUsBINei0XCB1oMMDJ/I/ppf7BDMwYGe9of0LUPWLw/nK9tC4KzquIBygRGPNL # +bbRRxqfxKcluQl54pDXGbUZj6x+qTK6XO1ceNvAnp65ptqItrTkVvtQGZad4hXs # AE7q6T7trZtQjxdahBpwTPBOe3l6NaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAYpyDCm1In6+u6eqXcGaGD6hSy8x19oGTO39edEMJ6iwIGZutwxmWT # GBMyMDI0MTAyODExNDAzOS43MDFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0MTAyOTAwMTk0NVowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEAAgIBszAHAgEAAgITSjAK # AgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQABMN9oWsdpzGRz # tiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+bzjdtPSXWUAH0/FMRRhX0 # teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoCK+NcUU2sDPmN4LqO/2ey # h0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1gawgzN2hPCeSdXzXZoMevJ # N33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46vX9QfJzbfGiC4yGAPtbI # Y98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uWYdQl/cvicZdjgMRYNUkl # FP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQguJqoOHhxRBKJ # KR2j6TWnmWEBLvybNQxVW+EyMSFeBrgwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEAAAIB # MCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xfHyoaMA0GCSqGSIb3DQEB # CwUABIICAIdHzdFR+4DnY8Xb/89+7XywghcZl/tJfne6XfWsAw5dKJroGu+s+atE # AsaS9gOKgoGmrzYcUkUxX1Q8VF+PF1gMph6+PLH8iY9ArKhriq2lAbYUbIpaxILM # CvYzgEOayDjeu5LyPoKs2PTjKvGAvmkR+1ZIVJY/GLJ1e2+zkyBtIQHzHUp5hXbn # OuGlx7q2wX2AHkVjQ9MpD/M/ASuW+L6uGy9Uh//d06YMXIcg6S1k/peBk7US37eV # MNxXOxQqJ2YM2Qns8W1StEqmCueIJ8iJDZO+BaWg1vsq19tZTWJ1tR1+4PKXFI8y # UwpbZekNBhTN4kXvJuICy3qLDJApQmpS/+6hc/9Hui97vnyALG01ncQKca6yJnh/ # S1LL8d9qbt3v/h5iZhBmTV55nONiZfsATEt0vTa/Tx+QNEqx3RmZrLMDpJfTYy95 # qaDVy0H+jnKtErbU8lB/lk6AhUpFtrhopWJVAY8drQ6gmmzdpSk6adGY2z32IJj8 # ipVtR2JROfgFzCdnQ++GYrqhGGEytFRezOpY7aecsYqrT4bYm5R9Kp+IfmFYq8RR # wAD9v/zP0HtLFiM0loxiEckKiCTDLvE0Rsil8HQPxA0x6aTm6IwKczFUNKmG10j6 # fHuE+pHu41XfJRQkUwrPYCsWI5DF6pu2Wzu0jgDSpTwgQvQZ6tuG # SIG # End signature block
combined_dataset/train/non-malicious/sample_27_51.ps1
sample_27_51.ps1
# # Module manifest for module 'OCI.PSModules.Autoscaling' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Autoscaling.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '98b2f4cc-21d0-4675-bf24-96c27b13f169' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Autoscaling Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Autoscaling.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAutoscalingConfiguration', 'Get-OCIAutoscalingConfigurationsList', 'Get-OCIAutoscalingPoliciesList', 'Get-OCIAutoscalingPolicy', 'Move-OCIAutoscalingConfigurationCompartment', 'New-OCIAutoscalingConfiguration', 'New-OCIAutoscalingPolicy', 'Remove-OCIAutoscalingConfiguration', 'Remove-OCIAutoscalingPolicy', 'Update-OCIAutoscalingConfiguration', 'Update-OCIAutoscalingPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Autoscaling' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_42_58.ps1
sample_42_58.ps1
# # Module manifest for module 'OCI.PSModules.Servicemesh' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicemesh.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '16189a7b-c9fe-4714-98b6-983f1fa28ccd' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicemesh Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicemesh.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicemeshAccessPoliciesList', 'Get-OCIServicemeshAccessPolicy', 'Get-OCIServicemeshIngressGateway', 'Get-OCIServicemeshIngressGatewayRouteTable', 'Get-OCIServicemeshIngressGatewayRouteTablesList', 'Get-OCIServicemeshIngressGatewaysList', 'Get-OCIServicemeshMesh', 'Get-OCIServicemeshMeshesList', 'Get-OCIServicemeshProxyDetails', 'Get-OCIServicemeshVirtualDeployment', 'Get-OCIServicemeshVirtualDeploymentsList', 'Get-OCIServicemeshVirtualService', 'Get-OCIServicemeshVirtualServiceRouteTable', 'Get-OCIServicemeshVirtualServiceRouteTablesList', 'Get-OCIServicemeshVirtualServicesList', 'Get-OCIServicemeshWorkRequest', 'Get-OCIServicemeshWorkRequestErrorsList', 'Get-OCIServicemeshWorkRequestLogsList', 'Get-OCIServicemeshWorkRequestsList', 'Move-OCIServicemeshAccessPolicyCompartment', 'Move-OCIServicemeshIngressGatewayCompartment', 'Move-OCIServicemeshIngressGatewayRouteTableCompartment', 'Move-OCIServicemeshMeshCompartment', 'Move-OCIServicemeshVirtualDeploymentCompartment', 'Move-OCIServicemeshVirtualServiceCompartment', 'Move-OCIServicemeshVirtualServiceRouteTableCompartment', 'New-OCIServicemeshAccessPolicy', 'New-OCIServicemeshIngressGateway', 'New-OCIServicemeshIngressGatewayRouteTable', 'New-OCIServicemeshMesh', 'New-OCIServicemeshVirtualDeployment', 'New-OCIServicemeshVirtualService', 'New-OCIServicemeshVirtualServiceRouteTable', 'Remove-OCIServicemeshAccessPolicy', 'Remove-OCIServicemeshIngressGateway', 'Remove-OCIServicemeshIngressGatewayRouteTable', 'Remove-OCIServicemeshMesh', 'Remove-OCIServicemeshVirtualDeployment', 'Remove-OCIServicemeshVirtualService', 'Remove-OCIServicemeshVirtualServiceRouteTable', 'Stop-OCIServicemeshWorkRequest', 'Update-OCIServicemeshAccessPolicy', 'Update-OCIServicemeshIngressGateway', 'Update-OCIServicemeshIngressGatewayRouteTable', 'Update-OCIServicemeshMesh', 'Update-OCIServicemeshVirtualDeployment', 'Update-OCIServicemeshVirtualService', 'Update-OCIServicemeshVirtualServiceRouteTable' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicemesh' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_3_41.ps1
sample_3_41.ps1
// ================================================================== // DCIM_License // ================================================================== [dynamic, provider("dcismprovider"), Description ( "DCIM_License is a derivation of" "CIM_ManagedElement, and represents a" "feature license installed on a system")] class DCIM_License : CIM_ManagedElement { [Key,Description ( "Entitlement ID of the license.")] string InstanceID; [ Description ("The property shall have the value of the entitlement ID of the license which is a license unique ID."), Required ] string EntitlementID; [ Description ("The property shall represent the licenses solution set in multiple languages."), Required ] string LicenseDescription[]; [ Description ("The property shall represent the license type."), Required, Valuemap { "0", "1", "2", "3", "4" }, Values { "None", "Perpetual", "Leased", "Evaluation", "Site" } ] uint32 LicenseType; [ Description ("The property shall represent bound state to a device."), Required, Valuemap { "0", "1", "2", "4", "5", "6" }, Values { "Unbound", "Bound", "Upgraded", "Valid Subcomponent", "Bound_Valid Subcomponent", "Upgraded_Valid Subcomponent" } ] uint32 LicenseAttributes; [ Description ("The property shall represent the date the factory created the license."), Required ] datetime LicenseSoldDate; [ Description ("The property shall represent the license start date.") ] datetime LicenseStartDate; [ Description ("The property shall represent the end date of the license. The property shall be implemented, if the LicenseType property has value 2 (Leased) and 4 (Site).") ] datetime LicenseEndDate; [ Description ("This property represents the license period in days, and is counted only during the uptime of the system. Note: LicenseDuration will be 0 for Permanent and Perpetual license since these licenses are not time bound."), Required, Units ("Days") ] uint16 LicenseDuration; [ Description ("The property shall represent the date on which the license was installed."), Required ] datetime LicenseInstallDate; [ Description ("This property represents the license period remaining in days, and is counted only during the uptime of the system. The property is implemented if the LicenseType property has value 3 (Evaluation)."), Units ("Days") ] uint16 EvalLicenseTimeRemaining; [ Description ("The property shall represent the PCI DeviceIDs of devices supported by this license."), Required ] string DeviceFamilyDeviceID[]; [ Description ("The property shall represent the PCI VendorIDs of devices supported by this license."), Required ] string DeviceFamilyVendorID[]; [ Description ("The property shall represent PCI SubsystemIDs of devices supported by this license."), Required ] string DeviceFamilySubsystemID[]; [ Description ("The property shall represent SubsystemVendorIDs of devices supported by this license."), Required ] string DeviceFamilySubsystemVendorID[]; [ Description ("The property array shall have values set to FQDDs of devices that have been assigned to this license."), Required ] string AssignedDevices[]; [ Description ("The property shall have the message string associated with the license status. If the property has value NULL, then there is no message associated with the license status."), Required ] string LicenseStatusMessage; [ Description ("The property shall represent the message ID associated with the license status. If the property has value NULL, then there is no message associated with the license status."), Required ] string LicenseStatusMessageID; [ Description ("The property shall represent the license status."), Required, Valuemap { "0", "1", "2", "3" }, Values { "Unknown", "OK", "Warning", "Critical" } ] uint16 LicensePrimaryStatus; }; /* SIG # Begin signature block */ /* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAnvZS3GxMSd8WB */ /* XlflwA0CSjOF2GrZLZEevzfygOXbkKCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDomr2oYTNj */ /* gEUK3Fdde6+PzttYBmUoT0ik9TWHnijVmDBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYA93/rTV4oAOrdDiiZTUB9R0wOdQ/BSC/DqXy8LNU0QcmjN */ /* XQy1XC9nqlytQwbxIk7dCcnKsSxioo84pLJAQ2QbNAXWYWqSsd1voTXQHYysKmLY */ /* xu1W3QutedHkFu78rRBpQYbKfNdKtlWoVP47KCGeH3wVzzH2xZszi5pk882/Wvt4 */ /* L69apyFWNjUQJDjis/fvBCqeHpsKKFnc/ZbLKO1zceDnWmpmssDW/IDTHrJ+Ti7u */ /* 4MKJhChX0n1jijyzKs+0lByo94ffbEJI9Ev14P07Q2Z4WdemhXVGASzAxOXEM15K */ /* S5iyvtIe4BTolo1/O7XnzflxkLlnEKBjD05nLLyAGbODpKcqW8XjNTjz9KKGOZIP */ /* VTuETyh4aiYtVpiU1tcDbjs3YVffCYYBQ/+nOP7J9k+bJ8gr65sy/l8Gyu7pn5tH */ /* Rpy8vmMunz4GQ8Oh5iDGUmaOoCE7xVfUxd4Frb4C4TBteDiugq3dmwGkRgpRMaz5 */ /* AjUD0uIy1XtbzfEMjBqhghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */ /* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */ /* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgDgARftvOo38x */ /* 2tECWoov2GDvutQ74TGYD++6529LJ6MCEQDlzppxg9uas5aO47QJqitlGA8yMDI0 */ /* MDkyMDA3MDEwOVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */ /* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */ /* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */ /* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */ /* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */ /* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */ /* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */ /* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */ /* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */ /* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */ /* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */ /* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */ /* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */ /* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */ /* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */ /* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */ /* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */ /* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */ /* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */ /* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */ /* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */ /* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */ /* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */ /* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */ /* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */ /* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */ /* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */ /* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */ /* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */ /* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */ /* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */ /* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */ /* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */ /* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */ /* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */ /* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */ /* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */ /* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */ /* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */ /* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */ /* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */ /* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */ /* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */ /* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */ /* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */ /* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */ /* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */ /* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */ /* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */ /* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */ /* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */ /* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */ /* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */ /* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */ /* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */ /* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */ /* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */ /* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */ /* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */ /* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */ /* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */ /* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */ /* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */ /* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */ /* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */ /* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */ /* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */ /* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */ /* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */ /* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */ /* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */ /* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */ /* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */ /* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */ /* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */ /* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */ /* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */ /* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */ /* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */ /* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */ /* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */ /* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */ /* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */ /* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */ /* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */ /* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */ /* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */ /* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */ /* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */ /* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */ /* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */ /* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */ /* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */ /* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */ /* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */ /* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */ /* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */ /* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */ /* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */ /* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */ /* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */ /* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */ /* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */ /* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */ /* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */ /* MDA3MDEwOVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */ /* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIPKztPbstes54RkNeHyI6Vo2FRxE5U6ycSZ0 */ /* iB1eEostMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */ /* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICACnaEV5czwu9yg9FTpgG */ /* V7KqqL5490z1PS+csanK5rUbFabSzHiDlMNWHT8TWSFShhqdapkWNy+EfpsQL1D+ */ /* scBkIX2P41dGVLeqangUm4MRmQJW6c+lHiAcCBvAXNR9sxiQ85w9O4D2RGkDKj7x */ /* PwMiGB7pArI7iUCCT0hy4qni8nPtRt4dmUTi9leGPy2y9YenxilrAYC5euEw5f6U */ /* nEzI5woBSfAkESyp1z9ydCBQG7UViCvZHWbV8bH3wIFvarJ3ahjm+xrd3dvRFCg3 */ /* uNPMn6z4tkK1fjOUX40OUoEuAC+DFFDduOel62GepOtOldIuYNojT74d/ykT8YUV */ /* G2apCAsvc8knKmC7WQWyVTAkmepM3UCQIFUAZtbUTn3BoVUNSdT75xHmgLxa7a4i */ /* eHFcaIICWhIJcMbY1OOREUhoeDdOdAtrF2WmgAOveRVHUg1RhS+94zB2+7rcYTB5 */ /* 1L8VwZHivatA9ZwKhSjtDNsnu3ZZKZoQR7yDpLIn3Ipc5mgW03WuWnm8EcxKOtp+ */ /* VGGKQXcUsfJHEn8/SnwIGcNpilnBuD5JlV1us92EUom90aFwSxLes9EN0u0b7spu */ /* EYVAuChOEbk32MW75wQYMc8X0O1qrmF+epAntF+y6FG69FYay9YtVseywqTgdhVw */ /* 2MtgMg4U7pIyFnWhmEtA36JK */ /* SIG # End signature block */
combined_dataset/train/non-malicious/sample_66_47.ps1
sample_66_47.ps1
# # Module manifest for module 'OCI.PSModules.Cloudguard' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '416303ec-c9d6-4a65-8413-14973e520be8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudguard Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardAdhocQueriesList', 'Get-OCICloudguardAdhocQuery', 'Get-OCICloudguardAdhocQueryResultContent', 'Get-OCICloudguardAdhocQueryResultsList', 'Get-OCICloudguardConditionMetadataType', 'Get-OCICloudguardConditionMetadataTypesList', 'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule', 'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource', 'Get-OCICloudguardDataSourceEventsList', 'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector', 'Get-OCICloudguardDetectorRecipe', 'Get-OCICloudguardDetectorRecipeDetectorRule', 'Get-OCICloudguardDetectorRecipeDetectorRulesList', 'Get-OCICloudguardDetectorRecipesList', 'Get-OCICloudguardDetectorRule', 'Get-OCICloudguardDetectorRulesList', 'Get-OCICloudguardDetectorsList', 'Get-OCICloudguardImpactedResourcesList', 'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList', 'Get-OCICloudguardManagedListTypesList', 'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem', 'Get-OCICloudguardProblemEndpointsList', 'Get-OCICloudguardProblemEntitiesList', 'Get-OCICloudguardProblemHistoriesList', 'Get-OCICloudguardProblemsList', 'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResource', 'Get-OCICloudguardResourcePortsList', 'Get-OCICloudguardResourceProfile', 'Get-OCICloudguardResourceProfileEndpointsList', 'Get-OCICloudguardResourceProfileImpactedResourcesList', 'Get-OCICloudguardResourceProfilesList', 'Get-OCICloudguardResourcesList', 'Get-OCICloudguardResourceTypesList', 'Get-OCICloudguardResourceVulnerabilitiesList', 'Get-OCICloudguardResourceVulnerability', 'Get-OCICloudguardResponderActivitiesList', 'Get-OCICloudguardResponderExecution', 'Get-OCICloudguardResponderExecutionsList', 'Get-OCICloudguardResponderRecipe', 'Get-OCICloudguardResponderRecipeResponderRule', 'Get-OCICloudguardResponderRecipeResponderRulesList', 'Get-OCICloudguardResponderRecipesList', 'Get-OCICloudguardResponderRule', 'Get-OCICloudguardResponderRulesList', 'Get-OCICloudguardSavedQueriesList', 'Get-OCICloudguardSavedQuery', 'Get-OCICloudguardSecurityPoliciesList', 'Get-OCICloudguardSecurityPolicy', 'Get-OCICloudguardSecurityRecipe', 'Get-OCICloudguardSecurityRecipesList', 'Get-OCICloudguardSecurityZone', 'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting', 'Get-OCICloudguardSightingEndpointsList', 'Get-OCICloudguardSightingImpactedResourcesList', 'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList', 'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe', 'Get-OCICloudguardTargetDetectorRecipeDetectorRule', 'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList', 'Get-OCICloudguardTargetDetectorRecipesList', 'Get-OCICloudguardTargetResponderRecipe', 'Get-OCICloudguardTargetResponderRecipeResponderRule', 'Get-OCICloudguardTargetResponderRecipeResponderRulesList', 'Get-OCICloudguardTargetResponderRecipesList', 'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList', 'Get-OCICloudguardWlpAgent', 'Get-OCICloudguardWlpAgentsList', 'Get-OCICloudguardWorkRequest', 'Get-OCICloudguardWorkRequestErrorsList', 'Get-OCICloudguardWorkRequestLogsList', 'Get-OCICloudguardWorkRequestsList', 'Invoke-OCICloudguardExecuteResponderExecution', 'Invoke-OCICloudguardRequestRiskScores', 'Invoke-OCICloudguardRequestSecurityScores', 'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend', 'Invoke-OCICloudguardRequestSummarizedActivityProblems', 'Invoke-OCICloudguardRequestSummarizedProblems', 'Invoke-OCICloudguardRequestSummarizedResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedRiskScores', 'Invoke-OCICloudguardRequestSummarizedSecurityScores', 'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendProblems', 'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores', 'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions', 'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores', 'Invoke-OCICloudguardSkipBulkResponderExecution', 'Invoke-OCICloudguardSkipResponderExecution', 'Invoke-OCICloudguardTriggerResponder', 'Move-OCICloudguardDataSourceCompartment', 'Move-OCICloudguardDetectorRecipeCompartment', 'Move-OCICloudguardManagedListCompartment', 'Move-OCICloudguardResponderRecipeCompartment', 'Move-OCICloudguardSavedQueryCompartment', 'Move-OCICloudguardSecurityRecipeCompartment', 'Move-OCICloudguardSecurityZoneCompartment', 'New-OCICloudguardAdhocQuery', 'New-OCICloudguardDataMaskRule', 'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe', 'New-OCICloudguardDetectorRecipeDetectorRule', 'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe', 'New-OCICloudguardSavedQuery', 'New-OCICloudguardSecurityRecipe', 'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget', 'New-OCICloudguardTargetDetectorRecipe', 'New-OCICloudguardTargetResponderRecipe', 'New-OCICloudguardWlpAgent', 'Remove-OCICloudguardAdhocQuery', 'Remove-OCICloudguardCompartment', 'Remove-OCICloudguardDataMaskRule', 'Remove-OCICloudguardDataSource', 'Remove-OCICloudguardDetectorRecipe', 'Remove-OCICloudguardDetectorRecipeDetectorRule', 'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource', 'Remove-OCICloudguardManagedList', 'Remove-OCICloudguardResponderRecipe', 'Remove-OCICloudguardSavedQuery', 'Remove-OCICloudguardSecurityRecipe', 'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget', 'Remove-OCICloudguardTargetDetectorRecipe', 'Remove-OCICloudguardTargetResponderRecipe', 'Remove-OCICloudguardWlpAgent', 'Stop-OCICloudguardWorkRequest', 'Update-OCICloudguardBulkProblemStatus', 'Update-OCICloudguardConfiguration', 'Update-OCICloudguardDataMaskRule', 'Update-OCICloudguardDataSource', 'Update-OCICloudguardDetectorRecipe', 'Update-OCICloudguardDetectorRecipeDetectorRule', 'Update-OCICloudguardManagedList', 'Update-OCICloudguardProblemStatus', 'Update-OCICloudguardResponderRecipe', 'Update-OCICloudguardResponderRecipeResponderRule', 'Update-OCICloudguardSavedQuery', 'Update-OCICloudguardSecurityRecipe', 'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget', 'Update-OCICloudguardTargetDetectorRecipe', 'Update-OCICloudguardTargetDetectorRecipeDetectorRule', 'Update-OCICloudguardTargetResponderRecipe', 'Update-OCICloudguardTargetResponderRecipeResponderRule', 'Update-OCICloudguardWlpAgent' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/8e2c5f39-6676-4cb0-bdac-6f8819060c49.ps1
8e2c5f39-6676-4cb0-bdac-6f8819060c49.ps1
#------------------------------------------------------------------------------ # # get the 'connect' entries from the logs of all the Exchange CAS servers # only keep the last 30 days # # runs at 2AM #------------------------------------------------------------------------------ Function Get-ClientVersionConnectLogs () { Param( $LogDate=$Null ) If ($LogDate) { # this is the default location for these logs during install $Script:CAS | %{gc ( '\\\\' + $_.Name + '\\c$\\Program Files\\Microsoft\\Exchange Server\\V14\\Logging\\RPC Client Access\\RCA_'+$T+'-*.LOG') |?{$_-match"OUTLOOK.EXE"-and$_-match",Connect,"}} } } # Starting with today, work back checking to see that a file for # that days exists, if it does not then create it # # the directory where you keep these "connect logs" - change to fit your needs $Script:CasLogUNCDir ='\\\\<server>\\<drv>\\Data\\CASConnectLogs' # get all the CAS servers -- only get 2010 servers ( I have 2007 servers too) $Script:CAS = Get-ExchangeServer | ?{ $_.IsClientAccessServer -eq $true -and $_.AdminDisplayVersion -match "^Version 14" } # loop thru the last 14 days and collect the logs 1..14 | % { $T=Get-Date ((Get-Date).adddays(($_) * -1)) -Format 'yyyyMMdd' $Script:CASLogFile = $('OLConnect-' + $T + '.txt') $FileName = Join-Path -Path $Script:CasLogUNCDir -ChildPath $Script:CASLogFile if(-not (Test-Path $FileName)) { Write-output "Working: " $T Get-ClientVersionConnectLogs $T | Out-File $FileName } } # Now check to see if any files are old than 30 days and kill them gci $Script:CasLogUNCDir | ? {$_.LastWritetime -lt ((get-date).adddays(-30))} | Remove-Item | Out-Null
combined_dataset/train/non-malicious/sample_49_87.ps1
sample_49_87.ps1
function Get-WAC1PClusterDetails { <# .SYNOPSIS Get cluster name and domain. .DESCRIPTION Get cluster name and domain. .ROLE Administrators #> $cluster = Get-Cluster $clusterName = $cluster.Name $clusterDomain = $cluster.Domain "$clusterName.$clusterDomain" } ## [END] Get-WAC1PClusterDetails ## function Get-WAC1PClusterNode { <# .SYNOPSIS Gets nodes on ASZ. .DESCRIPTION Gets nodes on ASZ. .ROLE Administrators #> Get-ClusterNode } ## [END] Get-WAC1PClusterNode ## function Get-WAC1PFirstPartyPro2 { <# .SYNOPSIS Gets whether system is first party. .DESCRIPTION Gets whether system is first party. .ROLE Administrators #> if ($env:OEM1P_MONITORING_FOLDER -ne $null) { $pathA = (Test-Path $($env:OEM1P_MONITORING_FOLDER)) } else { $pathA = $false; } if ($env:OEM1P_HARDWAREMANAGER_FOLDER -ne $null) { $pathB = (Test-Path $($env:OEM1P_HARDWAREMANAGER_FOLDER)) } else { $pathB = $false } $response = @{ State = 'NotSupported'; Message = 'Not executed'; };$isGood = [bool]((( Get-WmiObject Win32_ComputerSystem | Select -Expand Model ) -eq 'ASEPRO2') -AND ( $pathA -OR $pathB )); if($isGood) { $response.State = 'Available'; $response.Message = 'Everything should work.'; }; $response } ## [END] Get-WAC1PFirstPartyPro2 ## function Get-WAC1PServerDetails { <# .SYNOPSIS Get server host and serial number of node. .DESCRIPTION Get server host and serial number of node. .ROLE Administrators #> if (Test-Path 'C:\OEM1P\Preview1\Setup\Microsoft.Azure.Edge.OEM1P.Setup.psd1') { Import-module C:\OEM1P\Preview1\Setup\Microsoft.Azure.Edge.OEM1P.Setup.psd1 } if ($env:OEM1P_HARDWAREMANAGER_FOLDER -ne $null -AND (Test-Path $env:OEM1P_HARDWAREMANAGER_FOLDER\Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_HARDWAREMANAGER_FOLDER 'Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1' Import-module $monitoringBinaries } elseif ($env:OEM1P_MONITORING_FOLDER -ne $null -AND (Test-Path $env:OEM1P_MONITORING_FOLDER\Microsoft.Azure.Edge.OEM1P.Monitoring.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_MONITORING_FOLDER 'Microsoft.Azure.Edge.OEM1P.Monitoring.psd1' Import-module $monitoringBinaries } try { $serialNumber = Get-MaeSerialNumber } catch { $serialNumber = $null } $serverName = Get-WMIObject Win32_ComputerSystem| Select-Object -ExpandProperty Name $serverDomain = Get-WMIObject Win32_ComputerSystem| Select-Object -ExpandProperty Domain $details = @{ name = $serverName; domain = $serverDomain; serial = $serialNumber } $details } ## [END] Get-WAC1PServerDetails ## function Invoke-WAC1PMaeAlert { <# .SYNOPSIS Gets alerts on ASZ. .DESCRIPTION Gets alerts on ASZ. .ROLE Administrators #> if ($env:OEM1P_HARDWAREMANAGER_FOLDER -ne $null -AND (Test-Path $env:OEM1P_HARDWAREMANAGER_FOLDER\Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_HARDWAREMANAGER_FOLDER 'Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1' Import-module $monitoringBinaries } elseif ($env:OEM1P_MONITORING_FOLDER -ne $null -AND (Test-Path $env:OEM1P_MONITORING_FOLDER\Microsoft.Azure.Edge.OEM1P.Monitoring.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_MONITORING_FOLDER 'Microsoft.Azure.Edge.OEM1P.Monitoring.psd1' Import-module $monitoringBinaries } Invoke-MaeAlert } ## [END] Invoke-WAC1PMaeAlert ## function Invoke-WAC1PMaeHardwareMetadata { <# .SYNOPSIS Gets hardware metadata on ASZ. .DESCRIPTION Gets hardware metadata on ASZ. .ROLE Administrators #> if ($env:OEM1P_HARDWAREMANAGER_FOLDER -ne $null -AND (Test-Path $env:OEM1P_HARDWAREMANAGER_FOLDER\Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_HARDWAREMANAGER_FOLDER 'Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1' Import-module $monitoringBinaries } elseif ($env:OEM1P_MONITORING_FOLDER -ne $null -AND (Test-Path $env:OEM1P_MONITORING_FOLDER\Microsoft.Azure.Edge.OEM1P.Monitoring.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_MONITORING_FOLDER 'Microsoft.Azure.Edge.OEM1P.Monitoring.psd1' Import-module $monitoringBinaries } try { (Invoke-MaeHardwareMetadata -JsonFormat)."Json Content" } catch { $null } } ## [END] Invoke-WAC1PMaeHardwareMetadata ## function Invoke-WAC1PPackageUpload { <# .SYNOPSIS Upload package to ASZ. .DESCRIPTION Upload package to ASZ. .ROLE Administrators #> param ( [Parameter(Mandatory = $true)] [String] $path ) if (Test-Path -Path $path) { Get-ChildItem $path | Remove-Item -Recurse -Force } else { New-Item -Path $path -ItemType Directory -Force } Test-Path -Path $path } ## [END] Invoke-WAC1PPackageUpload ## function Reset-WAC1PAsNode { <# .SYNOPSIS Triggers reset of ASZ node. .DESCRIPTION Triggers reset of ASZ node. .ROLE Administrators #> param ( [Parameter(Mandatory = $false)] [String] $path ) if ($env:OEM1P_HARDWAREMANAGER_FOLDER -ne $null -AND (Test-Path $env:OEM1P_HARDWAREMANAGER_FOLDER\Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_HARDWAREMANAGER_FOLDER 'Microsoft.Azure.Edge.OEM1P.HardwareManager.psd1' Import-module $monitoringBinaries } elseif ($env:OEM1P_MONITORING_FOLDER -ne $null -AND (Test-Path $env:OEM1P_MONITORING_FOLDER\Microsoft.Azure.Edge.OEM1P.Monitoring.psd1)) { $monitoringBinaries = Join-Path $env:OEM1P_MONITORING_FOLDER 'Microsoft.Azure.Edge.OEM1P.Monitoring.psd1' Import-module $monitoringBinaries } if ($path) { if (get-command Add-ResetASImage -erroraction silentlycontinue) { Add-ResetASImage -ResetPackagePath $path } Reset-AsNode -ResetPackagePath $path -Confirm:$false } else { Reset-AsNode -Confirm:$false } } ## [END] Reset-WAC1PAsNode ## function Get-CimWin32LogicalDisk { <# .SYNOPSIS Gets Win32_LogicalDisk object. .DESCRIPTION Gets Win32_LogicalDisk object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_LogicalDisk } ## [END] Get-CimWin32LogicalDisk ## function Get-CimWin32NetworkAdapter { <# .SYNOPSIS Gets Win32_NetworkAdapter object. .DESCRIPTION Gets Win32_NetworkAdapter object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_NetworkAdapter } ## [END] Get-CimWin32NetworkAdapter ## function Get-CimWin32PhysicalMemory { <# .SYNOPSIS Gets Win32_PhysicalMemory object. .DESCRIPTION Gets Win32_PhysicalMemory object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_PhysicalMemory } ## [END] Get-CimWin32PhysicalMemory ## function Get-CimWin32Processor { <# .SYNOPSIS Gets Win32_Processor object. .DESCRIPTION Gets Win32_Processor object. .ROLE Readers #> ##SkipCheck=true## import-module CimCmdlets Get-CimInstance -Namespace root/cimv2 -ClassName Win32_Processor } ## [END] Get-CimWin32Processor ## function Get-ClusterInventory { <# .SYNOPSIS Retrieves the inventory data for a cluster. .DESCRIPTION Retrieves the inventory data for a cluster. .ROLE Readers #> Import-Module CimCmdlets -ErrorAction SilentlyContinue # JEA code requires to pre-import the module (this is slow on failover cluster environment.) Import-Module FailoverClusters -ErrorAction SilentlyContinue Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Get the name of this computer. .DESCRIPTION Get the best available name for this computer. The FQDN is preferred, but when not avaialble the NetBIOS name will be used instead. #> function getComputerName() { $computerSystem = Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object Name, DNSHostName if ($computerSystem) { $computerName = $computerSystem.DNSHostName if ($null -eq $computerName) { $computerName = $computerSystem.Name } return $computerName } return $null } <# .SYNOPSIS Are the cluster PowerShell cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell cmdlets installed on this server? #> function getIsClusterCmdletAvailable() { $cmdlet = Get-Command "Get-Cluster" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Get the MSCluster Cluster CIM instance from this server. .DESCRIPTION Get the MSCluster Cluster CIM instance from this server. #> function getClusterCimInstance() { $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { return Get-CimInstance -Namespace root/mscluster MSCluster_Cluster -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object fqdn, S2DEnabled } return $null } <# .SYNOPSIS Determines if the current cluster supports Failover Clusters Time Series Database. .DESCRIPTION Use the existance of the path value of cmdlet Get-StorageHealthSetting to determine if TSDB is supported or not. #> function getClusterPerformanceHistoryPath() { return $null -ne (Get-StorageSubSystem clus* | Get-StorageHealthSetting -Name "System.PerformanceHistory.Path") } <# .SYNOPSIS Get some basic information about the cluster from the cluster. .DESCRIPTION Get the needed cluster properties from the cluster. #> function getClusterInfo() { $returnValues = @{} $returnValues.Fqdn = $null $returnValues.isS2DEnabled = $false $returnValues.isTsdbEnabled = $false $cluster = getClusterCimInstance if ($cluster) { $returnValues.Fqdn = $cluster.fqdn $isS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -eq 1) $returnValues.isS2DEnabled = $isS2dEnabled if ($isS2DEnabled) { $returnValues.isTsdbEnabled = getClusterPerformanceHistoryPath } else { $returnValues.isTsdbEnabled = $false } } return $returnValues } <# .SYNOPSIS Are the cluster PowerShell Health cmdlets installed on this server? .DESCRIPTION Are the cluster PowerShell Health cmdlets installed on this server? s#> function getisClusterHealthCmdletAvailable() { $cmdlet = Get-Command -Name "Get-HealthFault" -ErrorAction SilentlyContinue return !!$cmdlet } <# .SYNOPSIS Are the Britannica (sddc management resources) available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) available on the cluster? #> function getIsBritannicaEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual machine available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual machine available on the cluster? #> function getIsBritannicaVirtualMachineEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualMachine -ErrorAction SilentlyContinue) } <# .SYNOPSIS Are the Britannica (sddc management resources) virtual switch available on the cluster? .DESCRIPTION Are the Britannica (sddc management resources) virtual switch available on the cluster? #> function getIsBritannicaVirtualSwitchEnabled() { return $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_VirtualSwitch -ErrorAction SilentlyContinue) } ########################################################################### # main() ########################################################################### $clusterInfo = getClusterInfo $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $clusterInfo.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2DEnabled' -Value $clusterInfo.isS2DEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsTsdbEnabled' -Value $clusterInfo.isTsdbEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsClusterHealthCmdletAvailable' -Value (getIsClusterHealthCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value (getIsBritannicaEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualMachineEnabled' -Value (getIsBritannicaVirtualMachineEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaVirtualSwitchEnabled' -Value (getIsBritannicaVirtualSwitchEnabled) $result | Add-Member -MemberType NoteProperty -Name 'IsClusterCmdletAvailable' -Value (getIsClusterCmdletAvailable) $result | Add-Member -MemberType NoteProperty -Name 'CurrentClusterNode' -Value (getComputerName) $result } ## [END] Get-ClusterInventory ## function Get-ClusterNodes { <# .SYNOPSIS Retrieves the inventory data for cluster nodes in a particular cluster. .DESCRIPTION Retrieves the inventory data for cluster nodes in a particular cluster. .ROLE Readers #> import-module CimCmdlets # JEA code requires to pre-import the module (this is slow on failover cluster environment.) import-module FailoverClusters -ErrorAction SilentlyContinue ############################################################################### # Constants ############################################################################### Set-Variable -Name LogName -Option Constant -Value "Microsoft-ServerManagementExperience" -ErrorAction SilentlyContinue Set-Variable -Name LogSource -Option Constant -Value "SMEScripts" -ErrorAction SilentlyContinue Set-Variable -Name ScriptName -Option Constant -Value $MyInvocation.ScriptName -ErrorAction SilentlyContinue <# .SYNOPSIS Are the cluster PowerShell cmdlets installed? .DESCRIPTION Use the Get-Command cmdlet to quickly test if the cluster PowerShell cmdlets are installed on this server. #> function getClusterPowerShellSupport() { $cmdletInfo = Get-Command 'Get-ClusterNode' -ErrorAction SilentlyContinue return $cmdletInfo -and $cmdletInfo.Name -eq "Get-ClusterNode" } <# .SYNOPSIS Get the cluster nodes using the cluster CIM provider. .DESCRIPTION When the cluster PowerShell cmdlets are not available fallback to using the cluster CIM provider to get the needed information. #> function getClusterNodeCimInstances() { # Change the WMI property NodeDrainStatus to DrainStatus to match the PS cmdlet output. return Get-CimInstance -Namespace root/mscluster MSCluster_Node -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object @{Name="DrainStatus"; Expression={$_.NodeDrainStatus}}, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Get the cluster nodes using the cluster PowerShell cmdlets. .DESCRIPTION When the cluster PowerShell cmdlets are available use this preferred function. #> function getClusterNodePsInstances() { return Get-ClusterNode -ErrorAction SilentlyContinue | Microsoft.PowerShell.Utility\Select-Object DrainStatus, DynamicWeight, Name, NodeWeight, FaultDomain, State } <# .SYNOPSIS Use DNS services to get the FQDN of the cluster NetBIOS name. .DESCRIPTION Use DNS services to get the FQDN of the cluster NetBIOS name. .Notes It is encouraged that the caller add their approprate -ErrorAction when calling this function. #> function getClusterNodeFqdn([string]$clusterNodeName) { return ([System.Net.Dns]::GetHostEntry($clusterNodeName)).HostName } <# .SYNOPSIS Writes message to event log as warning. .DESCRIPTION Writes message to event log as warning. #> function writeToEventLog([string]$message) { Microsoft.PowerShell.Management\New-EventLog -LogName $LogName -Source $LogSource -ErrorAction SilentlyContinue Microsoft.PowerShell.Management\Write-EventLog -LogName $LogName -Source $LogSource -EventId 0 -Category 0 -EntryType Warning ` -Message $message -ErrorAction SilentlyContinue } <# .SYNOPSIS Get the cluster nodes. .DESCRIPTION When the cluster PowerShell cmdlets are available get the information about the cluster nodes using PowerShell. When the cmdlets are not available use the Cluster CIM provider. #> function getClusterNodes() { $isClusterCmdletAvailable = getClusterPowerShellSupport if ($isClusterCmdletAvailable) { $clusterNodes = getClusterNodePsInstances } else { $clusterNodes = getClusterNodeCimInstances } $clusterNodeMap = @{} foreach ($clusterNode in $clusterNodes) { $clusterNodeName = $clusterNode.Name.ToLower() try { $clusterNodeFqdn = getClusterNodeFqdn $clusterNodeName -ErrorAction SilentlyContinue } catch { $clusterNodeFqdn = $clusterNodeName writeToEventLog "[$ScriptName]: The fqdn for node '$clusterNodeName' could not be obtained. Defaulting to machine name '$clusterNodeName'" } $clusterNodeResult = New-Object PSObject $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FullyQualifiedDomainName' -Value $clusterNodeFqdn $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'Name' -Value $clusterNodeName $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DynamicWeight' -Value $clusterNode.DynamicWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'NodeWeight' -Value $clusterNode.NodeWeight $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'FaultDomain' -Value $clusterNode.FaultDomain $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'State' -Value $clusterNode.State $clusterNodeResult | Add-Member -MemberType NoteProperty -Name 'DrainStatus' -Value $clusterNode.DrainStatus $clusterNodeMap.Add($clusterNodeName, $clusterNodeResult) } return $clusterNodeMap } ########################################################################### # main() ########################################################################### getClusterNodes } ## [END] Get-ClusterNodes ## function Get-DecryptedDataFromNode { <# .SYNOPSIS Gets data after decrypting it on a node. .DESCRIPTION Decrypts data on node using a cached RSAProvider used during encryption within 3 minutes of encryption and returns the decrypted data. This script should be imported or copied directly to other scripts, do not send the returned data as an argument to other scripts. .PARAMETER encryptedData Encrypted data to be decrypted (String). .ROLE Readers #> param ( [Parameter(Mandatory = $true)] [String] $encryptedData ) Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function DecryptDataWithJWKOnNode { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { $rsaProvider = (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value $decryptedBytes = $rsaProvider.Decrypt([Convert]::FromBase64String($encryptedData), [System.Security.Cryptography.RSAEncryptionPadding]::OaepSHA1) return [System.Text.Encoding]::UTF8.GetString($decryptedBytes) } # If you copy this script directly to another, you can get rid of the throw statement and add custom error handling logic such as "Write-Error" throw [System.InvalidOperationException] "Password decryption failed. RSACryptoServiceProvider Instance not found" } } ## [END] Get-DecryptedDataFromNode ## function Get-EncryptionJWKOnNode { <# .SYNOPSIS Gets encrytion JSON web key from node. .DESCRIPTION Gets encrytion JSON web key from node. .ROLE Readers #> Set-StrictMode -Version 5.0 New-Variable -Name rsaProviderInstanceName -Value "RSA" -Option Constant function Get-RSAProvider { if(Get-Variable -Scope Global -Name $rsaProviderInstanceName -EA SilentlyContinue) { return (Get-Variable -Scope Global -Name $rsaProviderInstanceName).Value } $Global:RSA = New-Object System.Security.Cryptography.RSACryptoServiceProvider -ArgumentList 4096 return $RSA } function Get-JsonWebKey { $rsaProvider = Get-RSAProvider $parameters = $rsaProvider.ExportParameters($false) return [PSCustomObject]@{ kty = 'RSA' alg = 'RSA-OAEP' e = [Convert]::ToBase64String($parameters.Exponent) n = [Convert]::ToBase64String($parameters.Modulus).TrimEnd('=').Replace('+', '-').Replace('/', '_') } } $jwk = Get-JsonWebKey ConvertTo-Json $jwk -Compress } ## [END] Get-EncryptionJWKOnNode ## function Get-ServerInventory { <# .SYNOPSIS Retrieves the inventory data for a server. .DESCRIPTION Retrieves the inventory data for a server. .ROLE Readers #> Set-StrictMode -Version 5.0 Import-Module CimCmdlets Import-Module Storage -ErrorAction SilentlyContinue <# .SYNOPSIS Converts an arbitrary version string into just 'Major.Minor' .DESCRIPTION To make OS version comparisons we only want to compare the major and minor version. Build number and/os CSD are not interesting. #> function convertOsVersion([string]$osVersion) { [Ref]$parsedVersion = $null if (![Version]::TryParse($osVersion, $parsedVersion)) { return $null } $version = [Version]$parsedVersion.Value return New-Object Version -ArgumentList $version.Major, $version.Minor } <# .SYNOPSIS Determines if CredSSP is enabled for the current server or client. .DESCRIPTION Check the registry value for the CredSSP enabled state. #> function isCredSSPEnabled() { Set-Variable credSSPServicePath -Option Constant -Value "WSMan:\localhost\Service\Auth\CredSSP" Set-Variable credSSPClientPath -Option Constant -Value "WSMan:\localhost\Client\Auth\CredSSP" $credSSPServerEnabled = $false; $credSSPClientEnabled = $false; $credSSPServerService = Get-Item $credSSPServicePath -ErrorAction SilentlyContinue if ($credSSPServerService) { $credSSPServerEnabled = [System.Convert]::ToBoolean($credSSPServerService.Value) } $credSSPClientService = Get-Item $credSSPClientPath -ErrorAction SilentlyContinue if ($credSSPClientService) { $credSSPClientEnabled = [System.Convert]::ToBoolean($credSSPClientService.Value) } return ($credSSPServerEnabled -or $credSSPClientEnabled) } <# .SYNOPSIS Determines if the Hyper-V role is installed for the current server or client. .DESCRIPTION The Hyper-V role is installed when the VMMS service is available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVRoleInstalled() { $vmmsService = Get-Service -Name "VMMS" -ErrorAction SilentlyContinue return $vmmsService -and $vmmsService.Name -eq "VMMS" } <# .SYNOPSIS Determines if the Hyper-V PowerShell support module is installed for the current server or client. .DESCRIPTION The Hyper-V PowerShell support module is installed when the modules cmdlets are available. This is much faster then checking Get-WindowsFeature and works on Windows Client SKUs. #> function isHyperVPowerShellSupportInstalled() { # quicker way to find the module existence. it doesn't load the module. return !!(Get-Module -ListAvailable Hyper-V -ErrorAction SilentlyContinue) } <# .SYNOPSIS Determines if Windows Management Framework (WMF) 5.0, or higher, is installed for the current server or client. .DESCRIPTION Windows Admin Center requires WMF 5 so check the registey for WMF version on Windows versions that are less than Windows Server 2016. #> function isWMF5Installed([string] $operatingSystemVersion) { Set-Variable Server2016 -Option Constant -Value (New-Object Version '10.0') # And Windows 10 client SKUs Set-Variable Server2012 -Option Constant -Value (New-Object Version '6.2') $version = convertOsVersion $operatingSystemVersion if (-not $version) { # Since the OS version string is not properly formatted we cannot know the true installed state. return $false } if ($version -ge $Server2016) { # It's okay to assume that 2016 and up comes with WMF 5 or higher installed return $true } else { if ($version -ge $Server2012) { # Windows 2012/2012R2 are supported as long as WMF 5 or higher is installed $registryKey = 'HKLM:\SOFTWARE\Microsoft\PowerShell\3\PowerShellEngine' $registryKeyValue = Get-ItemProperty -Path $registryKey -Name PowerShellVersion -ErrorAction SilentlyContinue if ($registryKeyValue -and ($registryKeyValue.PowerShellVersion.Length -ne 0)) { $installedWmfVersion = [Version]$registryKeyValue.PowerShellVersion if ($installedWmfVersion -ge [Version]'5.0') { return $true } } } } return $false } <# .SYNOPSIS Determines if the current usser is a system administrator of the current server or client. .DESCRIPTION Determines if the current usser is a system administrator of the current server or client. #> function isUserAnAdministrator() { return ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") } <# .SYNOPSIS Get some basic information about the Failover Cluster that is running on this server. .DESCRIPTION Create a basic inventory of the Failover Cluster that may be running in this server. #> function getClusterInformation() { $returnValues = @{ } $returnValues.IsS2dEnabled = $false $returnValues.IsCluster = $false $returnValues.ClusterFqdn = $null $returnValues.IsBritannicaEnabled = $false $namespace = Get-CimInstance -Namespace root/MSCluster -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespace) { $cluster = Get-CimInstance -Namespace root/MSCluster -ClassName MSCluster_Cluster -ErrorAction SilentlyContinue if ($cluster) { $returnValues.IsCluster = $true $returnValues.ClusterFqdn = $cluster.Fqdn $returnValues.IsS2dEnabled = !!(Get-Member -InputObject $cluster -Name "S2DEnabled") -and ($cluster.S2DEnabled -gt 0) $returnValues.IsBritannicaEnabled = $null -ne (Get-CimInstance -Namespace root/sddc/management -ClassName SDDC_Cluster -ErrorAction SilentlyContinue) } } return $returnValues } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the passed in computer name. #> function getComputerFqdnAndAddress($computerName) { $hostEntry = [System.Net.Dns]::GetHostEntry($computerName) $addressList = @() foreach ($item in $hostEntry.AddressList) { $address = New-Object PSObject $address | Add-Member -MemberType NoteProperty -Name 'IpAddress' -Value $item.ToString() $address | Add-Member -MemberType NoteProperty -Name 'AddressFamily' -Value $item.AddressFamily.ToString() $addressList += $address } $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $hostEntry.HostName $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $addressList return $result } <# .SYNOPSIS Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. .DESCRIPTION Get the Fully Qaulified Domain (DNS domain) Name (FQDN) of the current server or client. #> function getHostFqdnAndAddress($computerSystem) { $computerName = $computerSystem.DNSHostName if (!$computerName) { $computerName = $computerSystem.Name } return getComputerFqdnAndAddress $computerName } <# .SYNOPSIS Are the needed management CIM interfaces available on the current server or client. .DESCRIPTION Check for the presence of the required server management CIM interfaces. #> function getManagementToolsSupportInformation() { $returnValues = @{ } $returnValues.ManagementToolsAvailable = $false $returnValues.ServerManagerAvailable = $false $namespaces = Get-CimInstance -Namespace root/microsoft/windows -ClassName __NAMESPACE -ErrorAction SilentlyContinue if ($namespaces) { $returnValues.ManagementToolsAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ManagementTools" }) $returnValues.ServerManagerAvailable = !!($namespaces | Where-Object { $_.Name -ieq "ServerManager" }) } return $returnValues } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> function isRemoteAppEnabled() { Set-Variable key -Option Constant -Value "HKLM:\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Terminal Server\\TSAppAllowList" $registryKeyValue = Get-ItemProperty -Path $key -Name fDisabledAllowList -ErrorAction SilentlyContinue if (-not $registryKeyValue) { return $false } return $registryKeyValue.fDisabledAllowList -eq 1 } <# .SYNOPSIS Check the remote app enabled or not. .DESCRIPTION Check the remote app enabled or not. #> <# c .SYNOPSIS Get the Win32_OperatingSystem information as well as current version information from the registry .DESCRIPTION Get the Win32_OperatingSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. Included in the results are current version information from the registry #> function getOperatingSystemInfo() { $operatingSystemInfo = Get-CimInstance Win32_OperatingSystem | Microsoft.PowerShell.Utility\Select-Object csName, Caption, OperatingSystemSKU, Version, ProductType, OSType, LastBootUpTime $currentVersion = Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | Microsoft.PowerShell.Utility\Select-Object CurrentBuild, UBR, DisplayVersion $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name CurrentBuild -Value $currentVersion.CurrentBuild $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name UpdateBuildRevision -Value $currentVersion.UBR $operatingSystemInfo | Add-Member -MemberType NoteProperty -Name DisplayVersion -Value $currentVersion.DisplayVersion return $operatingSystemInfo } <# .SYNOPSIS Get the Win32_ComputerSystem information .DESCRIPTION Get the Win32_ComputerSystem instance and filter the results to just the required properties. This filtering will make the response payload much smaller. #> function getComputerSystemInfo() { return Get-CimInstance Win32_ComputerSystem -ErrorAction SilentlyContinue | ` Microsoft.PowerShell.Utility\Select-Object TotalPhysicalMemory, DomainRole, Manufacturer, Model, NumberOfLogicalProcessors, Domain, Workgroup, DNSHostName, Name, PartOfDomain, SystemFamily, SystemSKUNumber } <# .SYNOPSIS Get SMBIOS locally from the passed in machineName .DESCRIPTION Get SMBIOS locally from the passed in machine name #> function getSmbiosData($computerSystem) { <# Array of chassis types. The following list of ChassisTypes is copied from the latest DMTF SMBIOS specification. REF: https://www.dmtf.org/sites/default/files/standards/documents/DSP0134_3.1.1.pdf #> $ChassisTypes = @{ 1 = 'Other' 2 = 'Unknown' 3 = 'Desktop' 4 = 'Low Profile Desktop' 5 = 'Pizza Box' 6 = 'Mini Tower' 7 = 'Tower' 8 = 'Portable' 9 = 'Laptop' 10 = 'Notebook' 11 = 'Hand Held' 12 = 'Docking Station' 13 = 'All in One' 14 = 'Sub Notebook' 15 = 'Space-Saving' 16 = 'Lunch Box' 17 = 'Main System Chassis' 18 = 'Expansion Chassis' 19 = 'SubChassis' 20 = 'Bus Expansion Chassis' 21 = 'Peripheral Chassis' 22 = 'Storage Chassis' 23 = 'Rack Mount Chassis' 24 = 'Sealed-Case PC' 25 = 'Multi-system chassis' 26 = 'Compact PCI' 27 = 'Advanced TCA' 28 = 'Blade' 29 = 'Blade Enclosure' 30 = 'Tablet' 31 = 'Convertible' 32 = 'Detachable' 33 = 'IoT Gateway' 34 = 'Embedded PC' 35 = 'Mini PC' 36 = 'Stick PC' } $list = New-Object System.Collections.ArrayList $win32_Bios = Get-CimInstance -class Win32_Bios $obj = New-Object -Type PSObject | Microsoft.PowerShell.Utility\Select-Object SerialNumber, Manufacturer, UUID, BaseBoardProduct, ChassisTypes, Chassis, SystemFamily, SystemSKUNumber, SMBIOSAssetTag $obj.SerialNumber = $win32_Bios.SerialNumber $obj.Manufacturer = $win32_Bios.Manufacturer $computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct if ($null -ne $computerSystemProduct) { $obj.UUID = $computerSystemProduct.UUID } $baseboard = Get-CimInstance Win32_BaseBoard if ($null -ne $baseboard) { $obj.BaseBoardProduct = $baseboard.Product } $systemEnclosure = Get-CimInstance Win32_SystemEnclosure if ($null -ne $systemEnclosure) { $obj.SMBIOSAssetTag = $systemEnclosure.SMBIOSAssetTag } $obj.ChassisTypes = Get-CimInstance Win32_SystemEnclosure | Microsoft.PowerShell.Utility\Select-Object -ExpandProperty ChassisTypes $obj.Chassis = New-Object -TypeName 'System.Collections.ArrayList' $obj.ChassisTypes | ForEach-Object -Process { $obj.Chassis.Add($ChassisTypes[[int]$_]) } $obj.SystemFamily = $computerSystem.SystemFamily $obj.SystemSKUNumber = $computerSystem.SystemSKUNumber $list.Add($obj) | Out-Null return $list } <# .SYNOPSIS Checks if a system lockdown policy is enforced on this computer. .DESCRIPTION By checking the system lockdown policy, we can infer that PowerShell is in ConstrainedLanguage mode (WDAC). Note: $ExecutionContext.SessionState.LanguageMode should not be used within a script context as in the case of allowed scripts (by the WDAC policy), being executed locally, the language mode will always be FullLanguage and does NOT reflect the default system lockdown policy/language mode. #> function isSystemLockdownPolicyEnforced() { return [System.Management.Automation.Security.SystemPolicy]::GetSystemLockdownPolicy() -eq [System.Management.Automation.Security.SystemEnforcementMode]::Enforce } ########################################################################### # main() ########################################################################### $operatingSystem = getOperatingSystemInfo $computerSystem = getComputerSystemInfo $isAdministrator = isUserAnAdministrator $fqdnAndAddress = getHostFqdnAndAddress $computerSystem $hostname = [Environment]::MachineName $netbios = $env:ComputerName $managementToolsInformation = getManagementToolsSupportInformation $isWmfInstalled = isWMF5Installed $operatingSystem.Version $clusterInformation = getClusterInformation -ErrorAction SilentlyContinue $isHyperVPowershellInstalled = isHyperVPowerShellSupportInstalled $isHyperVRoleInstalled = isHyperVRoleInstalled $isCredSSPEnabled = isCredSSPEnabled $isRemoteAppEnabled = isRemoteAppEnabled $smbiosData = getSmbiosData $computerSystem $isSystemLockdownPolicyEnforced = isSystemLockdownPolicyEnforced $result = New-Object PSObject $result | Add-Member -MemberType NoteProperty -Name 'IsAdministrator' -Value $isAdministrator $result | Add-Member -MemberType NoteProperty -Name 'OperatingSystem' -Value $operatingSystem $result | Add-Member -MemberType NoteProperty -Name 'ComputerSystem' -Value $computerSystem $result | Add-Member -MemberType NoteProperty -Name 'Fqdn' -Value $fqdnAndAddress.Fqdn $result | Add-Member -MemberType NoteProperty -Name 'AddressList' -Value $fqdnAndAddress.AddressList $result | Add-Member -MemberType NoteProperty -Name 'Hostname' -Value $hostname $result | Add-Member -MemberType NoteProperty -Name 'NetBios' -Value $netbios $result | Add-Member -MemberType NoteProperty -Name 'IsManagementToolsAvailable' -Value $managementToolsInformation.ManagementToolsAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsServerManagerAvailable' -Value $managementToolsInformation.ServerManagerAvailable $result | Add-Member -MemberType NoteProperty -Name 'IsWmfInstalled' -Value $isWmfInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCluster' -Value $clusterInformation.IsCluster $result | Add-Member -MemberType NoteProperty -Name 'ClusterFqdn' -Value $clusterInformation.ClusterFqdn $result | Add-Member -MemberType NoteProperty -Name 'IsS2dEnabled' -Value $clusterInformation.IsS2dEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsBritannicaEnabled' -Value $clusterInformation.IsBritannicaEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVRoleInstalled' -Value $isHyperVRoleInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsHyperVPowershellInstalled' -Value $isHyperVPowershellInstalled $result | Add-Member -MemberType NoteProperty -Name 'IsCredSSPEnabled' -Value $isCredSSPEnabled $result | Add-Member -MemberType NoteProperty -Name 'IsRemoteAppEnabled' -Value $isRemoteAppEnabled $result | Add-Member -MemberType NoteProperty -Name 'SmbiosData' -Value $smbiosData $result | Add-Member -MemberType NoteProperty -Name 'IsSystemLockdownPolicyEnforced' -Value $isSystemLockdownPolicyEnforced $result } ## [END] Get-ServerInventory ## # SIG # Begin signature block # MIInogYJKoZIhvcNAQcCoIInkzCCJ48CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB7fSHRaGCxyk1T # hdMO7sg2J72WTu3LCRK/sgiXf06M3KCCDYUwggYDMIID66ADAgECAhMzAAADTU6R # phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+ # Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd # j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k # bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x # zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH # g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD # YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT # 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq # 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY # 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN # fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv # XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE # usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH # Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z # ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab # rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGXMwghlvAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA # A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICoe # F9DxfokkH5wPMce7OFknH8tsDqRmQvWMv+ew/BKSMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAmfNIDGGGLp/aHX+OvGgCVAzQkBSD9zFoXGyY # hgyqasiGc4s5qg5JsgHRvf+i3FRED28p81sM5qG4aSheYqxOMT8g6YImXdgCH8CH # o+DjJ8yuBjm73er1MUu5e/gwd8+HdqYCIYNA1xxEYSoHCWpVjfb3/qF80pp9N1Ei # UqovfLz1blekVPIMZJVMxTDJbf5tGxjrbI6HCgcVMAYSt+02ueUhTi5+i3doqp7I # 4VHHqYFruR/PkCY+UyldiukaIR5p8IFSnzQQuizUSHp0Eg0b+vYUPgPDIjWRcrWV # fCwEF/XKuBCY8Y7v5svhPp+Jf9P7BIbJeZ7oIYksiZB79PeBGKGCFv0wghb5Bgor # BgEEAYI3AwMBMYIW6TCCFuUGCSqGSIb3DQEHAqCCFtYwghbSAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD9WQ5llSRrUcTbLs2XJrWKMiMDckDD7UEQ # Kk4Z64CgmAIGZIr5vIClGBMyMDIzMDYyOTIxNTYzMC44MDhaMASAAgH0oIHQpIHN # MIHKMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpERDhDLUUzMzctMkZBRTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEVQwggcMMIIE9KADAgECAhMzAAABxQPNzSGh9O85AAEA # AAHFMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIyMTEwNDE5MDEzMloXDTI0MDIwMjE5MDEzMlowgcoxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy # aWNhIE9wZXJhdGlvbnMxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkREOEMtRTMz # Ny0yRkFFMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq0hds70eX23J7pappaKXRhz+ # TT7JJ3OvVf3+N8fNpxRs5jY4hEv3BV/w5EWXbZdO4m3xj01lTI/xDkq+ytjuiPe8 # xGXsZxDntv7L1EzMd5jISqJ+eYu8kgV056mqs8dBo55xZPPPcxf5u19zn04aMQF5 # PXV/C4ZLSjFa9IFNcribdOm3lGW1rQRFa2jUsup6gv634q5UwH09WGGu0z89Rbtb # yM55vmBgWV8ed6bZCZrcoYIjML8FRTvGlznqm6HtwZdXMwKHT3a/kLUSPiGAsrIg # Ezz7NpBpeOsgs9TrwyWTZBNbBwyIACmQ34j+uR4et2hZk+NH49KhEJyYD2+dOIaD # GB2EUNFSYcy1MkgtZt1eRqBB0m+YPYz7HjocPykKYNQZ7Tv+zglOffCiax1jOb0u # 6IYC5X1Jr8AwTcsaDyu3qAhx8cFQN9DDgiVZw+URFZ8oyoDk6sIV1nx5zZLy+hNt # akePX9S7Y8n1qWfAjoXPE6K0/dbTw87EOJL/BlJGcKoFTytr0zPg/MNJSb6f2a/w # DkXoGCGWJiQrGTxjOP+R96/nIIG05eE1Lpky2FOdYMPB4DhW7tBdZautepTTuShm # gn+GKER8AoA1gSSk1EC5ZX4cppVngJpblMBu8r/tChfHVdXviY6hDShHwQCmZqZe # bgSYHnHl4urE+4K6ZC8CAwEAAaOCATYwggEyMB0GA1UdDgQWBBRU6rs4v1mxNYG/ # rtpLwrVwek0FazAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0G # CSqGSIb3DQEBCwUAA4ICAQCMqN58frMHOScciK+Cdnr6dK8fTsgQDeZ9bvQjCuxN # IJZJ92+xpeKRCf3Xq47qdRykkKUnZC6dHhLwt1fhwyiy/LfdVQ9yf1hYZ/RpTS+z # 0hnaoK+P/IDAiUNm32NXLhDBu0P4Sb/uCV4jOuNUcmJhppBQgQVhFx/57JYk1LCd # jIee//GrcfbkQtiYob9Oa93DSjbsD1jqaicEnkclUN/mEm9ZsnCnA1+/OQDp/8Q4 # cPfH94LM4J6X0NtNBeVywvWH0wuMaOJzHgDLCeJUkFE9HE8sBDVedmj6zPJAI+7o # zLjYqw7i4RFbiStfWZSGjwt+lLJQZRWUCcT3aHYvTo1YWDZskohWg77w9fF2QbiO # 9DfnqoZ7QozHi7RiPpbjgkJMAhrhpeTf/at2e9+HYkKObUmgPArH1Wjivwm1d7PY # WsarL7u5qZuk36Gb1mETS1oA2XX3+C3rgtzRohP89qZVf79lVvjmg34NtICK/pMk # 99SButghtipFSMQdbXUnS2oeLt9cKuv1MJu+gJ83qXTNkQ2QqhxtNRvbE9QqmqJQ # w5VW/4SZze1pPXxyOTO5yDq+iRIUubqeQzmUcCkiyNuCLHWh8OLCI5mIOC1iLtVD # f2lw9eWropwu5SDJtT/ZwqIU1qb2U+NjkNcj1hbODBRELaTTWd91RJiUI9ncJkGg # /jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLLMIICNAIB # ATCB+KGB0KSBzTCByjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UE # CxMdVGhhbGVzIFRTUyBFU046REQ4Qy1FMzM3LTJGQUUxJTAjBgNVBAMTHE1pY3Jv # c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVACEAGvYXZJK7 # cUo62+LvEYQEx7/noIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTAwDQYJKoZIhvcNAQEFBQACBQDoR+s5MCIYDzIwMjMwNjI5MTkzNjI1WhgPMjAy # MzA2MzAxOTM2MjVaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOhH6zkCAQAwBwIB # AAICHz0wBwIBAAICEc0wCgIFAOhJPLkCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYK # KwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUF # AAOBgQAUsOjqf7+5aHCoM6PimgF0EzKPrrfiUlmy1zAPwLTvGViZhX2okV7GdXqF # PfXhZTToImtJ4yN2v7sYmB/QyZCX7ChgFBoqpGcERDIqZYGYHbliYKRjG2ZznEhq # UfW3yyJQlx6oIVVgGU/S2jIYMJWxNhbsqqsDI6BHcErwk0oqXzGCBA0wggQJAgEB # MIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABxQPNzSGh9O85 # AAEAAAHFMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN # AQkQAQQwLwYJKoZIhvcNAQkEMSIEIJrBWkEswclIy0pQT8516tJmT5F9fgP/Yaxe # scAwaim4MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGQGxkfYkd0wK+V09 # wO0sO+sm8gAMyj5EuKPqvNQ/fLEwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMAITMwAAAcUDzc0hofTvOQABAAABxTAiBCAeMREA6laDZ4lmlzvb # rXnEiM5QLB+rDyArYaXltJNDozANBgkqhkiG9w0BAQsFAASCAgBeYJtgWgVJiH9i # JnyQH+4L8Dul+/SbED8ZolAQE+7mvLAj27Hbe7E4NXxSVy95p7Wwq7qcMRb7qeTW # kfnEXIJ5pFiNxS1WD9lIa0aLSNBndc2uRS4bkmNJoogDwvQ0Wo1Kw+XNdpeOeD+S # LiFnq0W6WN4bNmZvG/sS5rE8bUP+ZWq0YQZtkJUL1zz230z0qHn33PAUnBK6GafM # nqO68aIpPQVTNLZlhbWXlupWnoQbHYELL1lZrrdb12coZE0DEn56tFEt3jOXjEo7 # gVn+ZWueThjirJEDb8vvo26MLUOC3z55WRdoSMxhEW5RM06yWgjgadQ1F2ukHCyl # 7RxVBC3RB/2xvJpQSMcmik+TZK+Wxecho1oboMxPNMkOImnyUuc4UfxesC4nZtBs # q2mXqkjE2C9qGPHzMIwB7ojNa3UgJXBoCuvq3rTQ9OXfTYdZjlt7I+Hi8+L3VRae # SScUsDGV0EXvSzpaJhXQWEhUsLBgp0hS8xz8IyMvjyFux3AwSUvQODsUUeq2VSHP # YElL14pMfizPnv+fK2OPPVB2soFKOHyWREto/uOK/MH7mhq2SnSpiIN/TMLmHh9G # rqY350MSYnTGKLI5rDCYQ9UNCzBwyyKzpCLLRu8k3HyvKefLTiGcgjztivQkHlec # pBCCxi/j9/GqwkqcyK+SggBYQj807Q== # SIG # End signature block
combined_dataset/train/non-malicious/2510.ps1
2510.ps1
Param( [Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)] [ValidateNotNullorEmpty()] [Alias("name")] [string[]]$Computername=$env:computername ) Begin { Set-StrictMode -Version 2.0 $ErrorActionPreference="SilentlyContinue" Function Get-DefaultDNSServer { $lookup=nslookup $env:computername | select-string "Server" $lookup.line.split(":")[1].Trim() } Function New-ReverseIP { Param([string]$IPAddress) $arr=$IPAddress.Split(".") $Reverse="{0}.{1}.{2}.{3}" -f $arr[3],$arr[2],$arr[1],$arr[0] Write-Output $Reverse } } Process { Foreach ($name in $computername) { $dns = $False $dnsHostName = $Null $IP = $Null $ReverseVerify = $False $CShare = $False $AdminShare = $False $WMIVerify = $False $WinRMVerify = $False $AdapterHostname = $Null $DNSDomain = $Null $DHCPServer = $Null $LeaseObtained = $Null $LeaseExpires = $Null $Ping = Test-Connection $name -Quiet $dns=[system.net.dns]::GetHostEntry("$name") if ($dns) { Write-Verbose ($dns | out-String) $dnshostname = $dns.hostname $IPv4 = $dns.addresslist | where {$_.AddressFamily -eq "Internetwork"} if (($IPv4 | Measure-Object).Count -gt 1) { $IP=$IPv4[0].IPAddressToString } else { $IP=$IPv4.IPAddressToString } } else { Write-Verbose "No DNS record found for $name" } if ($IP) { Write-Verbose "Reverse lookup check" $RevIP = "{0}.in-addr.arpa" -f (New-ReverseIP $IP) Write-Verbose $revIP $DNSServer = Get-DefaultDNSServer $filter = "OwnerName = ""$RevIP"" AND RecordData=""$DNSHostName.""" Write-Verbose "Querying $DNSServer for $filter" $record = Get-WmiObject -Class "MicrosoftDNS_PTRType" -Namespace "Root\MicrosoftDNS" -ComputerName $DNSServer -filter $filter if ($record) { Write-Verbose ($record | Out-String) if ($record.RecordData -match $dnsHostName) { $ReverseVerify=$True } } Write-Verbose "Getting WMI NetworkAdapterConfiguration for address $IP" $configs = Get-WmiObject -Class Win32_NetworkAdapterConfiguration -filter "IPEnabled=True" -computername $name $adapter = $configs | where {$_.IPAddress -contains $IP} Write-Verbose ($adapter | Out-String) if ($adapter) { $AdapterHostname = $adapter.DNSHostname $DNSDomain = $adapter.DNSDomain $DHCPServer = $adapter.DHCPServer $LeaseObtained = $adapter.ConvertToDateTime($adapter.dhcpleaseobtained) $LeaseExpires = $adapter.ConvertToDateTime($adapter.dhcpleaseExpires) } } if (Test-Path -Path \\$name\c$) {$CShare=$True} if (Test-Path -Path \\$name\admin$) {$AdminShare=$True} Write-Verbose "Validating WinMgmt Service on $name" $wmisvc = Get-Service -Name Winmgmt -ComputerName $name if ($wmisvc.status -eq "Running") {$WMIVerify=$True} Write-Verbose "Validating WinRM Service on $name" $WinRMSvc = Get-Service -Name WinRM -computername $name if ($WinRMSvc.status -eq "Running") {$WinRMVerify=$True} Write-Verbose "Retrieving MAC address from $name" [regex]$MACPattern = "([0-9a-fA-F][0-9a-fA-F]-){5}([0-9a-fA-F][0-9a-fA-F])" $nbt = nbtstat -a $name $MACAddress = ($MACPattern.match($nbt)).Value Write-Verbose "Creating object" New-Object -TypeName PSObject -Property @{ Computername = $name AdapterHostname = $adapterHostName DNSHostName = $dnsHostname DNSDomain = $DNSDomain IPAddress = $IP ReverseLookup = $ReverseVerify DHCPServer = $DHCPServer LeaseObtained = $LeaseObtained LeaseExpires = $LeaseExpires MACAddress = $MACAddress AdminShare = $AdminShare CShare = $CShare WMI = $WMIVerify Ping = $Ping WinRM = $WinRMVerify } } } End { $ErrorActionPreference = "Continue" Write-Verbose "Finished." }
combined_dataset/train/non-malicious/sample_20_22.ps1
sample_20_22.ps1
using namespace System.Management.Automation using namespace System.Management.Automation.Language # This is an example profile for PSReadLine. # # This is roughly what I use so there is some emphasis on emacs bindings, # but most of these bindings make sense in Windows mode as well. Import-Module PSReadLine Set-PSReadLineOption -EditMode Emacs # Searching for commands with up/down arrow is really handy. The # option "moves to end" is useful if you want the cursor at the end # of the line while cycling through history like it does w/o searching, # without that option, the cursor will remain at the position it was # when you used up arrow, which can be useful if you forget the exact # string you started the search on. Set-PSReadLineOption -HistorySearchCursorMovesToEnd Set-PSReadLineKeyHandler -Key UpArrow -Function HistorySearchBackward Set-PSReadLineKeyHandler -Key DownArrow -Function HistorySearchForward # This key handler shows the entire or filtered history using Out-GridView. The # typed text is used as the substring pattern for filtering. A selected command # is inserted to the command line without invoking. Multiple command selection # is supported, e.g. selected by Ctrl + Click. Set-PSReadLineKeyHandler -Key F7 ` -BriefDescription History ` -LongDescription 'Show command history' ` -ScriptBlock { $pattern = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$pattern, [ref]$null) if ($pattern) { $pattern = [regex]::Escape($pattern) } $history = [System.Collections.ArrayList]@( $last = '' $lines = '' foreach ($line in [System.IO.File]::ReadLines((Get-PSReadLineOption).HistorySavePath)) { if ($line.EndsWith('`')) { $line = $line.Substring(0, $line.Length - 1) $lines = if ($lines) { "$lines`n$line" } else { $line } continue } if ($lines) { $line = "$lines`n$line" $lines = '' } if (($line -cne $last) -and (!$pattern -or ($line -match $pattern))) { $last = $line $line } } ) $history.Reverse() $command = $history | Out-GridView -Title History -PassThru if ($command) { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert(($command -join "`n")) } } # This is an example of a macro that you might use to execute a command. # This will add the command to history. Set-PSReadLineKeyHandler -Key Ctrl+b ` -BriefDescription BuildCurrentDirectory ` -LongDescription "Build the current directory" ` -ScriptBlock { [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("msbuild") [Microsoft.PowerShell.PSConsoleReadLine]::AcceptLine() } # In Emacs mode - Tab acts like in bash, but the Windows style completion # is still useful sometimes, so bind some keys so we can do both Set-PSReadLineKeyHandler -Key Ctrl+q -Function TabCompleteNext Set-PSReadLineKeyHandler -Key Ctrl+Q -Function TabCompletePrevious # Clipboard interaction is bound by default in Windows mode, but not Emacs mode. Set-PSReadLineKeyHandler -Key Ctrl+C -Function Copy Set-PSReadLineKeyHandler -Key Ctrl+v -Function Paste # CaptureScreen is good for blog posts or email showing a transaction # of what you did when asking for help or demonstrating a technique. Set-PSReadLineKeyHandler -Chord 'Ctrl+d,Ctrl+c' -Function CaptureScreen # The built-in word movement uses character delimiters, but token based word # movement is also very useful - these are the bindings you'd use if you # prefer the token based movements bound to the normal emacs word movement # key bindings. Set-PSReadLineKeyHandler -Key Alt+d -Function ShellKillWord Set-PSReadLineKeyHandler -Key Alt+Backspace -Function ShellBackwardKillWord Set-PSReadLineKeyHandler -Key Alt+b -Function ShellBackwardWord Set-PSReadLineKeyHandler -Key Alt+f -Function ShellForwardWord Set-PSReadLineKeyHandler -Key Alt+B -Function SelectShellBackwardWord Set-PSReadLineKeyHandler -Key Alt+F -Function SelectShellForwardWord #region Smart Insert/Delete # The next four key handlers are designed to make entering matched quotes # parens, and braces a nicer experience. I'd like to include functions # in the module that do this, but this implementation still isn't as smart # as ReSharper, so I'm just providing it as a sample. Set-PSReadLineKeyHandler -Key '"',"'" ` -BriefDescription SmartInsertQuote ` -LongDescription "Insert paired quotes if not already on a quote" ` -ScriptBlock { param($key, $arg) $quote = $key.KeyChar $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) # If text is selected, just quote it without any smarts if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $quote + $line.SubString($selectionStart, $selectionLength) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) return } $ast = $null $tokens = $null $parseErrors = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$parseErrors, [ref]$null) function FindToken { param($tokens, $cursor) foreach ($token in $tokens) { if ($cursor -lt $token.Extent.StartOffset) { continue } if ($cursor -lt $token.Extent.EndOffset) { $result = $token $token = $token -as [StringExpandableToken] if ($token) { $nested = FindToken $token.NestedTokens $cursor if ($nested) { $result = $nested } } return $result } } return $null } $token = FindToken $tokens $cursor # If we're on or inside a **quoted** string token (so not generic), we need to be smarter if ($token -is [StringToken] -and $token.Kind -ne [TokenKind]::Generic) { # If we're at the start of the string, assume we're inserting a new string if ($token.Extent.StartOffset -eq $cursor) { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote ") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } # If we're at the end of the string, move over the closing quote if present. if ($token.Extent.EndOffset -eq ($cursor + 1) -and $line[$cursor] -eq $quote) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) return } } if ($null -eq $token -or $token.Kind -eq [TokenKind]::RParen -or $token.Kind -eq [TokenKind]::RCurly -or $token.Kind -eq [TokenKind]::RBracket) { if ($line[0..$cursor].Where{$_ -eq $quote}.Count % 2 -eq 1) { # Odd number of quotes before the cursor, insert a single quote [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } else { # Insert matching quotes, move cursor to be in between the quotes [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$quote$quote") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } return } # If cursor is at the start of a token, enclose it in quotes. if ($token.Extent.StartOffset -eq $cursor) { if ($token.Kind -eq [TokenKind]::Generic -or $token.Kind -eq [TokenKind]::Identifier -or $token.Kind -eq [TokenKind]::Variable -or $token.TokenFlags.hasFlag([TokenFlags]::Keyword)) { $end = $token.Extent.EndOffset $len = $end - $cursor [Microsoft.PowerShell.PSConsoleReadLine]::Replace($cursor, $len, $quote + $line.SubString($cursor, $len) + $quote) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($end + 2) return } } # We failed to be smart, so just insert a single quote [Microsoft.PowerShell.PSConsoleReadLine]::Insert($quote) } Set-PSReadLineKeyHandler -Key '(','{','[' ` -BriefDescription InsertPairedBraces ` -LongDescription "Insert matching braces" ` -ScriptBlock { param($key, $arg) $closeChar = switch ($key.KeyChar) { <#case#> '(' { [char]')'; break } <#case#> '{' { [char]'}'; break } <#case#> '[' { [char]']'; break } } $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { # Text is selected, wrap it in brackets [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, $key.KeyChar + $line.SubString($selectionStart, $selectionLength) + $closeChar) [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) } else { # No text is selected, insert a pair [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)$closeChar") [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } } Set-PSReadLineKeyHandler -Key ')',']','}' ` -BriefDescription SmartCloseBraces ` -LongDescription "Insert closing brace or skip" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($line[$cursor] -eq $key.KeyChar) { [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($cursor + 1) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("$($key.KeyChar)") } } Set-PSReadLineKeyHandler -Key Backspace ` -BriefDescription SmartBackspace ` -LongDescription "Delete previous character or matching quotes/parens/braces" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($cursor -gt 0) { $toMatch = $null if ($cursor -lt $line.Length) { switch ($line[$cursor]) { <#case#> '"' { $toMatch = '"'; break } <#case#> "'" { $toMatch = "'"; break } <#case#> ')' { $toMatch = '('; break } <#case#> ']' { $toMatch = '['; break } <#case#> '}' { $toMatch = '{'; break } } } if ($toMatch -ne $null -and $line[$cursor-1] -eq $toMatch) { [Microsoft.PowerShell.PSConsoleReadLine]::Delete($cursor - 1, 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::BackwardDeleteChar($key, $arg) } } } #endregion Smart Insert/Delete # Sometimes you enter a command but realize you forgot to do something else first. # This binding will let you save that command in the history so you can recall it, # but it doesn't actually execute. It also clears the line with RevertLine so the # undo stack is reset - though redo will still reconstruct the command line. Set-PSReadLineKeyHandler -Key Alt+w ` -BriefDescription SaveInHistory ` -LongDescription "Save current line in history but do not execute" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) [Microsoft.PowerShell.PSConsoleReadLine]::AddToHistory($line) [Microsoft.PowerShell.PSConsoleReadLine]::RevertLine() } # Insert text from the clipboard as a here string Set-PSReadLineKeyHandler -Key Ctrl+V ` -BriefDescription PasteAsHereString ` -LongDescription "Paste the clipboard text as a here string" ` -ScriptBlock { param($key, $arg) Add-Type -Assembly PresentationCore if ([System.Windows.Clipboard]::ContainsText()) { # Get clipboard text - remove trailing spaces, convert \r\n to \n, and remove the final \n. $text = ([System.Windows.Clipboard]::GetText() -replace "\p{Zs}*`r?`n","`n").TrimEnd() [Microsoft.PowerShell.PSConsoleReadLine]::Insert("@'`n$text`n'@") } else { [Microsoft.PowerShell.PSConsoleReadLine]::Ding() } } # Sometimes you want to get a property of invoke a member on what you've entered so far # but you need parens to do that. This binding will help by putting parens around the current selection, # or if nothing is selected, the whole line. Set-PSReadLineKeyHandler -Key 'Alt+(' ` -BriefDescription ParenthesizeSelection ` -LongDescription "Put parenthesis around the selection or entire line and move the cursor to after the closing parenthesis" ` -ScriptBlock { param($key, $arg) $selectionStart = $null $selectionLength = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetSelectionState([ref]$selectionStart, [ref]$selectionLength) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($selectionStart -ne -1) { [Microsoft.PowerShell.PSConsoleReadLine]::Replace($selectionStart, $selectionLength, '(' + $line.SubString($selectionStart, $selectionLength) + ')') [Microsoft.PowerShell.PSConsoleReadLine]::SetCursorPosition($selectionStart + $selectionLength + 2) } else { [Microsoft.PowerShell.PSConsoleReadLine]::Replace(0, $line.Length, '(' + $line + ')') [Microsoft.PowerShell.PSConsoleReadLine]::EndOfLine() } } # Each time you press Alt+', this key handler will change the token # under or before the cursor. It will cycle through single quotes, double quotes, or # no quotes each time it is invoked. Set-PSReadLineKeyHandler -Key "Alt+'" ` -BriefDescription ToggleQuoteArgument ` -LongDescription "Toggle quotes on the argument under the cursor" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $tokenToChange = $null foreach ($token in $tokens) { $extent = $token.Extent if ($extent.StartOffset -le $cursor -and $extent.EndOffset -ge $cursor) { $tokenToChange = $token # If the cursor is at the end (it's really 1 past the end) of the previous token, # we only want to change the previous token if there is no token under the cursor if ($extent.EndOffset -eq $cursor -and $foreach.MoveNext()) { $nextToken = $foreach.Current if ($nextToken.Extent.StartOffset -eq $cursor) { $tokenToChange = $nextToken } } break } } if ($tokenToChange -ne $null) { $extent = $tokenToChange.Extent $tokenText = $extent.Text if ($tokenText[0] -eq '"' -and $tokenText[-1] -eq '"') { # Switch to no quotes $replacement = $tokenText.Substring(1, $tokenText.Length - 2) } elseif ($tokenText[0] -eq "'" -and $tokenText[-1] -eq "'") { # Switch to double quotes $replacement = '"' + $tokenText.Substring(1, $tokenText.Length - 2) + '"' } else { # Add single quotes $replacement = "'" + $tokenText + "'" } [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset, $tokenText.Length, $replacement) } } # This example will replace any aliases on the command line with the resolved commands. Set-PSReadLineKeyHandler -Key "Alt+%" ` -BriefDescription ExpandAliases ` -LongDescription "Replace all aliases with the full command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $startAdjustment = 0 foreach ($token in $tokens) { if ($token.TokenFlags -band [TokenFlags]::CommandName) { $alias = $ExecutionContext.InvokeCommand.GetCommand($token.Extent.Text, 'Alias') if ($alias -ne $null) { $resolvedCommand = $alias.ResolvedCommandName if ($resolvedCommand -ne $null) { $extent = $token.Extent $length = $extent.EndOffset - $extent.StartOffset [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $extent.StartOffset + $startAdjustment, $length, $resolvedCommand) # Our copy of the tokens won't have been updated, so we need to # adjust by the difference in length $startAdjustment += ($resolvedCommand.Length - $length) } } } } } # F1 for help on the command line - naturally Set-PSReadLineKeyHandler -Key F1 ` -BriefDescription CommandHelp ` -LongDescription "Open the help window for the current command" ` -ScriptBlock { param($key, $arg) $ast = $null $tokens = $null $errors = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$ast, [ref]$tokens, [ref]$errors, [ref]$cursor) $commandAst = $ast.FindAll( { $node = $args[0] $node -is [CommandAst] -and $node.Extent.StartOffset -le $cursor -and $node.Extent.EndOffset -ge $cursor }, $true) | Select-Object -Last 1 if ($commandAst -ne $null) { $commandName = $commandAst.GetCommandName() if ($commandName -ne $null) { $command = $ExecutionContext.InvokeCommand.GetCommand($commandName, 'All') if ($command -is [AliasInfo]) { $commandName = $command.ResolvedCommandName } if ($commandName -ne $null) { Get-Help $commandName -ShowWindow } } } } # # Ctrl+Shift+j then type a key to mark the current directory. # Ctrj+j then the same key will change back to that directory without # needing to type cd and won't change the command line. # $global:PSReadLineMarks = @{} Set-PSReadLineKeyHandler -Key Ctrl+J ` -BriefDescription MarkDirectory ` -LongDescription "Mark the current directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey($true) $global:PSReadLineMarks[$key.KeyChar] = $pwd } Set-PSReadLineKeyHandler -Key Ctrl+j ` -BriefDescription JumpDirectory ` -LongDescription "Goto the marked directory" ` -ScriptBlock { param($key, $arg) $key = [Console]::ReadKey() $dir = $global:PSReadLineMarks[$key.KeyChar] if ($dir) { cd $dir [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } } Set-PSReadLineKeyHandler -Key Alt+j ` -BriefDescription ShowDirectoryMarks ` -LongDescription "Show the currently marked directories" ` -ScriptBlock { param($key, $arg) $global:PSReadLineMarks.GetEnumerator() | % { [PSCustomObject]@{Key = $_.Key; Dir = $_.Value} } | Format-Table -AutoSize | Out-Host [Microsoft.PowerShell.PSConsoleReadLine]::InvokePrompt() } # Auto correct 'git cmt' to 'git commit' Set-PSReadLineOption -CommandValidationHandler { param([CommandAst]$CommandAst) switch ($CommandAst.GetCommandName()) { 'git' { $gitCmd = $CommandAst.CommandElements[1].Extent switch ($gitCmd.Text) { 'cmt' { [Microsoft.PowerShell.PSConsoleReadLine]::Replace( $gitCmd.StartOffset, $gitCmd.EndOffset - $gitCmd.StartOffset, 'commit') } } } } } # `ForwardChar` accepts the entire suggestion text when the cursor is at the end of the line. # This custom binding makes `RightArrow` behave similarly - accepting the next word instead of the entire suggestion text. Set-PSReadLineKeyHandler -Key RightArrow ` -BriefDescription ForwardCharAndAcceptNextSuggestionWord ` -LongDescription "Move cursor one character to the right in the current editing line and accept the next word in suggestion when it's at the end of current editing line" ` -ScriptBlock { param($key, $arg) $line = $null $cursor = $null [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$line, [ref]$cursor) if ($cursor -lt $line.Length) { [Microsoft.PowerShell.PSConsoleReadLine]::ForwardChar($key, $arg) } else { [Microsoft.PowerShell.PSConsoleReadLine]::AcceptNextSuggestionWord($key, $arg) } } # SIG # Begin signature block # MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB8WIMlOTgc5Qez # nDvkDsHyYO0eG9xXPvt0RCJDy8oZXqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5Q8M1SYb2V9KcOdcWj/J6N # ha/izcyqdtW3lJtVif1GMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAHi6O19sluAVW7JUkYK+CXkAATl0cwlCWjLegQJJxam2cvc2mDkQA74W # bqrMdRr3avAE8enysXlHYCEI4l5V796wkAwpfyowsyz/qF3Lfq0lY1WVzZU+1Cwj # ixxbb3UhJ8aAYEN5gBQMOyoEk95AaF9trQ4xvtwi5r1klVI6fnjm06rURENPjOpA # 1L1PttdEE781APT9m26/rKSRsdQeZL8dvOgMKT62JyqAFV3A9uLWyjxTjXqiBPzN # gzl2Oc1lJpjIv/hpm0GtieJYs0ZUdw+CHSvUzE0QHfDNY7qjYOesR6xDNw/UsiQx # 2faHxZ9mjsZutBPI0OS2XcA1e5kG4qGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC # F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDxV1Mx1x3sGBLuqUKx7TQPuoSkBc2H5HEga99ETcgSkgIGZbwTlISp # GBMyMDI0MDIxNDIxMDAzMC43NDVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHsMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP # MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLnzAiGA8yMDI0MDIxNDA5NTEy # N1oYDzIwMjQwMjE1MDk1MTI3WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpdwuf # AgEAMAgCAQACAwCorTAIAgEAAgMBW/8wCgIFAOl4XR8CAQAwNgYKKwYBBAGEWQoE # AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq # hkiG9w0BAQsFAAOCAQEAawnUreDJf/Yn7Bd0RGAsR9Zier8b8PaN9L5IIdDZsVpR # +hQP9drjt+eNF3EKGbNMkU/bLJYhys1ixgJy6nLFsqD2aOM31ULsvyzKwZrQZr3r # qpMLwdTtGK5UuQ6HosD4qGifpiOJ/I7AyjZH1OdRiCAQJ7aASxNB3XzXL+FXZeQ2 # kYVIT1LpNjD7ZTodAPrB/O9gYIoNZvu+8Sd3SZTigh5EduAy9vCgqToT9z1ehA3Y # kWZsJYGlF7BQEETuF1VZ35Y03X/rNVAobuODIMStsLj+k9a1DB0/X6HgL3SQFPvA # L7lcxg2S9xpyZDqgf+nrjYdTS/y4Dt+lz3ADNIDixTGCBA0wggQJAgEBMIGTMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB6FCwgM8rcplNAAEAAAHo # MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw # LwYJKoZIhvcNAQkEMSIEIP5rcQT6q4xF7Ref2xzxsDj012tAC654jdSZoXiENXw+ # MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgKtLaxNUChCCCQdHn2k2qKB7T # F8lPYndTxbVJzwf46x0wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAiBCC25FGR9Nc72C0DFfp+ERRAze2/ # dO1vMF8f8jiZC1OPuzANBgkqhkiG9w0BAQsFAASCAgC8Mzdr2doEZQtFKQejpT7E # RAj5ErsjIW8RWHSBMvkepIXGGlGHiRWuDxd0LowS5x8NwWLXJypKf4XY4ZleG7Ok # 06/Lh8TBpfC9NtCa2zeTx+BP2kn9ZvsCsp2nuBNB44jYqNOA3KX/94F186QH9OV1 # c/DOpalRTBcdvT37oj8upSoMWSV+0+c9ZwHTRfDo+INR0jYlAmJwTY/oRLQjyD0e # OmZFxaZcEraeNOMqG9snM1oY1r0h1tJ05erim4x3Civz7EIXBAHs0Cf6K4DzWfHL # rD1ydXMlNmtkPRRu5PBall2emCd+BcFwJQ9s20Skm7wq9M8taZ8TyPm2G/ZozxER # 1bH5uYQ8KBKQ+ZOBR35tN9AoUpjG+2PhbKn3fZZ2zpYlyUtY2UkDYjSQqisEVYI8 # vh2Xtzi7mSLDYmc5dZmtiGHqTNekHqvkU60e/DrwT5JEKOS4fuIRCN5inuzWe4Mx # UMB9rna3QVmKDfq0iZQfplYeFVqxwXaFOb0gsophcw2+IU5P8joGe1LoOCzqdVpu # 9wKPlydTrpTKStmoOBlHwtwfDn+0haB3ZyEDj7UOERJEbD05QWWiIwrzI6thZoy7 # kQ4Smm6gGzPF2z/pNrz4w7hLd9Y13AUb8jtWMwNmTw1ixcdmhC2E5dkN/Adlxnjn # WoN+a1ub9TdWBmfKB7k6EQ== # SIG # End signature block
combined_dataset/train/non-malicious/sample_46_39.ps1
sample_46_39.ps1
<################################################### # # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> #requires -Version 4.0 #requires -Module CloudDeployment function Get-CloudAdminResourceManagerEndpoint { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = ($Parameters.Roles['WAS'].PublicConfiguration.PublicInfo.Endpoints.Endpoint | Where Name -EQ 'ResourceManager' | Select -First 1 -ExpandProperty Address).TrimEnd('/') if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudPublicResourceManagerEndpoint { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = ($Parameters.Roles['WASPUBLIC'].PublicConfiguration.PublicInfo.Endpoints.Endpoint | Where Name -EQ 'ResourceManager' | Select -First 1 -ExpandProperty Address).TrimEnd('/') if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudAdminSubscriptionId { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['Cloud'].PublicConfiguration.PublicInfo.DefaultProviderSubscriptionId if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudSystemInternalSubscriptionId { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['Cloud'].PublicConfiguration.PublicInfo.SystemInternalSubscriptionId if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudCredential { [CmdletBinding()] [OutputType([PSCredential])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $SecretContainerName ) $ErrorActionPreference = 'Stop' $credentials = $Parameters.Roles['Cloud'].PublicConfiguration.PublicInfo.SecurityInfo.SelectNodes('//Credential') $credentialInfo = $credentials | Where SecretContainerName -EQ $SecretContainerName if (-not $credentialInfo) { throw "Invalid SecretContainerName '$SecretContainerName' specified for cloud credential; available secret container names: $($credentials.SecretContainerName -join ', ')." } if (-not $credentialInfo.Credential) { throw "Unable to resolve credential info for SecretContainerName '$SecretContainerName' as no credential element was set." } $credential = $Parameters.GetCredential($credentialInfo) if (-not $credential) { throw "Unable to get credential info for SecretContainerName '$SecretContainerName'." } Trace-Execution "$($MyInvocation.InvocationName) : [$SecretContainerName] $(ConvertTo-Json $credential -Depth 1 -Compress)" return $credential } function Get-CloudRoleNodeNames { [CmdletBinding()] [OutputType([string[]])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $Role ) $ErrorActionPreference = 'Stop' $data = @($Parameters.Roles[$Role].PublicConfiguration.Nodes.Node.Name) $message = [string]::Join(', ', $data) if (-not $data.Length) { throw "$($MyInvocation.InvocationName) [$Role] could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : [$Role] $message" return $data } function Get-CloudRoleNodeName { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [String] $Role ) $ErrorActionPreference = 'Stop' $data = @($Parameters.Roles[$Role].PublicConfiguration.Nodes.Node.Name)[0] if (-not $data) { throw "$($MyInvocation.InvocationName) [$Role] could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : [$Role] $data" return $data } function Get-CloudExecutionContextRoleNodeNames { [CmdletBinding()] [OutputType([string[]])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # no validation; this can return null / empty $ErrorActionPreference = 'Stop' $data = @($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name) Trace-Execution "$($MyInvocation.InvocationName) : $([string]::Join(', ', $data))" return $data } function Get-CloudDomainName { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['Domain'].PublicConfiguration.PublicInfo.DomainConfiguration.DomainName if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudDomainFQDN { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['Domain'].PublicConfiguration.PublicInfo.DomainConfiguration.FQDN if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudDomainExternalFQDN { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['Domain'].PublicConfiguration.PublicInfo.DomainConfiguration.EXTERNALFQDN if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudStorageEndpoint { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $prefix = $Parameters.Roles['FabricRingServices'].PublicConfiguration.PublicInfo.RPCommonProperties.ServiceUri.TrimEnd('/') $suffix = $Parameters.Roles['SRP'].PublicConfiguration.PublicInfo.Configurations.SRP.GatewayEndpointSuffix.Trim('/') if (-not $prefix -or -not $suffix) { throw "$($MyInvocation.InvocationName) could not retrieve data; prefix: '$prefix', suffix: '$suffix'" } $data = '{0}/{1}/' -f @($prefix, $suffix) Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudLocation { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['WAS'].PublicConfiguration.PublicInfo.Region.Name if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudManagementClusterSharePath { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string] $Path ) $ErrorActionPreference = 'Stop' $clusterName = Get-ManagementClusterName $Parameters $data = if ($Path -NotMatch "{.*}") { $Path } else { Get-SharePath $Parameters $Path $clusterName } Trace-Execution "$($MyInvocation.InvocationName) : '$Path' -> '$data'" return $data } function Get-CloudIdentitySystemName { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['IdentityProvider'].PublicConfiguration.PublicInfo.IdentitySystem.Name if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudIdentitySystemAadEnvironmentName { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['IdentityProvider'].PublicConfiguration.PublicInfo.IdentitySystem.AADEnvironmentName if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudARMEndPointForCustomCloud { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['IdentityProvider'].PublicConfiguration.PublicInfo.CustomCloudInfo.Name if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudDirectoryTenantId { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['IdentityProvider'].PublicConfiguration.PublicInfo.AADTenant.Id if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-CloudDeploymentGuid { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' $data = $Parameters.Roles['BareMetal'].PublicConfiguration.PublicInfo.DeploymentGuid if (-not $data) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $data" return $data } function Get-WASSqlServer { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) Get-WASClusterSqlServer -Parameters $Parameters } function Get-WASClusterSqlServer { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' # SQL Cluster $SQLRoleDefinition = $Parameters.Roles["SQL"].PublicConfiguration $SQLPublicInfo = $SQLRoleDefinition.PublicInfo $sqlServer = ($SQLPublicInfo.SqlInstances.Instance | Where { $_.Tag -eq 'ControlPlane' }).InstanceName if (-not $sqlServer) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $sqlServer" return $sqlServer } function Get-WASContainerSqlServer { [CmdletBinding()] [OutputType([string])] param ( [Parameter(Mandatory=$true)] [ValidateNotNull()] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'Stop' # SQLWAS $SQLRoleDefinition = $Parameters.Roles["SQLWAS"].PublicConfiguration $SQLPublicInfo = $SQLRoleDefinition.PublicInfo $sqlServer = ($SQLPublicInfo.SqlServerParameters.ConfigParameters | Where { $_.Tag -eq 'ControlPlane' }).InstanceName if (-not $sqlServer) { throw "$($MyInvocation.InvocationName) could not retrieve data." } Trace-Execution "$($MyInvocation.InvocationName) : $sqlServer" return $sqlServer } #$errors=@();[System.Management.Automation.PSParser]::Tokenize((Get-Content $psISE.CurrentFile.FullPath -Raw),[ref]$errors)|%{if ($prev.Type -eq 'Keyword' -and $prev.Content -ieq 'function') {"Export-ModuleMember -Function $($_.Content)"};$prev=$_} Export-ModuleMember -Function Get-CloudAdminResourceManagerEndpoint Export-ModuleMember -Function Get-CloudPublicResourceManagerEndpoint Export-ModuleMember -Function Get-CloudAdminSubscriptionId Export-ModuleMember -Function Get-CloudSystemInternalSubscriptionId Export-ModuleMember -Function Get-CloudCredential Export-ModuleMember -Function Get-CloudRoleNodeNames Export-ModuleMember -Function Get-CloudRoleNodeName Export-ModuleMember -Function Get-CloudExecutionContextRoleNodeNames Export-ModuleMember -Function Get-CloudDomainName Export-ModuleMember -Function Get-CloudDomainFQDN Export-ModuleMember -Function Get-CloudDomainExternalFQDN Export-ModuleMember -Function Get-CloudStorageEndpoint Export-ModuleMember -Function Get-CloudLocation Export-ModuleMember -Function Get-CloudManagementClusterSharePath Export-ModuleMember -Function Get-CloudIdentitySystemName Export-ModuleMember -Function Get-CloudIdentitySystemAadEnvironmentName Export-ModuleMember -Function Get-CloudDirectoryTenantId Export-ModuleMember -Function Get-CloudDeploymentGuid Export-ModuleMember -Function Get-CloudARMEndPointForCustomCloud Export-ModuleMember -Function Get-WASSqlServer Export-ModuleMember -Function Get-WASClusterSqlServer Export-ModuleMember -Function Get-WASContainerSqlServer # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfkjuCISfRtrjC # b+4jEVLLRfSSJOGF1Beoo905x86xXaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFa2pbYrk3rNGjzKtkJXtDMU # wVe1rq9idzeUJ1CO0xceMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXOeslqmJnWA8OTdIP1wyEi6D0TKWmZy7FiHix7Gg5lBFaKhu37G5hsUs # T8mSsgWk9SxeF4NB0ZzgaUzGfi8/CYd/Q7yEX6CxJm6Q8azJbNvI9s2wONoxTqyU # lcDcAGgxFo/vyQXM+CO4SgaWMEJAOwNd3e8AvnobMyYg/94+QGDM2nOQNkCN0tTi # 71VWXgJpjMjmmPcw2HBMQCqMj0AU1AHZfmlK6xmCJ59KIlPXVgyK7UBfwHzDxIn1 # BHVKG5LG1MYChofgReNYbP8D1RBcnpKze0D7CBgNkIwtPJskJcY3mgknB9+ZRTS4 # zeDPeFfeSLie6lRdYgDcN2vLDrNTj6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAPviUvu/tTIR8xhDR0Nmu9b4Q1BswWNK/5lPMo4dIG/wIGZbwS6b4l # GBMyMDI0MDIxMjE0MDkyMC42NDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRolzAiGA8yMDI0MDIxMjA5NTEx # OVoYDzIwMjQwMjEzMDk1MTE5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiX # AgEAMAoCAQACAiY/AgH/MAcCAQACAhOAMAoCBQDpdboXAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAIeJj1Hw+sb1l/Ps+mMe19bwjz4JymTkkcg4/ZlM8LxH # 9fkRHefrXaZ6DCazKS3epw5b58/BWoFMgcbQ45EggsR0O80tcVQxZZu9i38A//4H # Y6IhXO45bl8BajblrQ+4B0VEH+qxyk2qQKxeyiNaahLczgvfq86urkunZ5LaXGVW # 6Q5NVzIhu1X5Dbx/AwhCqG6BN1PcIYVrcrBJK3ot2XMbL3kSojn7/ahLaswmAmNX # a052rk01sRRF04kuuS1fBFnuwFqwaNQ7nQ1u9z7fl5nPnMrUG+tIJHW4sjYbsuYG # kWVpYpukdWCg/0bLr6S5/5ISkM3NHeSXPoU3LydiMWUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCD3y+CYkye+rzJc3sfeKjLWvBOFz+BsAxtOWOtKy4AB # IjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgZ/tX+K4cIAQr7/jYomvwBCtf # vDto7JlyjY5tCOO7B40wDQYJKoZIhvcNAQELBQAEggIAp/Ee3pCGPaQFGnPkoRWS # OqOkivzUi+r40fHP1IGMIud6NYVOVbpi2T7aEdkzFOPLemo9fHqAd/+stJOQmliX # iyjzBg2RUQPAUwiq0fmNNEt+O58HY08xTU4ijpYFokl8Kc2wpl8GgkGJu6RThH7L # 10fJDt7Xnj1Nw5o/dW74J121cylMKxn+nbo1K7my7FncQu5QmmZKjWhEBSfxwCwd # yPcVc9YdjAMbj0R13hMfiBYzsySFxbCPMSh32gA4lYB9avxOfVRbg6XllIqsrZye # wHwP8+Rke0yKf23y3m0oB9cjKzNqTJJps4IrPiTUaLXX67Dyvg/EF/Ln1ACKEAH7 # fWZDHRVkUsRL4upPTxqFO+QE889l/uBhhv7pdMmDJdkfrmT2RoCO9M48VBJuh7H/ # E6u2vnr2IB8npFTl/+vtSxFzkIrOBZDu9Uw1Mk7ZnMks7FbsG40o2QQ2IO3zZWq7 # EGxQHZ/z46U1AxUdqw3XNBH/0iob4LF6/jkesyj7NmeDfZOxsgK7B5hundaL2gGS # tI5s6MvRw2YsOsUyJXNpbbnXQTUwAZOw3jUFOVWFLpKYK8AS3DA8DOkhu7k7+No7 # gdVuKFO2Jn//+JVduKfr5Xmg3gqfTmmHUg7vBYQPHrIl1VaULdFqYOs+C0+tXfpe # bd2R2nnVDJEr1CGheVCF5aE= # SIG # End signature block
combined_dataset/train/non-malicious/sample_44_72.ps1
sample_44_72.ps1
# # Module manifest for module 'OCI.PSModules.Identitydataplane' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Identitydataplane.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0db2e619-5a8a-4c35-906a-750fbc5977b8' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Identitydataplane Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydataplane.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'New-OCIIdentitydataplaneScopedAccessToken', 'New-OCIIdentitydataplaneUserSecurityToken' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydataplane' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_67_70.ps1
sample_67_70.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .Synopsis Registers or unregisters the PowerShell ETW manifest .Parameter Path The fully qualified path to the PowerShell.Core.Instrumentation.man manifest file. The default value is the location of this script. .Parameter Unregister Specify to unregister the manifest. .Notes The PowerShell.Core.Instrumentation.man and PowerShell.Core.Instrumentation.dll files are expected to be at the location specified by the Path parameter. When registered, PowerShell.Core.Instrumentation.dll is locked to prevent deleting or changing. To update the binary, first unregister the manifest using the -Unregister switch. #> [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot, [switch] $Unregister ) Set-StrictMode -Version 3.0 $ErrorActionPreference = 'Stop' function Start-NativeExecution([scriptblock]$sb, [switch]$IgnoreExitcode) { $backupEAP = $script:ErrorActionPreference $script:ErrorActionPreference = "Continue" try { & $sb # note, if $sb doesn't have a native invocation, $LASTEXITCODE will # point to the obsolete value if ($LASTEXITCODE -ne 0 -and -not $IgnoreExitcode) { throw "Execution of {$sb} failed with exit code $LASTEXITCODE" } } finally { $script:ErrorActionPreference = $backupEAP } } function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() # if the current Powershell session was called with administrator privileges, # the Administrator Group's well-known SID will show up in the Groups for the current identity. # Note that the SID won't show up unless the process is elevated. return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } $manifest = Get-Item -Path (Join-Path -Path $Path -ChildPath 'PowerShell.Core.Instrumentation.man') $binary = Get-Item -Path (Join-Path -Path $Path -ChildPath 'PowerShell.Core.Instrumentation.dll') $files = @($manifest, $binary) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } [string] $command = 'wevtutil um "{0}"' -f $manifest.FullName # Unregister if present. Avoids warnings when registering the manifest # and it is already registered. Write-Verbose "unregister the manifest, if present: $command" Start-NativeExecution {Invoke-Expression $command} $true if (-not $Unregister) { $command = 'wevtutil.exe im "{0}" /rf:"{1}" /mf:"{1}"' -f $manifest.FullName, $binary.FullName Write-Verbose -Message "Register the manifest: $command" Start-NativeExecution { Invoke-Expression $command } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1/q5FJbWVjBBd # zdmm1gMERAVvJK3uGRSGbK2+M2jUNKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDSC4uosoXy/3fIdnGqnAMwp # HzMziQZzA2s4AVUXNqXFMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGTQSqzr3Zt61TB5UMEUKdSYF42EyTSqiBbgy6PBphdtPkR05dqpYZUG9 # TQFtC/Z7Kpfv70EymZ0paE9NiINnoK//F9krvVGUNSbXSrdpg1DMDkQJzd9PO5eZ # FTUv1qODJ2GQeQ2h3Jn0vEyJ3Xoz8nPkRVKGcKnct+KdU6AEjI6+HbGcdZvrgZ90 # DuTtUI0s+vQZcCAFI4Y9e49wTzXBttpTirq1q6GU0/QGGVaPQSry5cjwjM1RGYf4 # 9X1XuIoLxWst0maJ9D7jPz4DGvtJxK2fnvN7owLmSI62/WSFJYoj4rvSScs9cjx0 # O3y9fLg8g/dUDC+Rqd2hRwKgfsKddaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB0ZVet8n6cwjPpXrPTqsidUdTmuomiFiLoS/FrR5z+UQIGZkZGQCVV # GBMyMDI0MDYxMzAxMTQ0Mi42MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRbQDAiGA8yMDI0MDYxMjE3Mzcw # NFoYDzIwMjQwNjEzMTczNzA0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFFtA # AgEAMAcCAQACAgnHMAcCAQACAhQ2MAoCBQDqFazAAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAJvcRS7um6Ez5BBk0dXFSlYl2wfjoX3S3T4HLU05LIIMK/U7 # JGOch8nqwgYQPOBy2AgeOcLsS8JG+tXqby+r2ATPnvig/ZvzaN0gnK5tGBasHPoc # TkKHB9cOvx/FJZ3X46mP+3c6zV7za/3/Bn+adJn//8wJ2m4ctdrBD5REUxfGZovd # DDyDUOt9LeAY1ulZVd66cdvtNBQcjmuswWl+RTlQ7NQMPx7YTniHqtpi51AR8rHm # t4qQkA/QX1W6X0s/Lzr/ufCiMQ0uZR1lvo7nVFrk6y9n5pAoSITblvRqh9h7sE5s # Lf29MUXgzF5BmC3rEx68ZQKk2RRKqIL2LdW5jQ0xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCtPU/9GiXHAjNWuWea6jEZxDqo7XBk4aAiS5tj6EQwDjCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgg5FotLHecbCbi6cUZY/oaPwhtjA9 # z6nJCdeXLrd/R7IwDQYJKoZIhvcNAQELBQAEggIAhMCalRX22095XjLFdcE7yQE2 # fc+gXRfDfWU0m4LpMme+gAmWTLpWWE6o+K4apCsZI3u++9Qg/W+KIh8oxaUQYLUf # 1DYE4xB9xvhDIs6suwE+IsgoFILMtjrZ5C5dXIcKbfxU79TA5z51I/L51WMjqcwB # Bl3AOd0rf7K0md+U0NJS+Y10kt874VV0oZ0pamkHO40M1uSjnkRZyRIYqxiqeQTY # NX47JdS/e5XHaymeHBj5GHoGZfxZQ0E6W645v3LnXUiIvBYAFx98MRO7zwNKPagw # vXBnb6b5dRlDbN1maKfMRPRblYDfiRFnZO2V5MQetJGyr+LNjAlf3T5+eqKji63i # TtW26euRt90EccI0Bsmm6LycDziUtyiwPMLeaD7PcaaZcoYZYQq42Fug8bQTpk3N # oG9nyzajbp0NBlyU2TY6w//cKtJmgg9Vt/RCn4JBsrFeWMsXJF7YGM73TPw7/q2q # JyQqTlF/a9t6A4rhIHID9L+7RlrFeSmHzNr6hjaRQjybHZ+9UvVyj5ubBmetTqvL # QHFeOtfIa7kJb/rtgSC+qz+nQbNRTvCW8DjJEs8RG+g/sh7FhgKuq8abg/uapKBS # WWa/sYGWTVs+zVi8TWtNrLkTfwqD2Rf0+lwFDDT0bWA3fkQupbfU+IwRJI04hLTV # LmRZVHrMObM2FryMEL4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_52.ps1
sample_50_52.ps1
/*--------------------------------------------------------- * Copyright (C) Microsoft Corporation. All rights reserved. *--------------------------------------------------------*/ define("vs/languages/typescript/js/importAndExportRewriter.nls.keys",[],{}); // SIG // Begin signature block // SIG // MIIjiAYJKoZIhvcNAQcCoIIjeTCCI3UCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // m8mHf/+jdzvjTHyQhB9f9rnDb3rZ59iaX57aU72c+K+g // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAAVKbQJ9QVpl1iAAA // SIG // AAABUjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTE5MDUwMjIxMzc0NloX // SIG // DTIwMDUwMjIxMzc0NlowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // saeJ0/an7vTtdIicnsGFx5TflhIe/TaKK/Z4TOnp1DWw // SIG // m4V/b0vvHP93iFWs0mJ1QU6i81u8VjdWwnCLQ27BMyhB // SIG // NgbMErp+yfcQmi8HBhyha/qllJc+4YfUXJo2EpDhjcmz // SIG // n64I97JtA0raCvJY8BMlFXkXzB8fRP+wmvzhKtnFwU9y // SIG // 9H1Z5RJH2pd9dBBQiw6NgaxN+TRkYxvv552YqiqhIeZV // SIG // jZN9yVfPyNHyHFCqyxJlBq79AoAu8NnI5mwYQSCftCs0 // SIG // p0lop4F6Jf94lHQQcuEEDR++u5GBrpyXmNPEYxzCIIyQ // SIG // nQKBDPtpl79aYWle4/jN3Tc2f3HbM96A3wIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFN3/AMNbFu9lnCdm6P0EmBs1 // SIG // a0WHMFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis0NTQxMzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQCU8ETmh76IF4IsVo8o7y34kYKiNkCv // SIG // BqBtt3qgIDY1+1f1nVFgW7NGiAt5OPXHdM3aviSSJosX // SIG // F+lDk6c9i2TxUodt5dPzKN+cBuyV1MYDtFPuXa20Ibec // SIG // aDJdZ+/00OIinJgGEgD8U6uZRZ6FdvnwHpY1QOzuN7M4 // SIG // 7Oy0dPQ9MBR8M2XKP4hPB5WpJdt2U+xZweQH1NocH7/O // SIG // 8t6t2uahYroEspCC6StP76p5RFQdCgHUFc2FC0P1OHhR // SIG // I54rNybPVKwL7SISLNuuOOUY91D+lOBoDo4EKJ5UQPpg // SIG // 5bIe/MBUhmwEiLyvn5DjVIb4/AfGRzZ+ExX53LfmtGbn // SIG // mOH+mkT8a/G3jUlCp+0FvxUJp+NtmxOyn56lp3LB+72z // SIG // YRvdvaa1Rz7GmuydtovcMh4+5tKAE1yfmI38qBALXefz // SIG // ciGGhOFLtI9RIbmFKOVWiSZzGkxEdKl/Pv2GUVqxTf4X // SIG // qbONVzVY4gGsKWwGtH1Gt0fUTQYz4gZzNILzT6KzOHbF // SIG // dlSfBpbiEDqyZTr7gqzmAxoqxp2nTpkNtcDwaBhQlqSu // SIG // ej8c5YirMuTTZgF3BMe0G/b1I2NVpWLa3cDl06cTeLJc // SIG // yIbevQWmZSyIy1VsKiH7ja4RyjQzPSvr+74KyG3+5ef+ // SIG // uuYNII0AgwjekObMbrbUwBCrSXkv6ZKSPg22fzCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghVbMIIVVwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAABUptAn1BWmXWIAAAAAAFSMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBbRIs30OjLUJoo // SIG // +0yTwcNeThuzpEr5T2WT4FudBN18jDBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAC8IJ960/lUR2nZNaeOFR/g/ax0y8vFm // SIG // +n0nh18ck80XY8AgKhNmO1jlTt32q5ndrmYHp2KFOeSf // SIG // mYsrujfXnS4jsRL7kwWbwjAzp6Vyy/ctuovB9dhJesUy // SIG // GrsspZbZZGdl7WrkDFZf9249JaNwLXirzuJ2pcMueDXy // SIG // izc1A3MhfY5LZtZ1NzT2Vqj/sPLD85tCiOk/I3zZrNea // SIG // gkUzKXu8R+dETRAHJRJ+OIjUY/VqFxS5tmmMZP7uib8R // SIG // IHTO+VcKyDw8H98fppcDKBmRP3WSlVZz4o48Vby61k0e // SIG // GOLSEMs41e/EOeeU8MajJb6e5NNLoYrWmGMjcxWcagf2 // SIG // FnShghLlMIIS4QYKKwYBBAGCNwMDATGCEtEwghLNBgkq // SIG // hkiG9w0BBwKgghK+MIISugIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBUQYLKoZIhvcNAQkQAQSgggFABIIBPDCCATgC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // udEOJiQHBUvBCQksiKStlrMHblYKLK6vOlX9Ynt+iDUC // SIG // Bl4rT5yf1RgTMjAyMDAyMTMyMDAzNTguOTQ2WjAEgAIB // SIG // 9KCB0KSBzTCByjELMAkGA1UEBhMCVVMxCzAJBgNVBAgT // SIG // AldBMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN // SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1p // SIG // Y3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRl // SIG // ZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00 // SIG // QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l // SIG // LVN0YW1wIFNlcnZpY2Wggg48MIIE8TCCA9mgAwIBAgIT // SIG // MwAAAQ+AcvY6hwiIrQAAAAABDzANBgkqhkiG9w0BAQsF // SIG // ADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0x // SIG // OTEwMjMyMzE5MThaFw0yMTAxMjEyMzE5MThaMIHKMQsw // SIG // CQYDVQQGEwJVUzELMAkGA1UECBMCV0ExEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh // SIG // bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U // SIG // aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMG // SIG // A1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj // SIG // ZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB // SIG // AN9NOUCq3vOxleFiggg1zEFmB+XliNEbExvtmVCNQJ2t // SIG // zqT7zNpsd9nHTOW0hsfNLsk8LzxKCsICz8yYr0UHFcOu // SIG // cnTnSAoFmKegRAjcJIkRnDha58JPw7oUICZufkxqt61J // SIG // 2qA4riX5XP4E5UPQuKhNFq9fYJ6DiIlgZN07KVeJ5iuk // SIG // NN31GZOJQJiLhW7gQVlYmhnZhqlMVNhXvAhy4AhkoOiy // SIG // /4Rn/BUkvfFJrV+gBgJ//DyoRFvw1WJqWM4fZ8Tct/mh // SIG // B6D+P/jNWuYnvGKk/I03eaW3EntnVfIZDsf2Qu2axa8a // SIG // wDCXRBZVrllY/tS9dH6Izz0MP99VVO6dwzMCAwEAAaOC // SIG // ARswggEXMB0GA1UdDgQWBBTnlSGAGW1SxqAXlux2qsqW // SIG // 7xjlezAfBgNVHSMEGDAWgBTVYzpcijGQ80N7fEYbxTNo // SIG // WoVtVTBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js // SIG // Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N // SIG // aWNUaW1TdGFQQ0FfMjAxMC0wNy0wMS5jcmwwWgYIKwYB // SIG // BQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3 // SIG // Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1RpbVN0 // SIG // YVBDQV8yMDEwLTA3LTAxLmNydDAMBgNVHRMBAf8EAjAA // SIG // MBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEB // SIG // CwUAA4IBAQBQgrE2dxVaaaGkyyhWrcR5fZ+FhMsR4Mno // SIG // eIN3fNxu8SyiAV+m3vGryIGvhimE+qGCzrJlrIrk0Qzr // SIG // I5cTHsNho8ffYkQsodreRbPdWxeUgBSsmTkW9RdgRlLa // SIG // jc6DYXdEG8a1RAfN7hlH6ulII2K9G+Nli3sdA3/Pi5xa // SIG // JUMIll6r7I0KCAVNytYpbYWKPk2t5hw68GjHr3EfI1rt // SIG // +6naBKo7aHsfm2gg3ktD3myFG3wdxEYAtrKbhY6yNDk7 // SIG // 2z/jKksmzzjMpjacxAmNl7rjAQO4XlSQBlAGSvXLHUbQ // SIG // dI/xCwsZtcQFU/1uLma7bmq6gNW4HijzfZ4rBzM2Tdl+ // SIG // MIIGcTCCBFmgAwIBAgIKYQmBKgAAAAAAAjANBgkqhkiG // SIG // 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAG // SIG // A1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUg // SIG // QXV0aG9yaXR5IDIwMTAwHhcNMTAwNzAxMjEzNjU1WhcN // SIG // MjUwNzAxMjE0NjU1WjB8MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ // SIG // Q0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC // SIG // AQoCggEBAKkdDbx3EYo6IOz8E5f1+n9plGt0VBDVpQoA // SIG // goX77XxoSyxfxcPlYcJ2tz5mK1vwFVMnBDEfQRsalR3O // SIG // CROOfGEwWbEwRA/xYIiEVEMM1024OAizQt2TrNZzMFcm // SIG // gqNFDdDq9UeBzb8kYDJYYEbyWEeGMoQedGFnkV+BVLHP // SIG // k0ySwcSmXdFhE24oxhr5hoC732H8RsEnHSRnEnIaIYqv // SIG // S2SJUGKxXf13Hz3wV3WsvYpCTUBR0Q+cBj5nf/VmwAOW // SIG // RH7v0Ev9buWayrGo8noqCjHw2k4GkbaICDXoeByw6ZnN // SIG // POcvRLqn9NxkvaQBwSAJk3jN/LzAyURdXhacAQVPIk0C // SIG // AwEAAaOCAeYwggHiMBAGCSsGAQQBgjcVAQQDAgEAMB0G // SIG // A1UdDgQWBBTVYzpcijGQ80N7fEYbxTNoWoVtVTAZBgkr // SIG // BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC // SIG // AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV // SIG // 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug // SIG // SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtp // SIG // L2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0w // SIG // Ni0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF // SIG // BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp // SIG // L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy // SIG // dDCBoAYDVR0gAQH/BIGVMIGSMIGPBgkrBgEEAYI3LgMw // SIG // gYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0w // SIG // QAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AUABv // SIG // AGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0w // SIG // DQYJKoZIhvcNAQELBQADggIBAAfmiFEN4sbgmD+BcQM9 // SIG // naOhIW+z66bM9TG+zwXiqf76V20ZMLPCxWbJat/15/B4 // SIG // vceoniXj+bzta1RXCCtRgkQS+7lTjMz0YBKKdsxAQEGb // SIG // 3FwX/1z5Xhc1mCRWS3TvQhDIr79/xn/yN31aPxzymXlK // SIG // kVIArzgPF/UveYFl2am1a+THzvbKegBvSzBEJCI8z+0D // SIG // pZaPWSm8tv0E4XCfMkon/VWvL/625Y4zu2JfmttXQOnx // SIG // zplmkIz/amJ/3cVKC5Em4jnsGUpxY517IW3DnKOiPPp/ // SIG // fZZqkHimbdLhnPkd/DjYlPTGpQqWhqS9nhquBEKDuLWA // SIG // myI4ILUl5WTs9/S/fmNZJQ96LjlXdqJxqgaKD4kWumGn // SIG // Ecua2A5HmoDF0M2n0O99g/DhO3EJ3110mCIIYdqwUB5v // SIG // vfHhAN/nMQekkzr3ZUd46PioSKv33nJ+YWtvd6mBy6cJ // SIG // rDm77MbL2IK0cs0d9LiFAR6A+xuJKlQ5slvayA1VmXqH // SIG // czsI5pgt6o3gMy4SKfXAL1QnIffIrE7aKLixqduWsqdC // SIG // osnPGUFN4Ib5KpqjEWYw07t0MkvfY3v1mYovG8chr1m1 // SIG // rtxEPJdQcdeh0sVV42neV8HR3jDA/czmTfsNv11P6Z0e // SIG // GTgvvM9YBS7vDaBQNdrvCScc1bN+NR4Iuto229Nfj950 // SIG // iEkSoYICzjCCAjcCAQEwgfihgdCkgc0wgcoxCzAJBgNV // SIG // BAYTAlVTMQswCQYDVQQIEwJXQTEQMA4GA1UEBxMHUmVk // SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 // SIG // aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP // SIG // cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxl // SIG // cyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQD // SIG // ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK // SIG // AQEwBwYFKw4DAhoDFQAkQbtCn1OUHRZ527SgkkF6oWS3 // SIG // aaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwMA0GCSqGSIb3DQEBBQUAAgUA4e+DDjAiGA8yMDIw // SIG // MDIxMzE2MTA1NFoYDzIwMjAwMjE0MTYxMDU0WjB3MD0G // SIG // CisGAQQBhFkKBAExLzAtMAoCBQDh74MOAgEAMAoCAQAC // SIG // AhUGAgH/MAcCAQACAhG+MAoCBQDh8NSOAgEAMDYGCisG // SIG // AQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA // SIG // AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQAD // SIG // gYEA1VnpFElZ5HOIzwe4jBBL1hozuKU7If2+EaOeqXyS // SIG // mkpYAm/TVeNgmCeA9dKy51dlPZkNbEjmrO3ZxUcQLGxY // SIG // VBhrblEOcOXYFRxkrzqfa242kRQaTQ5ARgTmOH/gtqJW // SIG // zjeoupxr3fq9DswJQHSt6zxbk0O3VE1j6kfFUGUoVhUx // SIG // ggMNMIIDCQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ // SIG // Q0EgMjAxMAITMwAAAQ+AcvY6hwiIrQAAAAABDzANBglg // SIG // hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqG // SIG // SIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCFNN7kSMJg // SIG // tdUCTjPvnvYQchLx2L1pSZJdFPx3RMrc5zCB+gYLKoZI // SIG // hvcNAQkQAi8xgeowgecwgeQwgb0EID+avQ55aC0UbPKn // SIG // QQxb1WtEFuC2S/fQ3rMU3vB0dD6OMIGYMIGApH4wfDEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAEPgHL2 // SIG // OocIiK0AAAAAAQ8wIgQgaIt84qwj7ePLmFfsDPSMVtgn // SIG // xPuUT7dTa39vEg2SA6kwDQYJKoZIhvcNAQELBQAEggEA // SIG // xtKIZf/Ds4mUloq5FnTsiORLtnuagXm10zbCEJJ9Oygj // SIG // M+PwKOFFkaJUQlrm2GWUe+Ro6i7hs8bkReO2k8pMOyS+ // SIG // Yqd3eWiKTubLEbI2qkCPwlpCy9xGAFg74LK3BufNXdYq // SIG // A5gG8Aop6/AhiZz+HWJ3gS6WYfuuY7Tnb4cpV0yDcEmD // SIG // EYzugvg6/fB68mtymkEUCEgSLQPCglZq0RE+u+CPrAuC // SIG // 6LaKuL9wt3lrvSPAFxuhTBdR2TDTdEXJfzK5SnOLY04x // SIG // 2T/X6IrGr+p+b3kaYxCZtkvYomy8vjTdawidc/1UVwJj // SIG // hmDXZla1js0GTbmZibTRmIqTP4TTnhNgBw== // SIG // End signature block
combined_dataset/train/non-malicious/1614.ps1
1614.ps1
function Get-BitLockerKey { param ( [string]$comp = $env:COMPUTERNAME ) if (!$comp.endswith('$')) { $comp += '$' } $compsearcher = [adsisearcher]"samaccountname=$comp" $compsearcher.PageSize = 200 $compsearcher.PropertiesToLoad.Add('name') | Out-Null $compobj = $compsearcher.FindOne().Properties if (!$compobj) { throw "$comp not found" } $keysearcher = [adsisearcher]'objectclass=msFVE-RecoveryInformation' $keysearcher.SearchRoot = [string]$compobj.adspath.trim() $keysearcher.PageSize = 200 $keysearcher.PropertiesToLoad.AddRange(('name', 'msFVE-RecoveryPassword')) $keys = $keysearcher.FindOne().Properties if ($keys) { $keys | % { try{ rv matches -ea stop }catch{} ('' + $_.name) -match '^([^\{]+)\{([^\}]+)' | Out-Null $date = $Matches[1] $pwid = $Matches[2] New-Object psobject -Property @{ Name = [string]$compobj.name Date = $date PasswordID = $pwid BitLockerKey = [string]$_.'msfve-recoverypassword' } | select name, date, passwordid, bitlockerkey } } else { New-Object psobject -Property @{ Name = [string]$compobj.name Date = '' PasswordID = '' BitLockerKey = '' } | select name, date, passwordid, bitlockerkey } }
combined_dataset/train/non-malicious/sample_43_28.ps1
sample_43_28.ps1
# -------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All Rights Reserved. # Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only. # Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services. # Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. # The entire risk arising out of the use or performance of the sample code remains with you. # In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever # (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) # arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages. # --------------------------------------------------------------- Import-Module -Name "$PSScriptRoot\..\Common\RoleHelpers.psm1" -DisableNameChecking <# .Synopsis Function to update ACL on the OS VHD file for physical host. ACL = only SYSTEM & Administrators have full access permission .Parameter Session PSSession of the physical host which requires ACL reset on OS VHD file .Example Reset-PhysicalHostOsVhdAcl -Session $session1 This will find its OS vhd file path and reset ACL #> function Reset-PhysicalHostOsVhdAcl { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [System.Management.Automation.Runspaces.PSSession] $Session ) Trace-Execution "Updating OS VHD file ACL on physical machine: $PhysicalHostName" Trace-Execution "Getting vhd path" $bootVhdPath = Invoke-Command -Session $Session -ScriptBlock { # Use bcdedit to query current active boot manager => If OS is botted from a vhd, then parse vhd full path name $bcdedit = bcdedit /enum "{current}" /v $matchRegex = "osdevice\s*vhd=([^,]+),locate=\w*" # e.g.: osdevice vhd=[D:]\WinSrvCoreForHost.vhdx,locate=custom:22000002 $osdeviceVhd = $bcdedit -join "`n" -match $matchRegex if(-not $osdeviceVhd) { Trace-Warning "This OS is not configured to boot from VHD" } elseif($osdeviceVhd.count -gt 1) { Trace-Warning "Found multiple osdevice records from bcdedit /enum {current} /v. Cannot decide which is the target vhd" } else { $vhdPath = $Matches[1] -replace "[\[\]]","" # [D:]\WinSrvCoreForHost.vhdx return $vhdPath } return $null } if($bootVhdPath) { $testPathResult = Invoke-Command -Session $Session -ScriptBlock { Test-Path $using:bootVhdPath } if($testPathResult) { Trace-Execution "Vhd path: $bootVhdPath" $accountAllowed = @("SYSTEM","Administrators") Trace-Execution "Resetting ACL to allow only these accounts: $($accountAllowed -join ",")" Invoke-Command -Session $Session -ScriptBlock { $hostOsVhdAcl = Get-Acl $using:bootVhdPath # Disable permission inheritance $hostOsVhdAcl.SetAccessRuleProtection($True, $False) # Remove all existing access rules $hostOsVhdAcl.Access | % { $hostOsVhdAcl.RemoveAccessRule($_) } | out-null foreach($account in $using:accountAllowed ) { Trace-Execution "Give FULL Control to account $account" -Verbose $newAccessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($account, "FullControl", "Allow") $hostOsVhdAcl.SetAccessRule($newAccessRule) } Set-Acl -Path $using:bootVhdPath -AclObject $hostOsVhdAcl } } else { Trace-Warning "Host OS vhd file $bootVhdPath doesn't exist" } } else { Trace-Warning "Did not find path of host vhd" } Trace-Execution "Completed updating OS VHD file ACL on physical machine: $PhysicalHostName" } Export-ModuleMember -Function Reset-PhysicalHostOsVhdAcl # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBjRX3JrUoi4oHA # Ty8XuMdfwmiVgjM7uetktdiEdpGqXKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEB/mxKsnRtPiE+hx9SPhBLj # QfUK1VC2Ckmz4jpkdz6hMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEGvtaDNdnVrH+q8i2aKAhVXIMnOHvdkJ39SHVyHoLp5H5YRsM8KKvjer # ie5G8hm0KuZK9Or6O7SAEpmchhr0pllhkfZEhMaYPuOyLZjxhppo7dFrQRyTEKNj # LLmnsZqWcfy+EaUy58pD0zBAPIxTyNBYRY+undUrNjLRm5CNzthsUhpM+oUbhgbw # hGkXhJhQCb3X4Pi30ARKxtraQOlCiIRSAlDkzbm4CoSt0FNuBGaXBwjrOYTNSObl # F+8f6SQheYtImD+4CVFhu5MShWyNONUySbEttmt2z/nn6ancsLFhiJ0gvfBpF9Sd # iQsFFpJgzgWq4O+U7WtS95pduP7496GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBoNB2H7nW+YGfJYuuo7OofwD0FA3SEhcXZ+Hjq68qi0gIGZbwSmWgK # GBMyMDI0MDIxMjE0MDUyNy41NTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy # MloYDzIwMjQwMjEzMDk1MTIyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGia # AgEAMAoCAQACAhA5AgH/MAcCAQACAhP8MAoCBQDpdboaAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBADQeYBN/t7KLX5/X88WTUfxjS80bxBfilJfF3AIjcI/2 # UQJXIfqFIvEqMd1jHT32G0+4Uuuo+b8jW+39m8VA6VJBIQrSlg9x3sH+Kt931BSw # 8yGtj1H6enwRjiR4ebfz+b62vA8RlyHp1PPyrI3x1QYIsocJLxC6Yly83/4mXMJI # MIjLouTLlSj6puEmDZD94kB6S91uzyJwjtLWGvHiiaX2FTVVYMguGaWbcfJ3d0O4 # uF0aXbJ+kNqY3bVpGzoIFtcnoKcPaBBAw7HmuVi1b4qIxYYSKvGPDKIA9WKQxRL/ # wQJQqTcjWrf9oDFPbLLcu972Lw5g+ML43RqPjdhCjz0xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBcMLHbJzBwhHvGPa9Ya5Ekuvmpu5j4+ldAew7fJII7 # ezCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgiLrL13zZQgm581jPxPYeOTTO # j+MDbj3O5P8XwVvjtHMwDQYJKoZIhvcNAQELBQAEggIA8011Jdcw6Gy9C7UXXqe4 # q8+y6xE4zgrJGUocn9FOcz8dMOGtFEfBigqXGhxheLMSa2H8NWUXWLj7qZT8Jdnv # 592NGyIis+CrJULy9lSz5RPVTvSnQMPTq3fTRE4gJK/QSlhJp/k5S+5yjUlxnqdh # KfEW5H3mLQe7NWgLBgH5ukpsw8WqVXAZYZVtlFNpX8md/WlEsvp1JxRihZtb0cN4 # WHdjeWoDZsCz/0txN0GrH7Iu65LhpMLxQSmoAfGnAY+P/+dxFUpkBdygUScArZHA # ufI/q/TAT+n3GIjI1MVLusSmKIBrf3HJ8FFeituq+IUxIYW3krMFOVz5MJ/qVXqD # VyHsU8BfK1FgJ7bS77XWScleQ2jE0ZANlSORYjrpODXycz0zHWZI98U10nLNjHdw # 4j7meZPteU2DLLDc+D0JAOdMJUPbnJxq9wh9ARLQAqDG964kiFiZhaIbT9Een2ww # CULVpA8WKixlLRzWZjyUuIwgBt0tXG9m+vXJXCTaJRIuDwDHxWaCptcv/FY5b8Uf # olB4bbzkronBciQNGZX3EhvMOVUzt8aoeNRTYI5IrL+q40FTMrDr9cTWLGecAvdz # tzPKoOJFCJ/fkZvISmYVpvYh7osSF9r5/BQjFUiCdwfBT6Yu6elbf5eHc8AqmDvx # w+QvDYd6NY8Dh0TgOs99be4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_38_0.ps1
sample_38_0.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '74.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4169.ps1
4169.ps1
cls Set-Variable -Name a -Scope Global -Force Set-Variable -Name Output -Scope Global -Force Function AddRemovePrograms($KeyName, $DisplayName, $Version){ Set-Variable -Name AddRemKey -Value "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" -Scope Local -Force New-Item -Path $AddRemKey -Name $KeyName –Force New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayName -Value $DisplayName -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayVersion -Value $Version -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name UninstallString -Value " " -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name Publisher -Value "Gresham, Smith and Partners" -PropertyType String New-ItemProperty -Path $AddRemKey"\"$KeyName -Name DisplayIcon -Value "c:\windows\GSPBox_Icon.bmp" -PropertyType String Remove-Variable -Name AddRemKey -Scope Local -Force } Invoke-Command {dism.exe /online /disable-feature /featurename:MediaCenter /norestart} $a = Invoke-Command {dism.exe /online /get-featureinfo /featurename:MediaCenter} $Output = $a | Select-String "State : Disabled" Write-Host $Output If ($Output -like "State : Disabled"){ AddRemovePrograms "MediaCenter" "MediaCenter" "Disabled" } Remove-Variable -Name a -Scope Global -Force Remove-Variable -Name Output -Scope Global -Force
combined_dataset/train/non-malicious/sample_50_70.ps1
sample_50_70.ps1
# # Module manifest for module 'OCI.PSModules.Oce' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oce.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '044c91ad-abeb-41a8-9bf6-cf7d46964003' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oce Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oce.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOceInstance', 'Get-OCIOceInstancesList', 'Get-OCIOceWorkRequest', 'Get-OCIOceWorkRequestErrorsList', 'Get-OCIOceWorkRequestLogsList', 'Get-OCIOceWorkRequestsList', 'Move-OCIOceInstanceCompartment', 'New-OCIOceInstance', 'Remove-OCIOceInstance', 'Update-OCIOceInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oce' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_19_15.ps1
sample_19_15.ps1
@{ RootModule = 'PSReadLine.psm1' NestedModules = @("Microsoft.PowerShell.PSReadLine2.dll") ModuleVersion = '2.4.0' GUID = '5714753b-2afd-4492-a5fd-01d9e2cff8b5' Author = 'Microsoft Corporation' CompanyName = 'Microsoft Corporation' Copyright = '(c) Microsoft Corporation. All rights reserved.' Description = 'Great command line editing in the PowerShell console host' PowerShellVersion = '5.1' DotNetFrameworkVersion = '4.6.2' CLRVersion = '4.0.0' FormatsToProcess = 'PSReadLine.format.ps1xml' AliasesToExport = @() FunctionsToExport = 'PSConsoleHostReadLine' CmdletsToExport = 'Get-PSReadLineKeyHandler','Set-PSReadLineKeyHandler','Remove-PSReadLineKeyHandler', 'Get-PSReadLineOption','Set-PSReadLineOption' HelpInfoURI = 'https://aka.ms/powershell72-help' PrivateData = @{ PSData = @{ Prerelease = 'beta0'; ProjectUri = 'https://github.com/PowerShell/PSReadLine' } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD8jCcxtMB9MvID # TIJI5VBcTScAPwUO8aPHM9nZ5Pjdt6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIANAYUKeX4onabKBVRoGbGn1 # 48p1mQ5u12BmWQ+fKKKlMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOgdVulTL1pfwww6kwnaNWxUK6KR5rBktulY0Ycxh58qBIWOhYVJjE/+1 # MYC3Wo8h1tBLKikl+hOcL/PGKeVU+/tz9O5wNsINHDwGCZRrJUaNl6MiDRS8l29Y # yEu1YPxDbTJ1ZGRNfzeRpQJYfMoR+D7EzxB0xP/UWnlBWDLTsKLV15vMVYfKr2zQ # 62OEk3zmQh/zwTRUcdzpw1XUMliClJ86O5xsQJ4sNsx/Yx6zgmPP36vXY7uL12W0 # BPtwFxTiAI7xhVdEt8UDLMemKAsjm786F+kKSaqHDjj/1QWlxguw4ikItcRMCrON # Xb+TVsLXORumNC4UXg6eP/8Sja2QX6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAjiUhFAao0OcWRjlmpiDN7+6iiLGBdMZYTNNq3veFuJQIGZfyDOu7/ # GBMyMDI0MDQxNjIxMDgzMy41NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnJRdwwIhgPMjAyNDA0MTcwMjQ1NDhaGA8yMDI0MDQxODAyNDU0OFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6clF3AIBADAHAgEAAgIHyTAHAgEAAgISuzAKAgUA # 6cqXXAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAALa47B008Gj/WlPeFRf # Zy5y11xY5b2qWtqT6WMLEh4d650CDSWJ2/Ei5r1oRCUp9f8ffoxJyzLDm6NEBvnP # 4UVGaBE5WK8W8g68Gk7dpmOcHt4zCP3ylEQLQFLIXQzFCHOrQLW+ArYPhrdzYyH6 # T0zJV04knCFIBFLSSjMDmB2vMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgrT2R+z/0ckD2dJ8E/va0hiee5phcd5N4/Re7PoN9ONowgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIGrL99szCpBl7kSgVwTECzsJphQbtoULSl0lrbArOjvN # MA0GCSqGSIb3DQEBCwUABIICAKJI+6kpC7i3S8JXpNWH+dLu0j0iySil/bQaeVty # 4yuMNFr2ee9JnSQihZJfJ6YCS56J9/k8MFQlN6tSKImsBxeiH+1dlzLYMSUvofFE # 13FK3ZYCTceJMqSAc62IxvaHdH5uwCV7Sy4de7Td42RaXa9E76nJnRnzZOZ0vxKI # q5MLN1dRpKTEQA3eTAqlV0O/2JE6BGQjxueD2V+DF3+iqd2S7khYs+brgwY7K9bv # c3kwcHEiETGgLCGAdwE09+OjAyZpxwbNxI7UN6QfNxk0UNJhAF/EZgn35GdZ4b2F # gsiNvgHfBaVWCNAaMmr6fLdU5OjYOE8ZMpIJaoiyBMkvbvvPFfOz1V6YGStfaMK0 # ascmWEVKU3f6OgvkqkA4KtqWVZ5gAhV64/UsYUF7W4H/b0vC3Izh17Y7TjHjINQO # x4hOpZHuOlvAX0qDM+AE/32QlCloUdIPsuIWPJCh1n4g50qb9KjTL5rqpSnJhuX7 # vJoLok+w2T/DWnpoxyzMt+8ydQeSyVRstzvytifXLz8XV1LRYew+LtNLyMLL5A0s # FvSBPmqG1mZNe2qMEQQ+fPA6Ex93Stsc4EniV0C4aXlWcjzYea8u+iYFvA1ENH2j # HF6nV3teZRtUl50SP4BG1i3N3QwWyRYcLgNxYpLkqBuBgCOluaIM3fb2pSG9RaKE # jxH+ # SIG # End signature block
combined_dataset/train/non-malicious/sample_14_55.ps1
sample_14_55.ps1
# --------------------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # --------------------------------------------------------------------------------------------- # Prevent installing more than once per session if (Test-Path variable:global:__VSCodeOriginalPrompt) { return; } # Disable shell integration when the language mode is restricted if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") { return; } $Global:__VSCodeOriginalPrompt = $function:Prompt $Global:__LastHistoryId = -1 # Store the nonce in script scope and unset the global $Nonce = $env:VSCODE_NONCE $env:VSCODE_NONCE = $null if ($env:VSCODE_ENV_REPLACE) { $Split = $env:VSCODE_ENV_REPLACE.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_REPLACE = $null } if ($env:VSCODE_ENV_PREPEND) { $Split = $env:VSCODE_ENV_PREPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0])) } $env:VSCODE_ENV_PREPEND = $null } if ($env:VSCODE_ENV_APPEND) { $Split = $env:VSCODE_ENV_APPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_APPEND = $null } function Global:__VSCode-Escape-Value([string]$value) { # NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`. # Replace any non-alphanumeric characters. [regex]::Replace($value, '[\\\n;]', { param($match) # Encode the (ascii) matches as `\x<hex>` -Join ( [System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ } ) }) } function Global:Prompt() { $FakeCode = [int]!$global:? # NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an # error when $LastHistoryEntry is null, and is not otherwise useful. Set-StrictMode -Off $LastHistoryEntry = Get-History -Count 1 # Skip finishing the command if the first command has not yet started if ($Global:__LastHistoryId -ne -1) { if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) { # Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command) $Result = "$([char]0x1b)]633;E`a" $Result += "$([char]0x1b)]633;D`a" } else { # Command finished command line # OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST $Result = "$([char]0x1b)]633;E;" # Sanitize the command line to ensure it can get transferred to the terminal and can be parsed # correctly. This isn't entirely safe but good for most cases, it's important for the Pt parameter # to only be composed of _printable_ characters as per the spec. if ($LastHistoryEntry.CommandLine) { $CommandLine = $LastHistoryEntry.CommandLine } else { $CommandLine = "" } $Result += $(__VSCode-Escape-Value $CommandLine) $Result += ";$Nonce" $Result += "`a" # Command finished exit code # OSC 633 ; D [; <ExitCode>] ST $Result += "$([char]0x1b)]633;D;$FakeCode`a" } } # Prompt started # OSC 633 ; A ST $Result += "$([char]0x1b)]633;A`a" # Current working directory # OSC 633 ; <Property>=<Value> ST $Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" } # Before running the original prompt, put $? back to what it was: if ($FakeCode -ne 0) { Write-Error "failure" -ea ignore } # Run the original prompt $Result += $Global:__VSCodeOriginalPrompt.Invoke() # Write command started $Result += "$([char]0x1b)]633;B`a" $Global:__LastHistoryId = $LastHistoryEntry.Id return $Result } # Only send the command executed sequence when PSReadLine is loaded, if not shell integration should # still work thanks to the command line sequence if (Get-Module -Name PSReadLine) { $__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine function Global:PSConsoleHostReadLine { $tmp = $__VSCodeOriginalPSConsoleHostReadLine.Invoke() # Write command executed sequence directly to Console to avoid the new line from Write-Host [Console]::Write("$([char]0x1b)]633;C`a") $tmp } } # Set IsWindows property if ($PSVersionTable.PSVersion -lt "6.0") { # Windows PowerShell is only available on Windows [Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a") } else { [Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a") } # Set always on key handlers which map to default VS Code keybindings function Set-MappedKeyHandler { param ([string[]] $Chord, [string[]]$Sequence) try { $Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1 } catch [System.Management.Automation.ParameterBindingException] { # PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord, # so we check what's bound and filter it. $Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1 } if ($Handler) { Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function } } $Global:__VSCodeHaltCompletions = $false function Set-MappedKeyHandlers { Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a' Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b' Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c' Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d' # Conditionally enable suggestions if ($env:VSCODE_SUGGEST -eq '1') { Remove-Item Env:VSCODE_SUGGEST # VS Code send completions request (may override Ctrl+Spacebar) Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock { Send-Completions } # Suggest trigger characters Set-PSReadLineKeyHandler -Chord "-" -ScriptBlock { [Microsoft.PowerShell.PSConsoleReadLine]::Insert("-") if (!$Global:__VSCodeHaltCompletions) { Send-Completions } } Set-PSReadLineKeyHandler -Chord 'F12,y' -ScriptBlock { $Global:__VSCodeHaltCompletions = $true } Set-PSReadLineKeyHandler -Chord 'F12,z' -ScriptBlock { $Global:__VSCodeHaltCompletions = $false } } } function Send-Completions { $commandLine = "" $cursorIndex = 0 # TODO: Since fuzzy matching exists, should completions be provided only for character after the # last space and then filter on the client side? That would let you trigger ctrl+space # anywhere on a word and have full completions available [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex) $completionPrefix = $commandLine # Get completions $result = "`e]633;Completions" if ($completionPrefix.Length -gt 0) { # Get and send completions $completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex if ($null -ne $completions.CompletionMatches) { $result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);" $result += $completions.CompletionMatches | ConvertTo-Json -Compress } } $result += "`a" Write-Host -NoNewLine $result } # Register key handlers if PSReadLine is available if (Get-Module -Name PSReadLine) { Set-MappedKeyHandlers }
combined_dataset/train/non-malicious/1846.ps1
1846.ps1
Describe 'New-WinEvent' -Tags "CI" { Context "New-WinEvent tests" { BeforeAll { $originalDefaultParameterValues = $PSDefaultParameterValues.Clone() if ( ! $IsWindows ) { $PSDefaultParameterValues["it:skip"] = $true } $ProviderName = 'Microsoft-Windows-PowerShell' $SimpleEventId = 40962 $ComplexEventId = 32868 } AfterAll { $global:PSDefaultParameterValues = $originalDefaultParameterValues } It 'Simple New-WinEvent without any payload' { New-WinEvent -ProviderName $ProviderName -Id $SimpleEventId -Version 1 $filter = @{ ProviderName = $ProviderName; Id = $SimpleEventId} (Get-WinEvent -filterHashtable $filter).Count | Should -BeGreaterThan 0 } It 'No provider found error' { { New-WinEvent -ProviderName NonExistingProvider -Id 0 } | Should -Throw -ErrorId 'System.ArgumentException,Microsoft.PowerShell.Commands.NewWinEventCommand' } It 'EmptyProviderName error' { { New-WinEvent -ProviderName $null -Id 0 } | Should -Throw -ErrorId 'ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.NewWinEventCommand' } It 'IncorrectEventId error' { { New-WinEvent $ProviderName -Id 999999 } | Should -Throw -ErrorId 'Microsoft.PowerShell.Commands.EventWriteException,Microsoft.PowerShell.Commands.NewWinEventCommand' } It 'IncorrectEventVersion error' { { New-WinEvent -ProviderName $ProviderName -Id $SimpleEventId -Version 99 } | Should -Throw -ErrorId 'Microsoft.PowerShell.Commands.EventWriteException,Microsoft.PowerShell.Commands.NewWinEventCommand' } It 'PayloadMismatch error' { $logPath = join-path $TestDrive 'testlog1.txt' New-WinEvent -ProviderName $ProviderName -Id $ComplexEventId *> $logPath Get-Content $logPath -Raw | Should -Match 'data name="FragmentPayload"' } } }
combined_dataset/train/non-malicious/sample_65_24.ps1
sample_65_24.ps1
<# .DESCRIPTION Support Enter-SmePSSession to specified computer as specified username. Password will be promoted. - Enabled by adding "%ProgramFiles%\Windows Admin Center\PowerShell\Modules" to $env:PSModulePath #> Function Enter-SmePSSession { <# .SYNOPSIS Remote logon to PowerShell session to a computer with user name and password. .DESCRIPTION Remote logon to PowerShell session to a computer with user name and password. It overrides Get-Credential cmdlet to supress native credential UI. #> Param( [Parameter(Mandatory = $True, Position = 0)] [string]$Computer, [Parameter(Mandatory = $True, Position = 1)] [string]$UserName, [Parameter(Mandatory = $True, Position = 2)] [string]$AssemblyPath, [Parameter(Mandatory = $False, Position = 3)] [bool]$ManageAs, [Parameter(Mandatory = $False, Position = 4)] [bool]$UseHttps = $False, [Parameter(Mandatory = $False, Position = 5)] [string]$UserNameLabel = "Username", [Parameter(Mandatory = $False, Position = 6)] [string]$PromptLabel = "Password", [Parameter(Mandatory = $False, Position = 7)] [string]$Message = "Connecting ...", [Parameter(Mandatory = $False, Position = 8)] [string]$EncryptedPassword = $null ) $GetCredentialScript = { # passing and remember labels. $Global:__MsftSmeUserNameLabel = $args[0] $Global:__MsftSmePromptLabel = $args[1] <# .SYNOPSIS Gets a credential object based on a user name and password. .DESCRIPTION Gets a credential object based on a user name and password. (Use Microsoft.PowerShell.Security\Get-Credential to use native Get-Credential CmdLet) #> Function Get-Credential { [CmdletBinding(DefaultParametersetName = 'Prompt')] Param( [Parameter(Mandatory = $True, ParameterSetName = 'Creds')] [PSCredential]$Credential, [Parameter(Mandatory = $False, ParameterSetName = 'Prompt')] [string]$UserName = $null, [Parameter(Mandatory = $False, ParameterSetName = 'Prompt')] [string]$Message = $null ) if ($Credential) { return Microsoft.PowerShell.Security\Get-Credential -Credential $Credential } if ($Message) { Write-Host $Message } if ($UserName) { Write-Host $UserName } else { $UserName = Read-Host -Prompt $Global:__MsftSmeUserNameLabel } $password = Read-Host -AsSecureString -Prompt $Global:__MsftSmePromptLabel $Credential = New-Object System.Management.Automation.PSCredential $UserName, $password return $Credential } } function DecryptPassword($password) { $assemblyPath = $AssemblyPath + "\Microsoft.ManagementExperience.Common.dll" Add-Type -Path $assemblyPath try { $passwordString = [Microsoft.ManagementExperience.PtyInterop.PtyStreamHandler]::Unprotect($password) $passwordSecureString = ConvertTo-SecureString $passwordString -AsPlainText -Force } catch { return $null } return $passwordSecureString } function CreateSession($userName, $password) { if ([System.string]::IsNullOrEmpty($userName)) { throw "Missing username!" } if ($password) { $Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $userName, $password $Session = New-PSSession -ComputerName $Computer -UseSSL:$UseHttps -Credential $Credential -ErrorAction Stop } else { $Session = New-PSSession -ComputerName $Computer -UseSSL:$UseHttps -ErrorAction Stop } Enter-PSSession -Session $session -ErrorAction Stop Invoke-Command -Session $session -ScriptBlock $GetCredentialScript -ArgumentList $UserNameLabel, $PromptLabel } function EnterSessionAskPassword($askUserName) { if ($ManageAs -and $EncryptedPassword) { $password = DecryptPassword $EncryptedPassword } try { CreateSession $UserName $password } catch { foreach ($i in 0, 1, 2) { $enterSession = $false try { if ($askUserName) { $UserName = Read-Host -Prompt $UserNameLabel if (($UserName.IndexOf("\") -lt 0) -and ($UserName.IndexOf("@") -lt 0)) { $UserName = ".\$UserName"; } } $password = Read-Host -AsSecureString -Prompt $PromptLabel } finally { if (($null -ne $UserName) -and ($null -ne $password)) { $enterSession = $true } } if ($enterSession) { try { CreateSession $UserName $password break } catch { Write-Host -ForegroundColor Yellow $_.Exception.Message } } } } } Clear-Host function Global:Prompt { $LocalName = [System.Environment]::MachineName Write-Host -ForegroundColor Yellow -NoNewline "[GW $LocalName] $pwd>"; return " " } $askUserName = $false if ($UserName -eq "<NA>") { $UserName = $null $askUserName = $true } Write-Host -ForegroundColor Cyan $Message EnterSessionAskPassword $askUserName } Function Enter-SmeSshSession { <# .SYNOPSIS Remote logon as an SSH session to a computer. .DESCRIPTION Remote logon as an SSH session to a computer with given user name, host name and, optional private key and SSH arguments. .PARAMETER Computer Remote host .PARAMETER UserName SSH user name .PARAMETER SshKeyPath Path to SSH private key .PARAMETER SshOptions SSH Options excluding the option for the private key #> Param( [Parameter(Mandatory = $True)] [string]$Computer, [Parameter(Mandatory = $True)] [string]$UserName, [Parameter(Mandatory = $False)] [string]$SshKeyPath, [Parameter(Mandatory = $False)] [string]$SshOptions ) try { $ssh = Get-Command 'ssh.exe' -ErrorAction Stop $command = $ssh.Name if (-not [string]::IsNullOrEmpty($SshOptions)) { $command += " " + $SshOptions } if (-not [string]::IsNullOrEmpty($SshKeyPath)) { $command += " -i" + $SshKeyPath } $command += " " + $UserName + "@" + $Computer Invoke-Expression $command -ErrorAction Stop } catch { Write-Host -ForegroundColor Yellow $_.Exception.Message } finally { # triggered when user types exit if (Test-Path $SshKeyPath) { Remove-Item -Force $SshKeyPath } Exit } } Export-ModuleMember Enter-SmePSSession Export-ModuleMember Enter-SmeSshSession # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAlJNCB2F/yR4f6 # 80E0WFoyleU2O9OpMHuiSz9la5cY7aCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOpa # 4xFKcjcNX9KsKYvX42FszbGx1e90TFcIoKcWoaBFMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAtn0N8XN+xtQJu0U30J1LLYo98KcmyHqoy0E2 # wF5cF4lT9rZLEMJ0drhwN/dsTqCTMjVi9T3hnz6N0+ADHxiSO/IZFlcCd07O8fmn # Ucf2QttoHBI1pFo7nicTYH5T8m7sPWNmjQYH/sxxuFIM8+RWdi8InP7sT06l0k7t # qHg/zDqz2mtuqfFJaENyHAzKdxKCp2ARuQ5dcnz3rLy9+MHJJUePWQEyD/3XKdpI # qNK32azGPAM/TkNbwbGt2fczHEgM9kxtI3jUEStELO6ud+rlKw1lT075/JTew2fH # K7E200R5siA2lS4IXHbj9LfphL/2m8Sfgzz+k5wOEnnZDy+MBqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDeet306F5qDmGY0Y8rhctUZlKIj3KWvoPk # HgFu3B+eVwIGZpVePjr4GBMyMDI0MDcyMzIxNTcxMy43NDhaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6kpoEDAi # GA8yMDI0MDcyMzE3MzQwOFoYDzIwMjQwNzI0MTczNDA4WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqSmgQAgEAMAcCAQACAg3rMAcCAQACAhP2MAoCBQDqS7mQAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAvMaYZ2Qj5Rq/gxQVLeALLujeLO # b3X1q5lfRdSmz19wWR1qEyi49/MwAAC2kmleHa13gxePBsn5DstZItK+AwxdKJyR # rcrVSCFsa9a8SmNOohnZeJMjbSRZMt1IfMbB4tXq/iLEJqvV699l7HoWNSO0geR2 # h28oFq2sqDcNi/iNlqSP6OuXKU9ebUgmHtZPSMx+SweAoiFlq/EINUbqPVawgMc8 # fjCLH1svEKZ/w04LduhLfCm+xcO+n4SY/IQhujfbhCze9eC+jx1xKf1pPD73/2jN # y3d88ITNmWifKjw2NuTe29U2WrVNN8l/XacyJOqGTq8rYgnKbQi44WsU26IxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAecu # jy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDLjTzwDLT2+t60fnOwCZAg6yK9 # neuoOtkZgPwCvvFbZjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2XQ12 # aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQg1VVvBncX # ZWk9fTuHgJlXGlGP5TmS8UkbxtgIfByUokMwDQYJKoZIhvcNAQELBQAEggIAiIXs # FvgNT2wbInEKNCEtg6l2LxosWOkCrqe9g99hDrBRE8u4LNGggBS1klDiatYU+jfs # Ar+j9T4mObFl+BoFfF5dgGclZMnoaIhXf0nY6B2YUw14fXKu7qsR1L+NU/9DqMai # YEX6Qm74gdQvyLCX3sK3s+r58qCAHL82AjmMDTJwG0VPjEZPhb6M5E/DeIfeqn2b # b6w7HMgH0y341H3KPPUBLuHtXvPyoIWgtGchVMhFNU2fP8Ipo5WW6m/1QM+l+xPZ # W+77SPGE2QodGsDKNwUzfR3w/L6XO57BJAmL4DRM9PwtLgdpp1mqgAVLIUBxsMJS # kDq73Gt8JdX/8kxQE/fkwVWww0MsLcD+VmdZ6s/qKw45SHS/34chSkAkqTpCKCwC # 3ReY+9/5V0btcdm+Kht3aYqrlwfngh5bU6afVoc8hXIW6ZAi/CdXtbQ/i4g2TzG5 # femAnsk0ltoA7NOEK+q38GmYL2G7QDlE35rmBEc+pUmTWRzLZOsRjQsWLn4EsYCr # /Pjcte4zMmrVKeKEJhzic72MMeiokNQaa/hogxLVn1sWVZSzrmCsZkrfbOknDJpB # XNiCc7I7FcugF77nnOy2JtLRAZ2b920i1+hrOR2JhyvQAvLwfxjvGBvIwVZqeU4U # uhq3mwV50HFwur1jceC2GncFrgrxVaWrwJU6fw4= # SIG # End signature block
combined_dataset/train/non-malicious/34acf364-c8a0-4ea5-8002-1b134280c15b.ps1
34acf364-c8a0-4ea5-8002-1b134280c15b.ps1
# # simple example using a hash to parse CAS Connect Logs # # after using the get-CASConnectLogEntries.ps1 to collect the log information # this script runs thru those files and counts Cached vs Classic # # # the directory where you keep these "cas connect logs" - change to fit your needs $Script:CasLogUNCDir ='\\\\<server>\\<drv>\\Web\\Data\\CASConnectLogs' # Hast Table to hold results : LegacyExchangeDN-Clientversion, Mode $Clients = @{} foreach ($Line in (gci $Script:CasLogUNCDir | gc) ) { #legacyExchangeDN $LEDN = $Line.Split(",")[3] #Outlook version $OLVER = $Line.Split(",")[6] #ClientMode $Mode = $Line.Split(",")[7] if(-not ($Clients.ContainsKey($LEDN+'-'+$OLVer))) { $Clients.Add($($LEDN+'-'+$OLVer),$MODE) } } "Total Clients [ {0} ]; Cached [ {1} ]; Classic [ {2} ]"-f ($Clients.Count),(($Clients.getenumerator() | ?{$_.value-match'Cached'}).Count),(($Clients.getenumerator() | ?{$_.value-notmatch'Cached'}).Count)
combined_dataset/train/non-malicious/finddupe_11.ps1
finddupe_11.ps1
function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } write-host "Usage: finddupe.ps1 <directory/file #1> <directory/file #2> ... <directory/file #N> [-delete] [-noprompt]" $matches = 0 # initialize number of matches for summary. $filesdeleted = 0 # number of files deleted. $bytesrec = 0 # Number of bytes recovered. $files=@() $del = $false # delete duplicates $noprompt = $false # delete without prompting toggle $currentdir = $true # work on current directory by default for ($i=0;$i -ne $args.count; $i++) { if ($args[$i] -eq "-delete") { $del=$true;continue } else { if ($args[$i] -eq "-noprompt") { $noprompt=$true;continue } else { $files+=(dir $args[$i] -recurse | ? {$_.psiscontainer -ne $true}) $currentdir=$false } } } if ($currentdir -eq $true) { $files=(dir -recurse | ? {$_.psiscontainer -ne $true})} if ($files -eq $null) {write-host "No files found." -f red; exit} for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files { if ($files[$i] -eq $null) {continue} $md5 = $null $filecheck = $files[$i] $files[$i] = $null for ($c=0;$c -ne $files.count; $c++) { if ($files[$c] -eq $null) {continue} # write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline if ($filecheck.length -eq $files[$c].length) { #write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline if ($md5 -eq $null) {$md5 = (get-md5 $filecheck)} if ($md5 -eq (get-md5 $files[$c])) { write-host "Size and MD5 match: " -fore red -nonewline "{0} and {1}" -f $filecheck.fullname, $files[$c].fullname $matches++ if ($del -eq $true) { if ($noprompt -eq $true) { del $files[$c].fullname write-host "Deleted duplicate: " -f red -nonewline write-host "$($files[$c].fullname)." } else { del $files[$c].fullname -confirm } if ((get-item -ea 0 $files[$c].fullname) -eq $null) { $filesdeleted += 1 $bytesrec += $files[$c].length } } $files[$c] = $null } } } } write-host "" write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found. write-host "Number of matches found: $matches." Write-host "Number of duplicates deleted: $filesdeleted." # Display number of duplicate files deleted and bytes recovered. write-host "Number of bytes recovered: $bytesrec." write-host ""
combined_dataset/train/non-malicious/sample_2_11.ps1
sample_2_11.ps1
ConvertFrom-StringData @' id_tsremoteconfiguringmachine=Configuring %Machine% id_tsremoteconfiguringmachinepspolicy=Configuring PowerShell Execution Policy id_tsremoteerrorsettingpspolicy=Error while setting execution policy on remote system: id_tsremoterestoringmachinepspolicy=Restoring PowerShell Execution Policy id_tsremoterestoringmachinepspolicyerror=Restoring PowerShell Execution Policy on remote system: id_tsremotedownloadingpspackage=Downloading PowerShell Package and dependencies to install on remote machine id_tsremotedownloadingpspackagedesc=Downloading %OSDescription% Package id_tsremoteextractingpspackage=Extracting %OSDescription% PowerShell Package id_tsremoteextractingpspackagedesc=Extracting Package to install on remote machine id_tsremotecopyingpspackage=Copying %OSDescription% PowerShell Package to remote machine id_tsremotecopyingpspackagedesc=Copying %OSDescription% PowerShell Package to remote machine id_tsremotenetframeworkinstall=Installing .NET Framework 2.0 Package on remote machine. This can take several minutes. id_tsremoteinstallps=Installing PowerShell Package on remote machine. This can take several minutes. id_tsremoteenableps=Enabling PowerShell on remote Windows Server 2008 machine. This can take several minutes. id_tsremoteobtaininginfo=Obtaining information about %Machine% id_tsremoteobtainingpsinfo=Checking if PowerShell is installed id_tsremoteobtainingdata=Obtaining data from remote machine id_tsremoteobtainingdatadesc=Obtaining data from remote machine %Machine% id_tsremoteremoving=Removing remote components id_tsremoteconnectingto=Connecting to %Machine% id_tsremoteobtainingosinfo=Obtaining Operating System information id_tsremoteobtainingprocessorinfo=Obtaining information about remote computer and processor type id_tsremotebuildingdiagenv=Building diagnostic environment id_tsremoteremote=Remote machine id_tsremotelocal=Local machine id_tsremotestarting=Starting remote diagnostic on %Machine% id_tsremotestartingdesc=Starting diagnostic on %LocalRemote% (%OSName%) id_tsremoterunningdiag=Running diagnostic package on %OSName% %Machine% id_tsremotewaiting=Waiting... id_tsremotepreparingdata=Preparing to collect data id_tsremotepreparingdatadesc=Preparing to collect data from remote diagnostic execution... id_tsremoteprocessingrootcauses=Processing Root Cause Scripts on %Machine% id_waitingprocessfinish=Waiting for diagnostic processes to finish id_waitingprocessfinishdesc=Waiting for background processes to complete. This can take a few minutes. '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBi2P7CU1f9hM59 # BNX5HMJnAz/rsKLU1HKLLhO2G1nlxqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID6e # IMl5NE6tIzzGgwIHnjHJVF8b2WMKX2xmF7ErJBsXMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAORjW3mBwzjveRcz73ymkqLcY0nF5CT3n68MT # 7wT/J4j6p2invPwAWqLQ4LEIB/kFz35kgD9qs9HNothuDE37MMBKNxiyKImQRL0B # MNVAe+3xzf4M3KsZyiI7mtDr9VUkaRs4q767YO2mu0v04LjsYKFbDAvC+5BCF3uN # wUehhIMQB9UFhSzgWg72ZAeJna44WzJGGSFyLen9kif2je5U5Xew+MjlQWzVNqLg # LfsYry9wrVBb2ynvT31bfJLa7C3A+tfvyzNUoxtwlh511fK6ZtjjTlruLwSU702Y # ZZ5+fPPrST+vaf1l6QX87bYmE385P9LPBooIWKDpwsxQd+jr8aGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB73sC1mQ4EQpJ0QstPyvEzZPYZu4rJ5qD5 # sOsv2svi4QIGZusiCs6nGBMyMDI0MTAyODExNDA0MS4yNzdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg0ik8zUVgvESEg+INsj/fjkIu2HKBcB2IArIt0C0BIWUwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAKdid3ZdkMrGGn8BUltVUQA6vgRj5ylMXpJv # Dkjvf+JTMOLchyDCUSTAwIp1DzGVe//JGSJ3sJsqvYDpqMx4IOef86HywFSTMo56 # 9Jq4E8XrBge6r/JQQ+FgQ3qkgplxzq2a5KhntwJn9eeP5rJdSyiIiQhAY34AyjaN # 5sKeCGvJ/0bpQ5219ZoXj20iZm8O3BhxH/oU8mbdqKtP1Awf3FO9kvxPiZFbPQQ8 # D4UZzhgBrGGjxtUU9CsRbbQvbKAzj2bbXcJNJyWTtoYweO4PayCIR9a/ZMufRtik # JI7mODA1bMA5U6BT/KZqHIyYVM6iaZYvqX+fDUtHmidWiTNEBSoAskAlXW3MY6GJ # fyxNUdmGlNTxgm4EQGAWltqx+MbA8AKFa3Tkpo3sY1JPeRIrJYDQJk7ixk8O8Ki4 # /8qIwyCYs/dIMMKvNzEzOCvkP3vu3wvqFYtg5sX8n/acfCD9Aif1hoIgzqmUx3gy # dHpBOAdjoAQ/7dBhEejW9NpOh+XiByH5Pl+DXi8W6MsvHy6eUknsATpepDcPowBl # hafql1dP2X5nnzzrHz5BAys20f0AhI3sGgLZfwRpCHqnZ55FsNvnXFxv/eseYTIm # PQUVYObFsfmUCoGKe9b19qPmnmwsNflK8oBAFotOKg+TaYdkOWYrIRhtAOMmK2dN # eClBt03P # SIG # End signature block
combined_dataset/train/non-malicious/Invoke-Generic_1.ps1
Invoke-Generic_1.ps1
function Invoke-Generic { #.Synopsis # Invoke Generic method definitions via reflection: [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [Alias('On')] $InputObject , [Parameter(Position=1,ValueFromPipelineByPropertyName=$true)] [Alias('Named')] [string]$MethodName , [Parameter(Position=2)] [Alias("Types")] [Type[]]$ParameterTypes , [Parameter(Position=4, ValueFromRemainingArguments=$true, ValueFromPipelineByPropertyName=$true)] [Object[]]$WithArgs , [Switch]$Static ) begin { if($Static) { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Static" } else { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Instance" } } process { $Type = $InputObject -as [Type] if(!$Type) { $Type = $InputObject.GetType() } if($WithArgs -and -not $ParameterTypes) { $ParameterTypes = $withArgs | % { $_.GetType() } } elseif(!$ParameterTypes) { $ParameterTypes = [Type]::EmptyTypes } trap { continue } $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags) if(!$MemberInfo) { $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags, $null, $NonGenericArgumentTypes, $null) } if(!$MemberInfo) { $MemberInfo = $Type.GetMethods($BindingFlags) | Where-Object { $MI = $_ [bool]$Accept = $MI.Name -eq $MethodName if($Accept){ Write-Verbose "$Accept = $($MI.Name) -eq $($MethodName)" [Array]$GenericTypes = @($MI.GetGenericArguments() | Select -Expand Name) [Array]$Parameters = @($MI.GetParameters() | Add-Member ScriptProperty -Name IsGeneric -Value { $GenericTypes -Contains $this.ParameterType } -Passthru) $Accept = $ParameterTypes.Count -eq $Parameters.Count Write-Verbose " $Accept = $($Parameters.Count) Arguments" if($Accept) { for($i=0;$i -lt $Parameters.Count;$i++) { $Accept = $Accept -and ( $Parameters[$i].IsGeneric -or ($ParameterTypes[$i] -eq $Parameters[$i].ParameterType)) Write-Verbose " $Accept =$(if($Parameters[$i].IsGeneric){' GENERIC or'}) $($ParameterTypes[$i]) -eq $($Parameters[$i].ParameterType)" } } } return $Accept } | Sort { @($_.GetGenericArguments()).Count } | Select -First 1 } Write-Verbose "Time to make generic methods." Write-Verbose $MemberInfo [Type[]]$GenericParameters = @() [Array]$ConcreteTypes = @($MemberInfo.GetParameters() | Select -Expand ParameterType) for($i=0;$i -lt $ParameterTypes.Count;$i++){ Write-Verbose "$($ParameterTypes[$i]) ? $($ConcreteTypes[$i] -eq $ParameterTypes[$i])" if($ConcreteTypes[$i] -ne $ParameterTypes[$i]) { $GenericParameters += $ParameterTypes[$i] } $ParameterTypes[$i] = Add-Member -in $ParameterTypes[$i] -Type NoteProperty -Name IsGeneric -Value $($ConcreteTypes[$i] -ne $ParameterTypes[$i]) -Passthru } $ParameterTypes | Where-Object { $_.IsGeneric } Write-Verbose "$($GenericParameters -join ', ') generic parameters" $MemberInfo = $MemberInfo.MakeGenericMethod( $GenericParameters ) Write-Verbose $MemberInfo if($WithArgs) { [Object[]]$Arguments = $withArgs | %{ $_.PSObject.BaseObject } Write-Verbose "Arguments: $(($Arguments | %{ $_.GetType().Name }) -Join ', ')" $MemberInfo.Invoke( $InputObject, $Arguments ) } else { $MemberInfo.Invoke( $InputObject ) } } }
combined_dataset/train/non-malicious/sample_51_0.ps1
sample_51_0.ps1
Signature-Version: 1.0 Created-By: 11.0.13 (International Business Machines Corporation) SHA-256-Digest-Manifest: 1r6sitbUID2Wk9qANTvzkSRdE1C0u8H5SYwpkSsK1SE= SHA-256-Digest-Manifest-Main-Attributes: UgUYpdBq2W5RtR37SvPaUbQcstMFVhI EeY5uarlBPSI= Name: plugin.xml SHA-256-Digest: HS4k5kzk7m0pjUQJvLR9k++EVmv2eb/wuKf5xA87gew= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOperandByOperan dList.class SHA-256-Digest: KVUYnId1YarqsjPnu7kv5CHu92S4TniXmZfuycmKdmI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$BaseAction.class SHA-256-Digest: FgD7ThziyyXNAe5SttXVNoo3g8g8rvzt7jOTEQxQ2ts= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$TermAction.class SHA-256-Digest: l/yAoN7tnBRwouQIQQuyzX85HNhGysqaruAwndtuoJs= Name: com/ibm/systemz/cobol/editor/core/copy/Activator.class SHA-256-Digest: Z3IcuRT/U7ksEy/wlGeKL8IlmzSaQrtT9dyDPq3clmE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$TermCheck.class SHA-256-Digest: dE0m6BvGduBigkaJiHF71vslmMfdHqFef3F+Go4doMA= Name: com/ibm/systemz/cobol/editor/core/copy/parser/messages.properties SHA-256-Digest: LJh7aNsXzmbWYp5t1Y2+Ysg1q8tbt9qnofSFGsgaDcg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWord2.cla ss SHA-256-Digest: sFb2SzvDuQsoC8Rjhvv9dgDI30S5N5phydW9G56bfnI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Subscript2.class SHA-256-Digest: 3EiB6sCNGQ8kEFwlT90gXfksX31GC0Oq0AjWiGpVggY= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Replacing1.class SHA-256-Digest: yw9edyRk4WMIMYiYQNqMLnBVyZjwYuKArKzkFy+TDXI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParsers ym.class SHA-256-Digest: Ah4yCdiV8CIxQfRTcFxv8Myx4NfqjMuBebdYOSXIKO4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Keyword0.class SHA-256-Digest: 881fnqjW7T/wZa+6xcIHYEOej7IX0bJBf8cyg+bz9Sg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$TermCheck.class SHA-256-Digest: M/j93hM+sO5LWdK8CpM8RiumQ4aoR/VNplits4cAwb0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PlusOrMinus1.cla ss SHA-256-Digest: WH8LFb4aGz8R/lUDCTuUtLq52vbXBehH4lmZjPxKijs= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OfInLibraryName1 .class SHA-256-Digest: ifhbPlXdXG6DtC+ADnxBkosU6fu8SUjjXQgmszaWDrM= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Keyword3.class SHA-256-Digest: 0tIuejqx7GLAE0VY/K85IjHTY6X3JTklXcdMi6G/gA4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOptionalLeading Trailing.class SHA-256-Digest: Jti5JHZ8Q842w2WdbgO0My4UrBapPT5q4RnL9WcxR70= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Dot.class SHA-256-Digest: puiGwLEkTR+8NNly8fYRXnRo8BNweM+UgPs6H6iTVtw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ASTNode.class SHA-256-Digest: z7BceqhBzG+o6nKkNCynkz7z+1ICIbvKPq6AJE4RzE4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$IsNullable.class SHA-256-Digest: uhbs2m5fJe6koaNvaOqIal4P5Mi4rsmJIxH1I3fgjVg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerIm pl.class SHA-256-Digest: 3nMdyzom9qg55T7fQOV97c7/yT4gfAF+MGdGhLlhPGk= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexPars er.class SHA-256-Digest: PbACZxwTAdqKNRbFeyk1Ic3ReIF8lMhMuf0UFpBcck8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyParserConstants. class SHA-256-Digest: q95YkDTpSzFFzb0FmNKB35GgNNublr4wy06vT/QIndc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$IsKeyword.class SHA-256-Digest: SjvKUPh2GcBIFvEdwRtWs5Aw5iH7cmIrqOPiKFjtOAI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs.class SHA-256-Digest: BD83GhHailzfcdvPm4yHOH7b/d1ngDpxEiPtr242VRo= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementASTNode Locator$NodeVisitor.class SHA-256-Digest: N55UgCBQmxWsXkrdwc64CpylZRHWFF6CorMm3QeJ+Mo= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IEjectStatement. class SHA-256-Digest: BoXiffiMEdHPHt3bTM8NJdcEOe6LeVp3Ko0gyf3u1gE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IPartialWordsLea dingTrailingClause.class SHA-256-Digest: dX3U83CP0KG3qUQA+Vz3Jt3NDiEYfSLHGGMyD06bzCg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IPlusOrMinus.cla ss SHA-256-Digest: Ms0WIp2H19VFcA8X2T1qnWdMypGOph08+A1ycGORYc8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IASTNodeToken.cl ass SHA-256-Digest: YYey1MF89tCLOn8rv41NOSzesnSs2tMIsU9gvoMuJH8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$BaseCheck.class SHA-256-Digest: tbMbp1VlYW8aPy9WaAJptLhAecmWEGltcGEklp03gJE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ASTNodeToken.cla ss SHA-256-Digest: l9hmgWoVB1t9wu7ABhnJE8wmh0yGeJrcgVO3Grp44R8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$ProsthesesIndex.class SHA-256-Digest: nDSpo9BIFwZhYvzrLEYzSsCnHsXGUAttXnuy8d6+5s0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$IsKeyword.class SHA-256-Digest: RxBUPaX3z0+W61toMBoE3xH8cwCBViWuEl8qikHSeTQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Literal1.class SHA-256-Digest: ImR3BoYw0ULDB1CbGnHjSDwKkD4zh4dryRzYkTN+v6Q= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/QualifiedDataNam e0.class SHA-256-Digest: uwY+Y5eR9ondAQC7RIuPNMNTK50PH+ltezgporcouG0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/.jazzignore SHA-256-Digest: 72lW5EiWznB25wdUkMOOQGTMi+PItqkU5Hq80ygaZF4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOfInLibraryName .class SHA-256-Digest: MSSp3OewAimVdD+fyITxPDYWfj6B1VJq2/Fx6WiamCQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexer.c lass SHA-256-Digest: gBUhzEgFS+VDtEKcjLrxhyMdAkdtj/MiJjXfL8P75EE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Visitor.class SHA-256-Digest: MVQYusaOuTUMLW/J7qo9CJYuyf/bVYd4qdAMmUFyGd4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IReplaceStatemen t.class SHA-256-Digest: ODpUYV+17KIdD92mz9nUhG2yEr6wIf/NkpzHuxXaGCw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ILibraryName.cla ss SHA-256-Digest: 3RAYMZZcigRppO9v1ftf2640rZL/8FIbfJNcJFCftsI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OfOrIn0.class SHA-256-Digest: fpJr3+VuOJePDfwEci+Z2JHmtdOa+jL2ll918CxO/14= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$TerminalIndex.class SHA-256-Digest: fpEWcNVaZSnTqDxsysyuY3NF/TX5WCuucmtzB+tjOJY= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IPartialWord2.cl ass SHA-256-Digest: vizwfZZX7oGMOk6Zk5zCLLoWVykjean/9Vdcipi9hNQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ReplaceStatement .class SHA-256-Digest: Ax9MS9+lZAXzI/+H8Red4KQk2btS1GzQPQS8oenj+JY= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWord1.cla ss SHA-256-Digest: M3gHBsPSmRHXDbFHYbR3FWG+WrnoNMQxhPgK3iMUg4E= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$TermAction.class SHA-256-Digest: PDYJMb5JhOjmK/HuE/+G4ejhIGxMYvKnvun/AI6jhPA= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$Nasb.class SHA-256-Digest: p/PABhYOl42GrudpPd/aIRMmb2WWUwI/pvBLYvLH9SE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$Name.class SHA-256-Digest: B2aDNWPUXLHoJqI/X09Oyj2XwwCmtJOItjQt5wLvipw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWordsLead ingTrailingClauseList.class SHA-256-Digest: XJ4lcgmR09pXVg55KeuQfVwlwDy89gtfJUCRdhT0jl0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$IsNullable.class SHA-256-Digest: Aa5lkMywhFTb2ksqWsE9G+5Lf2ZFLkPwTehR7WTg340= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OperandByOperand List.class SHA-256-Digest: D0SnxwSQLWfESYPQNqUycTthRie/DOtUC+3160nPLSE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Literal2.class SHA-256-Digest: 9xNhmSqq6LpK9P5TnzA33dYVyYQ2FYGhmPemZJZDMEw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OfOrIn1.class SHA-256-Digest: +Mu4TUu3rEQQTaVdOTPFmJ0pb+IJ0ldjkCLek8qHYeQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ILiteral.class SHA-256-Digest: i1zBxpQmhp5r5TUCSkJ3Dde+E12dVH5NhaPxjEKC720= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOperand.class SHA-256-Digest: l6TGMKe63Aby1yauIN7r9QGaBmuDr3rXABsOpJMEKJc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IKeyword.class SHA-256-Digest: CWDkITvm0HEi1d7eryuOnYYr3+R5i6oWN2ZZxJOlKr4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$Asb.class SHA-256-Digest: ZBqANad6S/kVwfM9UVvh44CQ8dEEDwILve0ieNxwFXc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/AbstractASTNodeL ist.class SHA-256-Digest: SCFBnroN4Np8oboVzrIDXj1aUiM7PuEzNKtJXq+x4Aw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/QualifiedDataNam e1.class SHA-256-Digest: 0b9SBLhxWlqrZHavobGneaLgA01ozTMjUEBsfzVMRyM= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$IsNullable.class SHA-256-Digest: uBP+6lkONvX3/oTuGczOP3N591Gzobo+M+p/pT9XX4w= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IIdentifier.clas s SHA-256-Digest: JAv6z06D8FGAt+eeiAFUZsePBBlEuQv7tTBRurwF+cc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Keyword4.class SHA-256-Digest: 6nA1eT3HB2vICHkL6GOig5VcLy4EHSu/SPQm1P2zRF4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ICopyStatement.c lass SHA-256-Digest: 61OYcAOyzjBw0StV0CcAuZoF1oVhd8KcfGk92XuqnOE= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ISuppress.class SHA-256-Digest: o24SX9uTDg8R86R429xHJPKGV4wNrgZoZtL5pRt5sP0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$NonterminalIndex.class SHA-256-Digest: ADYR4ntj7y+23Uc6pS5EflK3WgjkhepH5QiOZltMW2I= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerLp gLexStream.class SHA-256-Digest: 8z0UHIHBcWOs+ykt1UnXH6JrQMbHB9QAVgbdeWpGBGg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$ProsthesesIndex.class SHA-256-Digest: fXl5v6Ag9POrmK6G8cDOFTEONhCDYHvGvOynwycOkr4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$BaseCheck.class SHA-256-Digest: kMF7yCHaGOQnkv4LqEPAcCA5caiF+Uu8RgopdmwH5wU= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IReplacing.class SHA-256-Digest: Lq5NOlNkKaobCZtU7r06UfueTQFVC01Rk/+JpfI+Z7E= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ISubscript.class SHA-256-Digest: KoJUmr7kSsDJhiHc5htnnxein71ItjkHFJu0Kf6XvXg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$TermCheck.class SHA-256-Digest: BbxA8GDEPsvYT89+uSkqYIpWLGAEEdag5/YVUN9Q7pk= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ITextNameLiteral .class SHA-256-Digest: 3MomQtHCQLFZfHsbGSJYRjdw6bZQp09tyB70dJ6MRvc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Operand0.class SHA-256-Digest: gqvA7RmZl/bgOyPb7HjEEJ1/0e/WPPD+iXlWU+vThr0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Keyword2.class SHA-256-Digest: 4K74u/cKCx4o2LGIvt2/DngODBzDLC+JNYHqBilBANg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$BaseCheck.class SHA-256-Digest: 3EA+18Sd52gjGViK+4ltmFHGXBjLQfJqZQHt4wOdmUs= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/SkipStatement.cl ass SHA-256-Digest: yeOdfIdSCBok27OGjnX5N3pOVJz0bEKlxxs3TP3oXzQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$TermAction.class SHA-256-Digest: kXB941sa9qayx1+ZJNgxc6vWapiCxOgCrE7HyTOOWbw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Replacing.class SHA-256-Digest: Je7jIXAjntAdI957xOOsIH5fdwJtI/nIBckYVkqkEHk= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Replacing0.class SHA-256-Digest: cDuIwl47bBrhSiMZE6xMc1K1vHQP9aJF8Ohfn9mSTIM= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexersy m.class SHA-256-Digest: 6TWtFq4RpaVSeJC0vKdeZluyM2ggnUu+HCkb1DMolNk= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOperandByOperan d.class SHA-256-Digest: 86Dzq/+nRFkVpdqdAsT/mxhJ6uArdfxbx4W9/eS1b+I= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParser. class SHA-256-Digest: 6yrw1jvbS1Sodh4Dv3ZlTx0isIP4jD5MYa5k/SPmHuY= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWordsLead ingTrailingClause0.class SHA-256-Digest: 8Ul6/A37otKBWwCYrCeSXGyOHLGW6gNoCdQ4BLEZcSc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Operand1.class SHA-256-Digest: 7qGM9ZAU8t89gDvjrlJLuWxgxwUwqAV+Dh5Gq9B7TEU= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/SQLCopybook.clas s SHA-256-Digest: SXW3wT26g48iaRrF8am/k4/uSwh856zTTPrzmPzz0xw= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementASTNode Locator.class SHA-256-Digest: ktpZPHwG7E8pRk/CItIoNH/nTNjiLEN5EjD0cXm/F9Y= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s$BaseAction.class SHA-256-Digest: cY0Nv47LFoix/h8FdWsjaTooZtNdZlY/aK5yxZinkTA= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/AbstractVisitor. class SHA-256-Digest: rSxZAgbpIhtBzjLixUQjpUhjp2BgCDqDshmO2w+Lx94= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Subscript0.class SHA-256-Digest: 2uzDiTKJMG0qvU0pV5dC/j1l5vad1yoAqbNNytdi3vs= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OptionalLeadingT railing1.class SHA-256-Digest: 1p9XqDme2OceUxd8euWS/KVdrsYmVnaRjPHDccTb4yI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Keyword1.class SHA-256-Digest: yQrFiR1Nz/042Jq7HIn9Sx9YzVZiq7xsrm4UQ8oGeC4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ISkipStatement.c lass SHA-256-Digest: 10PwAnkBjh6qHIDBnKE5Gc0yMtDQD1LN/W7/l3q6P3g= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/EjectStatement.c lass SHA-256-Digest: zz0tZQl/DyDg3dIBkPbzcuV/WqExh0qb3PG8s1hGkyU= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Suppress.class SHA-256-Digest: GGzKZM++wx0KJ430l+O8olfMZWjfehWBMj1QZHgp3sc= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer sym.class SHA-256-Digest: gjU0XsqUgBpz5OQZU230wJFOQkI2VcnqWYim7iRnE4o= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs.class SHA-256-Digest: 7MfQKvuNAeOxbkUVWGs8iUrOyFCWMkIr5BKgntlIPkQ= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Copybook.class SHA-256-Digest: /NI1pEsupb0dCX4rHtJ7foXyyBb8Ifod1jxWdaGP6bo= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Literal0.class SHA-256-Digest: 7uhijXY71UC0oBZyKsBTEQW5JyXiPrbpbELvIN2cFb0= Name: META-INF/maven/zowe.commercial.zlanguage/com.ibm.systemz.cobol.edi tor.core.copy/pom.properties SHA-256-Digest: BvX1WQ4Nic8Gkup61pLkrr3zLKc8YrtMHyxk4y2W5ek= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IOfOrIn.class SHA-256-Digest: FPUQNX6lS6XsysVCDgb08QXtTzaeJCDD8jfhgAJ4ceU= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IPartialWord1.cl ass SHA-256-Digest: IvT25fqgR74w+5SC8Qk6KiDjdqK3Z82owE3pF77NqwA= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$IsKeyword.class SHA-256-Digest: 7XlqI64lNE+sp/eYUjBUTIAePG7uuwhE3wgLmsM3z5o= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyCobolParserMessa ges.class SHA-256-Digest: B2IZ2dYexNgZB7XzkhAhYuoKDoQBE0e2+Hsqixzb/+w= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$Nasr.class SHA-256-Digest: wN3iB9hM5lC9mcUxcGcboBE6oUiSKmuKbJLSG0zQvh8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/CopyStatement.cl ass SHA-256-Digest: 5HMOdPR3okNpyP8v2fhqFcxQbceixCynNpfUhWln9ms= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$BaseAction.class SHA-256-Digest: NShNfO3hfBsWMBym+zCQl00dKAkAnv2yqEYFCYlgRSM= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IPartialWordsCla use.class SHA-256-Digest: 6zkCk12LwCO+TAkP2T/bpEjt/3rVmx2RXa1z15aWP58= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OfInLibraryName0 .class SHA-256-Digest: zdE0NmmKRbAeDM7oBx0avvfGZIT0RU87ZEgxYYXr3cY= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IQualifiedDataNa me.class SHA-256-Digest: elvUAWZ97E1EASOyIU3RO9IP8vtxvzgAbP8PMnnei3Y= Name: META-INF/maven/zowe.commercial.zlanguage/com.ibm.systemz.cobol.edi tor.core.copy/pom.xml SHA-256-Digest: l+L27qxJcE1i+wqalKdh/WB8lgiSViKiZc2KoewQC60= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Identifier.class SHA-256-Digest: uGeN3hjFGFLQdoVFAbAlyWFDuysltO+XBpUCGR1OZ9M= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementLexerpr s.class SHA-256-Digest: lL82h61amvO+M2yukRIJidRAc+NUKQWPTxjSMCHdAQ8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/IDot.class SHA-256-Digest: 0JfS+aSQVFRKWnMc4cPO+G8BxNK/xZDQcUJCk/in/Bs= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PlusOrMinus0.cla ss SHA-256-Digest: hdiXwUqb+t6iLA1iNNbCKCKirlA+9cHVw7mJ2qtsn2Y= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/ISQLTextNameLite ral.class SHA-256-Digest: 9/e961XaTTx+S9AP7XvkeC5Lf1WSAqBiRJBWvOK0bok= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer .class SHA-256-Digest: eirCW1L0UsR9BUVajh7IZwhiVXYZUPLuhVqVa8Dw76o= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Operand2.class SHA-256-Digest: 4eLYV+xUS10ib9xC3PCkAQ7U+xUZtCaqt9w+W+nYdWg= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OptionalLeadingT railing0.class SHA-256-Digest: wMt16j4z8p//gZYf5UK0XJCNmtViiXSNr2TEtY/tFc4= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/OperandByOperand .class SHA-256-Digest: rGZIanKphsx5tqAHpRu01rFBGMbPuVhoYj7ST8SAM0M= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWordsLead ingTrailingClause1.class SHA-256-Digest: 7jpwUzdhNQGJ9GtiXEEqPNHZ6btbO+dzWXJnoPnveU0= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/Subscript1.class SHA-256-Digest: lteQ5gLmU23E9KqqCvzPvMM6JolahhMHPx6nR9RxQc8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementParserp rs$Asr.class SHA-256-Digest: vYfEhk8fR8G+81f6exXa92thvors05Bw1WBEKLzbUSI= Name: com/ibm/systemz/cobol/editor/core/copy/parser/Ast/PartialWordsClau se.class SHA-256-Digest: H0ZRU4ID+5paOMUZv90nNxKaN8ZTGUcHj4G+x0swrA8= Name: com/ibm/systemz/cobol/editor/core/copy/parser/CopyStatementKWLexer prs$ProsthesesIndex.class SHA-256-Digest: NQgtqf8qLTj7iPhcyaiPpDqra2cYsrcU/bpmIG6n5ZQ=
combined_dataset/train/non-malicious/sample_61_29.ps1
sample_61_29.ps1
# Name: tss_update-script.ps1 for TSS (former TSSv2) <# .SYNOPSIS Script to [auto-]update TSS to latest version or download latest zip from CesdiagTools/GitHub. .DESCRIPTION Script will search on "https://microsoft.githubenterprise.com/css-windows/WindowsCSSToolsDevRep/releases/tag" for latest TSS version If local version does not match the remote CesdiagTools/GitHub version, it will download and replace TSS with latest version Script gets the current version from $global:TssVerDate or by running ".\TSS -version" and compares to version 'https://cesdiagtools.blob.core.windows.net/windows/TSS.ver'. .PARAMETER tss_action choose action from allowed values: "Download" or "Update" or "Version" Download = download latest CesdiagTools/GitHub version Update = update current local version Version = decide based on local version, try AutoUpdate if local version is lower than CesdiagTools/GitHub version Ex: -tss_action "Download" .PARAMETER tss_file Specify filename from allowed values: "TSS.zip" , "TSS_TTD.zip" , "TSS_diff.zip" or "TSSLite.zip" Ex: -tss_file "TSS.zip" .PARAMETER TSS_path Specify the local path where TSS.ps1 is located. Ex: -TSS_path "C:\TSS" .PARAMETER UpdMode Specify the mode: Online = complete package (TSS.zip) from aka.ms/getTSS Full = complete package (TSS.zip) from CesdiagTools/GitHub Quick = differential package only (TSS_diff.zip): replace only TSS.ps1, TSS_[POD].psm1 and config\tss_config.cfg files; will not update \BIN* folders Force = run a Full update, regardless of current installed version .PARAMETER tss_arch Specify the System Architecture. Allowed values: x64 - For 64-bit systems x86 - For 32-bit systems Ex: -tss_arch "x64" .EXAMPLE .\tss_update-script.ps1 -tss_action "Update" -TSS_path "C:\TSS" -tss_file "TSS.zip" Example 1: Update TSS in folder C:\TSS .LINK https://microsoft.githubenterprise.com/css-windows/WindowsCSSToolsDevRep/releases/tag Public Download: TSS: https://cesdiagtools.blob.core.windows.net/windows/TSS.zip -or- https://aka.ms/getTSS #> param( [ValidateSet("download","update","version")] [Parameter(Mandatory=$False,Position=0,HelpMessage='Choose from: download|update|version')] [string]$tss_action = "download" , [string]$TSS_path = (Split-Path $MyInvocation.MyCommand.Path -Parent | Split-Path -Parent), [ValidateSet("Online","Full","Quick","Force","Lite")] [string]$UpdMode = "Online" , $verOnline , [ValidateSet("TSS.zip","TSS_diff.zip","TSSLite.zip","TSS_ttd.zip")] [string]$tss_file = "TSS.zip" , [ValidateSet("x64","x86")] [string]$tss_arch = "x64", [string]$CentralStore = "", # updating from Central Enterprise Store [switch]$AutoUpd = $False, # [switch]$UseExitCode = $true # This will cause the script to bail out after the error is logged if an error occurs. ) #region ::::: [Variables] -----------------------------------------------------------# $updScriptVersion = "2023.10.06" $UpdLogfile = $TSS_path + "\_tss_Update-Log.txt" $script:ChkFailed = $FALSE $invocation = (Get-Variable MyInvocation).Value $ScriptGrandParentPath = $MyInvocation.MyCommand.Path | Split-Path -Parent | Split-Path -Parent $scriptName = $invocation.MyCommand.Name if ($UpdMode -match 'Online') { $TssReleaseServer = "cesdiagtools.blob.core.windows.net" $tss_release_url = "https://cesdiagtools.blob.core.windows.net/windows" }else{ $TssReleaseServer = "api.Github.com" $tss_release_url = "https://api.github.com/repos/walter-1/TSSv2/releases" } $NumExecutable = (Get-ChildItem "$global:ScriptFolder\BIN\" -Name "*.exe" -ErrorAction Ignore).count If($NumExecutable -lt 20){ $LiteMode=$True }Else{ $LiteMode=$False } #endregion ::::: [Variables] --------------------------------------------------------# $ScriptBeginTimeStamp = Get-Date # Check if last "\" was provided in $TSS_path, if it was not, add it if (-not $TSS_path.EndsWith("\")){ $TSS_path = $TSS_path + "\" } #region ::::: [Functions] -----------------------------------------------------------# function ExitWithCode ($Ecode) { # set ErrorLevel to be picked up by invoking CMD script if ( $UseExitCode ) { Write-Verbose "[Update] Return Code: $Ecode" #error.clear() # clear script errors exit $Ecode } } function get_local_tss_version { <# .SYNOPSIS Function returns current or LKG TSS version locally from "$TSS_ps1_script -ver" command. #> param($type="current") switch ($type) { "current" { $TSS_ps1_script = "TSS.ps1" } "LKG" { $TSS_ps1_script = "TSS-LKG.ps1" } } if ( -not (Test-Path $TSS_ps1_script)) { $TSS_ps1_script = "TSS.ps1" } Get-Content ..\$TSS_ps1_script | Where-Object {$_ -match 'global:TssVerDate ='} | ForEach-Object { $v2version=($_ -Split '\s+')[3] } $TSSversion = $v2version.Replace("""","") Write-verbose "[get_local_tss_version] TSSversion= $TSSversion" return [version]$TSSversion } function get_latest_tss_version { <# .SYNOPSIS Function will get latest version from CesdiagTools/GitHub Release page .LINK https://github.com/walter-1/TSSv2/releases https://cesdiagtools.blob.core.windows.net/windows/TSS.zip #> EnterFunc ($MyInvocation.MyCommand.Name + "(URL: $RFL_release_url)" ) if ($UpdMode -match 'Online') { return $verOnline # = TSS.ver }else{ # GitHub: Get web content and convert from JSON [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 try { $web_content = Invoke-WebRequest -Uri $tss_release_url -UseBasicParsing | ConvertFrom-Json } catch { "`n$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') *** Failure during TSS update. Exception Message:`n $($_.Exception.Message)" | Out-File $UpdLogfile -Append } if ($web_content.tag_name) { [version]$expected_latest_tss_version = $web_content.tag_name.replace("v","") write-verbose "$UpdateSource Version of '$tss_release_url': --> $expected_latest_tss_version" return $expected_latest_tss_version } else { Write-Host -ForegroundColor Red "[ERROR] cannot securely access $TssReleaseServer. Please download https://aka.ms/getTSS" "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [ERROR] cannot securely access $TssReleaseServer. Please download https://aka.ms/getTSS" | Out-File $UpdLogfile -Append $script:ChkFailed=$TRUE return 2022.0.0.0 } } EndFunc $MyInvocation.MyCommand.Name } function DownloadFileFromGitHubRelease { param( $action = "download", $file, $installedTSSver) # Download latest TSS release from CesdiagTools/GitHub $repo = "walter-1/TSSv2" $releases = "https://api.github.com/repos/$repo/releases" #Determining latest release , Set TLS to 1.2 [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 $tag = (Invoke-WebRequest $releases -UseBasicParsing | ConvertFrom-Json)[0].tag_name $downloadURL = "https://github.com/$repo/releases/download/$tag/$file" Write-Verbose "downloadURL: $downloadURL" $name = $file.Split(".")[0] $zip = "$name-$tag.zip" $TmpDir = "$name-$tag" Write-Verbose "Name: $name - Zip: $zip - Dir: $TmpDir - Tag/version: $tag" #_# faster Start-BitsTransfer $downloadURL -Destination $zip # is not allowed for GitHub Write-Host ".. Secure download of latest release: $downloadURL" [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 Invoke-WebRequest $downloadURL -OutFile $zip if ($action -match "download") { Write-Host -ForegroundColor Green "[Info] Downloaded version to folder: $TSS_path`scripts\$tss_file" } if ($action -match "update") { #save current script and expand Write-Host "... saving a copy of current installed TSS.ps1 to $($TSS_path + "TSS.ps1_v" + $installedTSSver)" Copy-Item ($TSS_path + "TSS.ps1") ($TSS_path + "TSS.ps1_v" + $installedTSSver) -Force -ErrorAction SilentlyContinue Write-Host "... saving a copy of current \config\tss_config.cfg to $($TSS_path + "config\tss_config.cfg_backup")" Copy-Item ($TSS_path + "config\tss_config.cfg") ($TSS_path + "config\tss_config.cfg_backup") -Force -ErrorAction SilentlyContinue Write-Host "[Expand-Archive] Extracting release files from $zip" Expand-Archive -Path $zip -DestinationPath $ENV:temp\$TmpDir -Force Write-Host ".. Cleaning up .." Write-Verbose "Cleaning up target dir: Remove-Item $name -Recurse" Write-Verbose "Copying from temp dir: $ENV:temp\$TmpDir to target dir: $TSS_path" Copy-Item $ENV:temp\$TmpDir\* -Destination $TSS_path -Recurse -Force Write-Verbose "Removing temp file: $zip and folder $TmpDir" Remove-Item $zip -Force Write-Verbose "Remove-Item $ENV:temp\$TmpDir -Recurse" Remove-Item $ENV:temp\$TmpDir -Recurse -Force -ErrorAction SilentlyContinue Write-Host -ForegroundColor Gray "[Info] Updated with latest TSS version $script:expected_latest_tss_version" } } function DownloadTssZipFromCesdiagRelease { param( $file # TSS.zip or TSSLite.zip ) switch ($file) { "TSS.zip" { $downloadURL = $tss_release_url + "/TSS.zip" } "TSSLite.zip" { $downloadURL = $tss_release_url + "/TSSLite.zip" } } Try { "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') .. Secure download of latest release: $downloadURL" | Out-File $UpdLogfile -Append Write-Host ".. Secure download of latest release: $downloadURL" # faster Start-BitsTransfer; even more faster: # Start-BitsTransfer $downloadURL -Destination "$ENV:temp\TSS_download.zip" $webClient = New-Object System.Net.WebClient $webClient.DownloadFile($downloadURL, "$ENV:temp\TSS_download.zip") }Catch{ Write-Host -ForegroundColor Red "Failure during TSS download. Exception Message:`n $($_.Exception.Message)" "`n$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') *** Failure during TSS download. Exception Message:`n $($_.Exception.Message)" | Out-File $UpdLogfile -Append EXIT 1 } #save current script and expand If(Test-Path "$ENV:temp\TSS_download.zip"){ "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] ... saving a copy of current installed TSS.ps1 to $($TSS_path + "TSS.ps1_v" + $installedTSSver)" | Out-File $UpdLogfile -Append Write-Host "... saving a copy of current installed TSS.ps1 to $($TSS_path + "TSS.ps1_v" + $installedTSSver)" Copy-Item ($TSS_path + "TSS.ps1") ($TSS_path + "TSS.ps1_v" + $installedTSSver) -Force -ErrorAction SilentlyContinue Write-Host "... saving a copy of current \config\tss_config.cfg to $($TSS_path + "config\tss_config.cfg_backup")" Copy-Item ($TSS_path + "config\tss_config.cfg") ($TSS_path + "config\tss_config.cfg_backup") -Force -ErrorAction SilentlyContinue Write-Host "[Expand-Archive] Extracting release files from $ENV:temp\TSS_download.zip" "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] [Expand-Archive] Extracting release files from $ENV:temp\TSS_download.zip" | Out-File $UpdLogfile -Append expand-archive -LiteralPath "$ENV:temp\TSS_download.zip" -DestinationPath $TSS_path -force "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] [Expand-Archive] .. done LASTEXITCODE: $LASTEXITCODE" | Out-File $UpdLogfile -Append #ToDo } } #endregion ::::: [Functions] --------------------------------------------------------# #region ::::: [MAIN] ----------------------------------------------------------------# # detect OS version and SKU # Note: gwmi / Get-WmiObject is no more supportd in PS v7 -> use Get-CimInstance If($Host.Version.Major -ge 7){ [Reflection.Assembly]::LoadWithPartialName("System.ServiceProcess.servicecontroller") | Out-Null $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem }else{$wmiOSVersion = Get-WmiObject -Namespace "root\cimv2" -Class Win32_OperatingSystem} [int]$bn = [int]$wmiOSVersion.BuildNumber #Write-verbose "installed-version: $(get_local_tss_version current) - Build: $bn" $installedTSSver = New-Object System.Version([version]$(get_local_tss_version "current")) Write-verbose "installedTSSver: $installedTSSver" "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] Running TSS -update : installedTSSver: $installedTSSver" | Out-File $UpdLogfile ## :: Criteria to use Quick vs. Online update: Quick if UpdMode = Quick; Online = if updates in xray or psSDP are needed, ... # Choose download file based on $UpdMode (and current installed TSS build) If($LiteMode) {$tss_file = "TSSLite.zip"}else{$tss_file = "TSS.zip" } switch ($UpdMode) { "Quick" { $tss_file = "TSS_diff.zip" $UpdateSource= "GitHub"} "Lite" { $tss_file = "TSSLite.zip" $UpdateSource= "GitHub"} "Online"{ #$tss_file = "TSS.zip" $UpdateSource= "CesdiagTools"} # "Force" { $tss_file = "TSS.zip" } # always perform a Full update default { #$tss_file = "TSS.zip" $UpdateSource= "CesdiagTools"} } # Check for Internet connectivity // Test-NetConnection does not work for Win7 $checkConn = FwTestConnWebSite $TssReleaseServer -ErrorAction SilentlyContinue if ( $checkConn -eq "True") { "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] CheckConn($checkConn) installedTSSver: $installedTSSver" | Out-File $UpdLogfile -Append # Determine which edition we need, ? based on existence of .\x64\TTTracer.exe # + ToDo Lite based on existence/number of *.exe in \BIN folder if ($UpdMode -Notmatch "Online") { $script:expectedVersion = New-Object System.Version(get_latest_tss_version) } if ("$($script:expectedVersion)" -eq "0.0") { Write-Verbose "Bail out: $script:expectedVersion"; ExitWithCode 20 "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] Bail out: $script:expectedVersion ExitWithCode 20" | Out-File $UpdLogfile -Append } # Check if TSS exists in $TSS_path if (-not (Test-Path ($TSS_path + "TSS.ps1"))){ Write-Host -ForegroundColor Red "[Warning] TSS.ps1 could not be located in $TSS_path" DownloadFileFromGitHubRelease "update" $tss_file $installedTSSver } if (Test-Path ($TSS_path + "TSS.ps1")){ if ($UpdMode -match "Online") { DownloadTssZipFromCesdiagRelease -File "TSS.zip" } elseif ($UpdMode -match "Force") { # update regardless of current local version Write-Host -ForegroundColor Cyan "[Forced update:] to latest version $script:expectedVersion from $UpdateSource`n" if (Test-Path ($TSS_path + "x64\TTTracer.exe")) { Write-Host -ForegroundColor Yellow "[note:] This procedure will not refresh iDNA part"} DownloadFileFromGitHubRelease "update" $tss_file $installedTSSver }else{ Write-Host "[Info] checking current version $installedTSSver in $TSS_path against latest released $UpdateSource version $script:expectedVersion." if ($($installedTSSver.CompareTo($script:expectedVersion)) -eq 0) { # If versions match, display message "`n$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] Latest TSS version $script:expectedVersion is installed. " | Out-File $UpdLogfile -Append Write-Host -ForegroundColor Cyan "[Info] Latest TSS version $script:expectedVersion is installed.`n"} elseif ($($installedTSSver.CompareTo($script:expectedVersion)) -lt 0) { # if installed current version is lower than latest $UpdateSource Release version "`n$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Action: $tss_action -[Warning] Actually installed TSS version $installedTSSver is outdated] " | Out-File $UpdLogfile -Append Write-Host -ForegroundColor red "[Warning] Actually installed TSS version $installedTSSver is outdated" Write-Host "[Info] Expected latest TSS version on $($UpdateSource) = $script:expectedVersion" Write-Host -ForegroundColor yellow "[Warning] ** Update will overwrite customized configuration, latest \config\tss_config.cfg is preserved in \config\tss_config.cfg_backup. ** " switch($tss_action) { "download" { Write-Host "[download:] latest $tss_file" DownloadFileFromGitHubRelease "download" $tss_file $installedTSSver } "update" { Write-Host "[update:] to latest version $script:expectedVersion from $UpdateSource " if (Test-Path ($TSS_path + "x64\TTTracer.exe")) { Write-Host -ForegroundColor Yellow "[note:] This procedure will not refresh iDNA/TTD part"} DownloadFileFromGitHubRelease "update" $tss_file $installedTSSver } "version" { Write-Host -background darkRed "[version:] installed TSS version is outdated, please run 'TSS Update', trying AutoUpate" # or answer next question with 'Yes'" Write-Host -ForegroundColor Cyan "[Info] running AutoUpdate now... (to avoid updates, append TSS switch 'noUpdate')" DownloadFileFromGitHubRelease "update" $tss_file $installedTSSver } } "`n$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Action: $tss_action - OK] " | Out-File $UpdLogfile -Append }else{ # if installed current version is greater than latest CesdiagTools/GitHub Release version if ($script:ChkFailed) {Write-Host -ForegroundColor Gray "[Info] Version check failed! Expected version on $($UpdateSource) = $script:expectedVersion. Please download https://aka.ms/getTSS `n"} Write-Verbose "Match: Current installed TSS version: $installedTSSver" Write-Verbose "Expected latest TSS version on $($UpdateSource) = $script:expectedVersion" } } } }else{ "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [failed update] Missing secure internet connection to $TssReleaseServer. Please download https://aka.ms/getTSS" | Out-File $UpdLogfile -Append Write-Host -ForegroundColor Red "[failed update] Missing secure internet connection to $TssReleaseServer. Please download https://aka.ms/getTSS `n" } $ScriptEndTimeStamp = Get-Date $Duration = $(New-TimeSpan -Start $ScriptBeginTimeStamp -End $ScriptEndTimeStamp) "$(Get-Date -f 'yyyy-MM-dd HH.mm.ss.fff') [Info] Script $scriptName v$updScriptVersion execution finished. Duration: $Duration" | Out-File $UpdLogfile -Append Write-Host -ForegroundColor Black -background gray "[Info] Script $scriptName v$updScriptVersion execution finished. Duration: $Duration" if ($AutoUpd) { Write-Host -ForegroundColor Yellow "[AutoUpdate done] .. Please repeat your TSS command now."} #endregion ::::: [MAIN] -------------------------------------------------------------# #region ::::: [ToDo] ----------------------------------------------------------------# <# ToDo: - save any CX changed file like \config\tss_config.cfg into a [backup_v...] subfolder with prev. version, --> easy restoration, if there is no schema change see "...saving a copy of installed TSS.ps1 ..." - allow TSS to update from CX Central Enterprise store \\server\share\tss defined in \config\tss_config.cfg, if update from CesdiagTools/GitHub fails - Implement a scheduled task for periodic update check Example one-line command: schtasks.exe /Create /SC DAILY /MO 1 /TN "tss Updater" /TR "powershell \path\to\script\get-latest-tss.ps1 -TSS_path 'path\to\where\tss\is' -tss_arch 'x64'" /ST 12:00 /F [/SC DAILY]: Run daily [/MO 1]: Every Day [/TN "tss Updater"]: Task Name [/TR "powershell \path\to\script\get-latest-tss.ps1 -TSS_path 'path\to\where\tss\is' -tss_arch 'x64'"]: Command to run [/ST 12:00]: Run at 12 PM [/F]: Force update #> #endregion ::::: [ToDo] ----------------------------------------------------------------# # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCATivE+bB5w/UTK # 082jszlwEqCDH713qgRrblFpYmYdhaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEmY # N/EqebgwQWcX4DY5wD1u4qmhRgq61+NVGfvA+jmfMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA4DtkLNJK3c6Chv0Tsrb0wYSdEF02QCGDr7AO # D5kWeVchIng2D9vGjNoMFP3jImuJhEzUkiD6d6oOWt48upiUChTRUwHKTn+zMsgO # KC6yiZkXvd3gEe+wB0mrQL+/0XE0XgqIFdm2h6Yw+7LV16xFN8OaQlY6GeaXxucI # c05dFycw8tbE7cfFkVBIHgpS2H8OJvuky+qNuuJglQf3+UZo40LzS120JV9q0fdI # hY5EZn3bx76e13PIzqpbmXrPlnGTUEOCa6UBM+rVUpTUz2vRywuWEE2fpg4Tl8oy # 0p1bMSvDcot9MFptg0vIhVAfCSUNH/cwYi+PvBTRx6fWrhXdA6GCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBD9NRyODJ/8eMR03iS90wDgsE07/FFwtSY # NQ7qUqHMxAIGZkZX1jGtGBMyMDI0MDYxMjE1MDA0NS4xMzZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB # AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj # cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35 # Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo # /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs # zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J # uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l # RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/ # lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg # NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ # NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8 # YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF # Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+ # 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS # kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY # fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ # CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7 # 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk # rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR # a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh # 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z # 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW # TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4 # TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff # CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hPEJTAi # GA8yMDI0MDYxMjA2NTIyMVoYDzIwMjQwNjEzMDY1MjIxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqE8QlAgEAMAcCAQACAgzLMAcCAQACAhN9MAoCBQDqFRWlAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIAlF48QzlI0/nUHE309In7Re3wM # MsGVjJvH8QyDFSgdoxa7iAmmbjxSHDj6ROWkpC+pwCh+5mnmtyOY+qgPJEZEcevG # QOsMAgxSDwgFkjGjLOH10ANMGpv4Lgoff15oV0kg8+vW2w/iCzmazenro/KU2s6j # Z27cpZ1OxWwThafsEoZaHcAVrR5ltkJExcEgSxfLnFTE9citlY/FGfJPAoPLArf9 # as9MesxZrnhwS1Rdd46zfa2R/Wt/seKge8aJHEJfs3QRx4M+hhQUVBnsyUrMImxM # vXTW9w442Q6+6RTSZb8etmYaQLmFut1dPrTkvFtMH2B/ScfASx1jnJLzzY4xggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ # Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBk6x+eunr5FF/U5y5BFQd0xOZw # QiMbmi7mxH9CL6JvtDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao # HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgy6KmSaER # UFw5zM8ixrWjedEWrCkXYG0+8JQBRQ+GJXIwDQYJKoZIhvcNAQELBQAEggIAbOmt # xi1vxCLdbYZHVBX2HY60BUGhB72n04H7g7WD5o6Jy77ii7nRMGF90KnJDl0lYbOy # aP8nD5F7+fQmxH5Us/nbyqv/b9NBuYZOyJlUgEdLmv97Yc300hVnP9tmlwKx7iEw # N4pMRERYcWzMokQ3K/fVuCgnDz5y6OjEAlP9nmSy7fUL3/GoKkx1ekhgbJ+vm6zM # CXx2DlSBFZdTll40bliPgQrKLPVgcUBulzSHFKksIzKL/DPmccLCvQ5Fh/toPuEz # wFEiEKShnzHMDOUS2kLtaKxNKFPCrIG6UxhzL8MjYBgC9bPm0U4iGwaZIe9IWalB # 3k8FTo3v+8vMA+oyVlz9VATocO6RkkJ4y8F9Sy8fSSdNfKRpWAqyU5peh9KyTp+N # D+i2vdKYXxLtpI1uN0d4wDNHyp8mHF4tZcZ8kntxc9Xb3SsvhiocVQNXcipoIKkB # a2GF2nCQSuDVRCurDyFwpAXg+EXuXTRNeF097b5yiGRnZVDEZYc0zRCIowdhWcbE # GFXTwISI5J+G5hAE7mLA6ON6aPgUL6elJMgW1Is+k/Ipnt1DWW2Kt0NObKZcIZK+ # keZhqLOjHYq0eGpms4qiMXpw+Radl7UmVHkKjS8PUiZ6en9rGErCuAOQ3X7O0I+j # 0PfQ5MNINlszdJOt03CEPkMZC9LLIUrhtyWeq4g= # SIG # End signature block
combined_dataset/train/non-malicious/2523.ps1
2523.ps1
$wc = new-object net.webclient $js = $wc.DownloadString('http://www.quotedb.com/quote/quote.php?action=random_quote&=&=&') function strip-html([string] $str) { $val = $str -replace '<[^>]+>', '' $val = $val -replace '`', "'" return $val } function next-word([string] $text, [int] $start) { $end = $start for ( ; $end -lt $text.Length; $end += 1 ) { if ( $text[$end] -eq ' ' ) { break } } return $text.Substring($start, $end - $start) } function wrap-text([string] $text) { $buf = new-object Text.StringBuilder $lnl = $host.UI.RawUI.WindowSize.Width - 2 $pos = 0 $linepos = 0 while ( $pos -lt $text.Length ) { $word = (next-word $text $pos) if ( $linepos + $word.Length -gt $lnl ) { [void] $buf.Append("`n") $linepos = 0 } [void] $buf.Append($word + ' ') $pos += $word.Length + 1 $linepos += $word.Length + 1 } write $buf.ToString() } if ( $js -ne $null ) { $js = $js.trim() $p1 = "^.+'(?<text>.+)<br>'\);" $p2 = '">(?<author>.+)</a>' $authorline = $js.Substring($js.LastIndexOf("`n")) $maintext = $js.Substring(0, $js.LastIndexOf("`n")) if ( $maintext -match $p1 ) { $matches.text.Split("`n") | %{ wrap-text (strip-html $_) } } if ( $authorline -match $p2 ) { write "`t`t-- $($matches.author)" } }
combined_dataset/train/non-malicious/sample_10_35.ps1
sample_10_35.ps1
ConvertFrom-StringData @' id_tcpipsettingscheck=Checking for KB 967224 id_tcpipsettingscheckdesc=Checking for modified TcpIp Reg Parameters '@ # SIG # Begin signature block # MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCsUKoAPgVyiHQL # tsIGkcDwAbwwhuY9twQtMouMJucIcaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIB3b # +tiD4Z0z94dMUZRJMkEw/2mIsLW+ZBerlc/reA+NMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAOBbnZlfdbpCkuUS8z8ERhq5bd1Vo3yQUF2Z5 # 3R6T5AYbzbj7Ntv/d8y2ziR5+7/3oiqWw3n678lMF22KL1vzOkdU+hGasv6U+QV6 # Q8Fj/Vzl7X2FyQENKYwgSIYe+pJB3/ZYK7JQKWWf5WL/RCIa0Ak3cV2MmNLqNr8H # ZDF7l3jBpBeheOXBXPgdCaSvUy2BoOtzkDOdmSOStsOOqdyd9YhyNRVHzZrUBsgx # qjRIo9Q0DK25PWnKRkRAJZsRWPXSnhZsbbRf8RSbLjS6wGSrA1Iow1zDLSCHuTXH # /hb0BzhumwxXaljTzcQGERyLnBA2prMZY7yO2nPIzC4YNPxKmKGCF6wwgheoBgor # BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBkmixomMugDhiMK+TLLUVrp6m/WhTktKPy # kQqRp0rQhwIGZut4BYxhGBIyMDI0MTAyODExNDA0MC4zNFowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH1mQmU # vPHGUIwAAQAAAfUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTAxWhcNMjUxMDIyMTgzMTAxWjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NjUxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM # 73RwVBNZ39Y/zghPskwhbV9AvrWx1+CaGV9PSe9gRvaS+Q0XTvdnCO965Jai3fzs # uMTRMKIb3d7ojQfMgVAGdvEY/9Y8FSKsWrtYTlECy6E19hQv48hv2MmrcLBbEgJ/ # Dm3+lPIg4eMq+jWVA5NZnKmKv+mxnAQTvLa5YA9tklMWsp6flHvfHYdvHLh5bUNy # ZePKbbAVa/XSwEfjRqMl9746TBxN2hitjcqSk39FBKN7JwrRuGOjQIZghhr5kwBq # jRI1H9HUnVjqwuSIIk7dpCttLVLPuX7+omDLx/IRkw0PkyzsLSwRo6+gEeJZKlMz # i9zTEMsKZzo8a/TcK1a7YqLKqsvwEAHURjI5KEjchPv1qsMgOsv5173UV+OZJsFj # mP4e9LSXd1eSM/ceifxvviVbCKQXSvMSsXSfeSFUC6zHtKbWgYb7TqHP1cDLdai7 # 5PpJ7qhrksOJCA9N9ZH+P0U2Twm7TqhJ9OHpzTdXS6WVrQjDL4fNSX5aZjEUtTQ+ # JpeyaC503BWqfnXOv4GLdc8nznBa7LoYZPucEOZc3NM2TMr3wMFCNM5ptBdRnzzh # hv0MU1yKCZ5VNiTJRdnqGxx3w3KrjkDcPduT6deeyiArVnvNmPpdsZ+3vGA5i+95 # TqnT5+u2FsXsxe/6LmpwP0d8WY6rhVgd69V6xhvo/QIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFFXgfFv1SjSgcPAlkl7baLF7YHUBMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQBzDGZU9oD3Ed9+6ibRM5KnaGym5/UbRwdb8pccC6Gelbz9K+WrmP1ooj/z # 8bp8YhAyvTOWlq7yPLzcjjNyUZ0mOXlLTZLEOVQprC1a+B/uJ1rTo+CN5AzV5fgu # 63hts99PQUSnvsbvqGHKxfFMk0e/nL5/BOFR6KJyWKFnCpxkylrjqb6hXqKBNToj # QSed6i0yoWzRDfMeBVWvhZeOcbYFyeSKnjZ53KD/2JdzOpMGsSS9PPRSWW2kUZpC # cvOr42jxUSCrRQbtbUQtkaGabEWYcAHBNPqw8kVXrwN8ugLSIH1Btv1Vnya9tNXk # m0hIGSVO5UCUSTNeL0siM2bH6Sd0F8o/x3Eb/FtFem1ANANoKxLqiAuTAuAfrNKz # 66X1abMjQXzMiZuGdmFTOIgeF4Wjgf5miiM9hyBMrr/duRJs5puZAV/3kHwHp7la # pdtLmz050x1SVbWBMjWvm75YDAfYobt3Gd6hNt/+NiXdNS0/sAenJyTZzSe6f9DQ # LJylr1BQf8PLTWTq1CiY1caOK+Db8EZyBknQfDwLopV6UQnfXEugTbWb340SBIoJ # GgUTUuSZrfVLIhrKdt1gRvyw6VnKcx2bzI+V0PC4Xni8mIQCuOtwM1d7oGhtlSJN # ZIq+/UMlp1HVJQI7853bUaBT6Fmq750qCMoBh15Mi+L1Hau0tjCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAmwAq7jw1tHlhG # DdZIFALKPN2S9qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6sleZDAiGA8yMDI0MTAyODAwNTA0NFoYDzIwMjQx # MDI5MDA1MDQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyV5kAgEAMAcCAQAC # AhSMMAcCAQACAhQKMAoCBQDqyq/kAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBAKNc+HZ9Owy4FALThiZqE9MX/Dt3yIO/D8D6vLRRZED2Swh/9aZjxQArtXdR # Clleg9AM/69++6bXkl2iij39eUrYdwZYRcJPwVN9TYWPDUrUzpWtmtfxeWYzqBJP # BSTuFnTrSjMFAEQN6WEZFq0FDiz6XZFfVMw/nrJCgzgNZziphJVTz0gtVqahd7cX # IxoT0+pGiGSgcuGXy+Yh04tJCqDXKFFCXn21xUzroBexyzBfiM14WiW24L1P0o5E # vcq8WCvHtfMRC+vZaUTBoCLhzgpR00aHJeRNX09SdZGaZUNxsyWXy2blEIlZkgE0 # KHJ19kRNOFw9dF2vPncB5cfKx9gxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfWZCZS88cZQjAABAAAB9TANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCBigyulqeKu+nCoqVIteeCqhRyWGNbPwRm7xBSF231daTCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIMHW8tIXCHT0hK7iR0S/j+2D15HViTzDnHuPkZOG # po81MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH1 # mQmUvPHGUIwAAQAAAfUwIgQgqvkQfjV423MDseN5AE59kH9OxJT+syELyq4fW7Up # ggswDQYJKoZIhvcNAQELBQAEggIAluHGc/lSEWn33J3nYBmDj05cKsrJ99/tKdep # fJVYD0zKQ6tcM404fKDCq82ClF1Jr1Vh9LUnrdj2qb9k5amdN0pbB+GDk2HYQEie # +a9pM/kYhjesdwgQ3YpnFijMZWz4XRi1WeZHwUvQmaGB8dwduTVc8pfk71rdgm8c # FKVrX0k7k+wZ6A39gvuoGrndE0lUOl4ZysD3dH9OYBNXxvqWBB4UNGOGpyEcY+u9 # t/oKbmKJaYbUeRo67DuEBLGvQ8kE9OmF2F1g/gvm/wlb96+32g49+uRkjxtj4aOi # gosdohpo/N0NP3roGuDeILUDJE8G9iFJC4RB1sHhfli7bhFfNAD2n4CkD50RTotE # UQRo6cDIXDMWa1kxKV2eQJNWJszT2yHBu3pUgyiFprz5+BwDEd9MWc4ToDTkCOI8 # Eu4kwiZH/RKVFjYPRsEy14USLUjhctNJWpCZ90Jdwd0345/6sMdlfvGnrhsBVnQ3 # 1bSEj+N1+ZNy7vuTsy2aYwU8xLM1zW7On+ldnPsACU7TtmkPwuLU00IQKCg4feL5 # WAxyqTQPzweYrHVlBd8HO7yD+KCoAtxTPgw6l6qePVhfRi5kzD2QHktvHa1mdXOZ # VsZjduRczB5A++BR8Kg8uk/ZaChm6tvANo5XexJCxXXqzHrnMhNkFhtkDrbsvOxC # YLG5KAM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_57_46.ps1
sample_57_46.ps1
# Localized 06/28/2023 08:21 AM (GMT) 303:7.0.30723 rs_resetidledisktimeout.psd1 ConvertFrom-StringData @' ###PSLOC reset_DiskIdleTimeout=Rétablissement du délai d’inactivité du disque Report_name_DiskIdleTimeout_AC_result=Résultat du rétablissement du délai d’inactivité du disque pour le courant alternatif Report_name_DiskIdleTimeout_DC_result=Résultat du rétablissement du délai d’inactivité du disque pour le courant continu Report_name_DiskIdleTimeout=Réglage du délai d’inactivité du disque AC_settingvalue_original=Paramètre d’origine pour le courant alternatif DC_settingvalue_original=Paramètre d’origine pour le courant continu AC_settingvalue_reset=Nouveau paramètre pour le courant alternatif DC_settingvalue_reset=Nouveau paramètre pour le courant continu ###PSLOC '@
combined_dataset/train/non-malicious/Download File (with %).ps1
Download File (with %).ps1
<# .SYNOPSIS Downloads a file showing the progress of the download .DESCRIPTION This Script will download a file locally while showing the progress of the download .EXAMPLE .\\Download-File.ps1 'http:\\\\someurl.com\\somefile.zip' .EXAMPLE .\\Download-File.ps1 'http:\\\\someurl.com\\somefile.zip' 'C:\\Temp\\somefile.zip' .PARAMETER url url to be downloaded .PARAMETER localFile the local filename where the download should be placed .NOTES FileName : Download-File.ps1 Author : CrazyDave LastModified : 18 Jan 2011 9:39 AM PST #Requires -Version 2.0 #> param( [Parameter(Mandatory=$true)] [String] $url, [Parameter(Mandatory=$false)] [String] $localFile = (Join-Path $pwd.Path $url.SubString($url.LastIndexOf('/'))) ) begin { $client = New-Object System.Net.WebClient $Global:downloadComplete = $false $eventDataComplete = Register-ObjectEvent $client DownloadFileCompleted ` -SourceIdentifier WebClient.DownloadFileComplete ` -Action {$Global:downloadComplete = $true} $eventDataProgress = Register-ObjectEvent $client DownloadProgressChanged ` -SourceIdentifier WebClient.DownloadProgressChanged ` -Action { $Global:DPCEventArgs = $EventArgs } } process { Write-Progress -Activity 'Downloading file' -Status $url $client.DownloadFileAsync($url, $localFile) while (!($Global:downloadComplete)) { $pc = $Global:DPCEventArgs.ProgressPercentage if ($pc -ne $null) { Write-Progress -Activity 'Downloading file' -Status $url -PercentComplete $pc } } Write-Progress -Activity 'Downloading file' -Status $url -Complete } end { Unregister-Event -SourceIdentifier WebClient.DownloadProgressChanged Unregister-Event -SourceIdentifier WebClient.DownloadFileComplete $client.Dispose() $Global:downloadComplete = $null $Global:DPCEventArgs = $null Remove-Variable client Remove-Variable eventDataComplete Remove-Variable eventDataProgress [GC]::Collect() }
combined_dataset/train/non-malicious/Get-SqlWmi.ps1
Get-SqlWmi.ps1
try {add-type -AssemblyName "Microsoft.SqlServer.SqlWmiManagement, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.SqlWmiManagement"} ####################### <# .SYNOPSIS Gets SQL Server WMI information. .DESCRIPTION The Get-SqlWmi function gets port, instance and service account wmi information for all SQL instances on a computer. .EXAMPLE Get-SqlWmi "Z002" This command gets information for computername Z002. .NOTES Version History v1.0 - Chad Miller - Initial release #> function Get-SqlWmi { [CmdletBinding()] param( [Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullorEmpty()] [string[]]$ComputerName ) #Microsoft.SqlServer.Management.Smo.Wmi.ManagedComputer only works on SQL 2005 and higher. If we fail to gather info at least output #null values and computername for 2000 servers in catch block BEGIN {} PROCESS { foreach ($computer in $computername) { try { $wmi = new-object "Microsoft.SqlServer.Management.Smo.Wmi.ManagedComputer" $Computer -ErrorAction 'Stop' $ht = @{} $wmi.Services| where {$_.Type -eq 'SqlServer'} | foreach {$instance = $_.PathName -replace '".+"\\s{1}-s',""; $ht.Add($instance,$_.ServiceAccount)} $wmi.ServerInstances | foreach { new-object psobject -property @{ ComputerName=$Computer; Port=$_.ServerProtocols["Tcp"].IPAddresses["IPAll"].IPAddressProperties["TcpPort"].Value; AccountName=$ht[$_.Name]; Instance=$_.Name } } } catch { #SQL Server 2000 Does not support the WMI.ManagedComputer class. Try and use SQL-DMO try { $dmoServer = New-Object -comobject "SQLDMO.SQLServer" $dmoServer.loginsecure = $true $instances = $dmoServer.ListInstalledInstances($computer) | foreach {($_) } $dmoServer = $null #Clustered server will list server1\\instance1 and server2\\instance2 #Filter so just server1 is listed $instances | where { $_ -like "$computer*"} | foreach { $dmoServer = New-Object -comobject "SQLDMO.SQLServer" $dmoServer.loginsecure = $true $dmoServer.connect($_) new-object psobject -property @{ ComputerName=$Computer; Port=$dmoServer.registry.tcpport; AccountName=$dmoServer.StartupAccount; Instance = $dmoServer.ServiceName -replace 'MSSQL\\$','' } $dmoServer.close() $dmoServer = $null } } catch { new-object psobject -property @{ComputerName=$Computer;Port=$null;AccountName=$null;Instance=$null} } } } } END {} } #Get-SqlWmi
combined_dataset/train/non-malicious/722.ps1
722.ps1
function Out-RsCatalogItem { [CmdletBinding()] param ( [Alias('ItemPath', 'Path', 'RsFolder')] [Parameter(Mandatory = $True, ValueFromPipeline = $true)] [string[]] $RsItem, [ValidateScript({ Test-Path $_ -PathType Container})] [Parameter(Mandatory = $True)] [string] $Destination, [string] $ReportServerUri, [Alias('ReportServerCredentials')] [System.Management.Automation.PSCredential] $Credential, $Proxy ) Begin { $Proxy = New-RsWebServiceProxyHelper -BoundParameters $PSBoundParameters $DestinationFullPath = Convert-Path $Destination } Process { foreach ($item in $RsItem) { try { $itemType = $Proxy.GetItemType($item) } catch { throw (New-Object System.Exception("Failed to retrieve item type of '$item' from proxy: $($_.Exception.Message)", $_.Exception)) } switch ($itemType) { "Unknown" { throw "Make sure item exists at $item and item is of type Report, DataSet, DataSource or Resource" } "Resource" { $fileName = ($item.Split("/"))[-1] } default { $fileName = "$(($item.Split("/"))[-1])$(Get-FileExtension -TypeName $itemType)" } } Write-Verbose "Downloading $item..." try { $bytes = $Proxy.GetItemDefinition($item) } catch { throw (New-Object System.Exception("Failed to retrieve item definition of '$item' from proxy: $($_.Exception.Message)", $_.Exception)) } Write-Verbose "Writing $itemType content to $DestinationFullPath\$fileName..." try { if ($itemType -eq 'DataSource') { $content = [System.Text.Encoding]::Unicode.GetString($bytes) [System.IO.File]::WriteAllText("$DestinationFullPath\$fileName", $content) } else { [System.IO.File]::WriteAllBytes("$DestinationFullPath\$fileName", $bytes) } } catch { throw (New-Object System.IO.IOException("Failed to write content to '$DestinationFullPath\$fileName' : $($_.Exception.Message)", $_.Exception)) } Write-Verbose "$item was downloaded to $DestinationFullPath\$fileName successfully!" } } End { } }
combined_dataset/train/non-malicious/sample_61_18.ps1
sample_61_18.ps1
# # Module manifest for module 'OCI.PSModules.Dts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dts.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage', 'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList', 'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance', 'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate', 'Get-OCIDtsTransferApplianceEncryptionPassphrase', 'Get-OCIDtsTransferApplianceEntitlement', 'Get-OCIDtsTransferApplianceEntitlementList', 'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice', 'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob', 'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage', 'Get-OCIDtsTransferPackagesList', 'Mount-OCIDtsDevicesToTransferPackage', 'Move-OCIDtsApplianceExportJobCompartment', 'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob', 'New-OCIDtsTransferAppliance', 'New-OCIDtsTransferApplianceAdminCredentials', 'New-OCIDtsTransferApplianceEntitlement', 'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob', 'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob', 'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice', 'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage', 'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance', 'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob', 'Update-OCIDtsTransferPackage' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/SqlProxy_4.psm1.ps1
SqlProxy_4.psm1.ps1
# --------------------------------------------------------------------------- ### <Author> ### Chad Miller ### </Author> ### <Description> ### Based on functions in SQLPSX. SqlProxy.psm1 module is used for administering ### SQL Server logins, users, and roles. Designed to be used with PS Remoting. ### All actions audited to a custom Eventlog. ### See Write-SqlProxyLog for log setup details ### </Description> # --------------------------------------------------------------------------- try {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.ConnectionInfo"} try {add-type -AssemblyName "Microsoft.SqlServer.Smo, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.Smo"; $smoVersion = 9} try {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop; $smoVersion = 10} catch {add-type -AssemblyName "Microsoft.SqlServer.SqlEnum"; $smoVersion = 9} try { try {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended, Version=10.0.0.0, Culture=neutral, PublicKeyToken=89845dcd8080cc91" -EA Stop} catch {add-type -AssemblyName "Microsoft.SqlServer.SMOExtended" -EA Stop} } catch {Write-Warning "SMOExtended not available"} $EventID = @{ "Add-SqlDatabaseRoleMember"=0 "Add-SqlLogin"=1 "Add-SqlServerRoleMember"=2 "Add-SqlUser"=3 "Remove-SqlDatabaseRoleMember"=4 "Remove-SqlLogin"=5 "Remove-SqlServerRoleMember"=6 "Remove-SqlUser"=7 "Rename-SqlLogin"=8 "Set-SqlLogin"=9 "Set-SqlLoginDefaultDatabase"=10 } ####################### <# .SYNOPSIS Gets a ServerConnection. .DESCRIPTION The Get-SqlConnection function gets a ServerConnection to the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlConnection .OUTPUTS Microsoft.SqlServer.Management.Common.ServerConnection Get-SqlConnection returns a Microsoft.SqlServer.Management.Common.ServerConnection object. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" This command gets a ServerConnection to SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlConnection "Z002\\sql2K8" "sa" "Passw0rd" This command gets a ServerConnection to SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlConnection #> function Get-SqlConnection { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password ) Write-Verbose "Get-SqlConnection $sqlserver" try { if($Username -and $Password) { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver,$username,$password } else { $con = new-object ("Microsoft.SqlServer.Management.Common.ServerConnection") $sqlserver } $con.Connect() Write-Output $con } catch { $message = $_.Exception.GetBaseException().Message write-error $message } } #Get-ServerConnection ####################### <# .SYNOPSIS Gets an SMO Server object. .DESCRIPTION The Get-SqlServer function gets a SMO Server object for the specified SQL Server. .INPUTS None You cannot pipe objects to Get-SqlServer .OUTPUTS Microsoft.SqlServer.Management.Smo.Server Get-SqlServer returns a Microsoft.SqlServer.Management.Smo.Server object. .EXAMPLE Get-SqlServer "Z002\\sql2K8" This command gets an SMO Server object for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" This command gets a SMO Server object for SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlServer #> function Get-SqlServer { param( [Parameter(Position=0, Mandatory=$true)] [string]$sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$username, [Parameter(Position=2, Mandatory=$false)] [string]$password, [Parameter(Position=3, Mandatory=$false)] [string]$StatementTimeout=0 ) #When $sqlserver passed in from the SMO Name property, brackets #are automatically inserted which then need to be removed $sqlserver = $sqlserver -replace "\\[|\\]" Write-Verbose "Get-SqlServer $sqlserver" $con = Get-SqlConnection $sqlserver $Username $Password $server = new-object ("Microsoft.SqlServer.Management.Smo.Server") $con #Some operations might take longer than the default timeout of 600 seconnds (10 minutes). Set new default to unlimited $server.ConnectionContext.StatementTimeout = $StatementTimeout $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.StoredProcedure], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.Table], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.View], "IsSystemObject") $server.SetDefaultInitFields([Microsoft.SqlServer.Management.SMO.UserDefinedFunction], "IsSystemObject") #trap { "Check $SqlServer Name"; continue} $server.ConnectionContext.Connect() Write-Output $server } #Get-SqlServer ####################### <# .SYNOPSIS Gets an SMO Database object. .DESCRIPTION The Get-SqlDatabase function gets an SMO Database object for the specified SQL Database or collection of Database objects. .INPUTS None You cannot pipe objects to Get-SqlDatabase .OUTPUTS Microsoft.SqlServer.Management.Smo.Database Get-SqlDatabase returns a Microsoft.SqlServer.Management.Smo.Database object. .EXAMPLE Get-SqlDatabase "Z002\\sql2K8" This command gets a collection of SMO Database objects for SQL Server Z002\\SQL2K8. .EXAMPLE Get-SqlDatabase $(Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd") "pubs" This command gets a SMO Database object for SQL database pubs on the SQL Server Z002\\SQL2K8 using SQL authentication. .LINK Get-SqlDatabase #> function Get-SqlDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$false)] [string]$dbname ) switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Get-SqlDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Get-SqlDatabase $($server.Name) $dbname" if ($dbname) { if ($server.Databases.Contains("$dbname") -and $server.Databases[$dbname].IsAccessible) {$server.Databases[$dbname]} else {throw "Database $dname does not exist or is not accessible."} } else { $server.Databases | where {$_.IsAccessible -eq $true} } } # Get-SqlDatabase ####################### <# .SYNOPSIS Executes a query and returns an array of System.Data.DataRow. .DESCRIPTION The Get-SqlData function executes a query and returns an array of System.Data.DataRow. .INPUTS None You cannot pipe objects to Get-SqlData .OUTPUTS System.Data.DataRow Get-SqlData returns an array of System.Data.DataRow. .EXAMPLE Get-SqlData "Z002\\sql2K8" "pubs" "select * from authors" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Get-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Get-SqlData $server "pubs" "select * from authors" This command executes the specified SQL query using SQL authentication. .LINK Get-SqlData #> function Get-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Get-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Get-SqlData $($database.Parent.Name) $($database.Name)" $ds = $database.ExecuteWithResults("$qry") $ds.Tables | foreach { $_.Rows} }# Get-SqlData ####################### <# .SYNOPSIS Executes a query that does not return a result set. .DESCRIPTION The Set-SqlData function executes a query that does not return a result set. .INPUTS None You cannot pipe objects to Set-SqlData .OUTPUTS None Set-SqlData does not produce any output. .EXAMPLE Set-SqlData "Z002\\sql2K8" "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using Windows authentication. .EXAMPLE $server = Set-SqlServer "Z002\\sql2K8" "sa" "Passw0rd" Set-SqlData $server "pubs" "Update authors set au_lname = 'Brown' WHERE au_lname = 'White'" This command executes the specified SQL query using SQL authentication. .LINK Set-SqlData #> function Set-SqlData { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$dbname, [Parameter(Position=2, Mandatory=$true)] [string]$qry ) switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Set-SqlData:Param '`$dbname' must be a String or Database object." } } #Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name) $qry" Write-Verbose "Set-SqlData $($database.Parent.Name) $($database.Name)" $database.ExecuteNonQuery("$qry") }# Set-SqlData ####################### <# .SYNOPSIS Adds a login to a SQL Server. .DESCRIPTION The Add-SqlLogin function adds a new login to the specified SQL server. .INPUTS None You cannot pipe objects to Add-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlLogin "Z002\\sql2k8" "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlLogin $server "TestPSUnit" "SQLPSXTesting" 'SqlLogin' This command adds the TestPSUnit login to the Z002\\sql2k8 server. .LINK Add-SqlLogin #> function Add-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$false)] [System.Security.SecureString]$password, [Parameter(Position=3, Mandatory=$false)] [Microsoft.SqlServer.Management.Smo.LoginType]$logintype='WindowsUser', [Parameter(Position=4, Mandatory=$false)] [string]$DefaultDatabase='master', [Parameter(Position=5, Mandatory=$false)] [switch]$PasswordExpirationEnabled, [Parameter(Position=6, Mandatory=$false)] [switch]$PasswordPolicyEnforced, [Parameter(Position=7, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=8, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlLogin $($server.Name) $name" try { $login = new-object ('Microsoft.SqlServer.Management.Smo.Login') $server, $name $login.DefaultDatabase = $defaultDatabase $login.LoginType = $logintype if ($logintype -eq 'SqlLogin') { if ($server.Information.Version.Major -ne '8') { $login.PasswordExpirationEnabled = $($PasswordExpirationEnabled.IsPresent) $login.PasswordPolicyEnforced = $($PasswordPolicyEnforced.IsPresent) } $login.Create($password) } else { $login.Create() } $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Add-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Remove-SqlLogin function removes a login from the specified SQL server. .INPUTS None You cannot pipe objects to Remove-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlLogin "Z002\\sql2k8" "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlLogin $server "TestPSUnit" This command removes the TestPSUnit login from the Z002\\sql2k8 server. .LINK Remove-SqlLogin #> function Remove-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=3, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlLogin $($server.Name) $name" try { $login = $server.Logins["$name"] if ($login) { $login.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLogin function changes a SQL Login Password. .INPUTS None You cannot pipe objects to Set-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE $pwd_secure_string = read-host "Enter a Password:" -assecurestring Set-SqlLogin "Z002\\sql2k8" "TestPSUnit" $pwd_secure_string This command sets the password for TestPSUnit login. .LINK Set-SqlLogin #> function Set-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$password, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLogin $($server.Name) $name" try { $login = $server.Logins["$name"] if ($login) { $login.ChangePassword($password,$true,$false) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLogin ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Set-SqlLoginDefaultDatabase function changes a SQL Login default database. .INPUTS None You cannot pipe objects to Set-SqlLoginDefaultDatabase .OUTPUTS None This function does not generate any output. .EXAMPLE Set-SqlLoginDefaultDatabase "Z002\\sql2k8" "TestPSUnit" 'master' This command sets the default database for TestPSUnit login. .LINK Set-SqlLoginDefaultDatabase #> function Set-SqlLoginDefaultDatabase { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$DefaultDatabase, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Set-SqlLoginDefaultDatabase:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Set-SqlLoginDefaultDatabase $($server.Name) $name" try { $login = $server.Logins["$name"] if ($login) { $login.DefaultDatabase = $DefaultDatabase $login.Alter() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Set-SqlLoginDefaultDatabase ####################### <# .SYNOPSIS Removes a login from a SQL Server. .DESCRIPTION The Rename-SqlLogin function renames a SQL Login. .INPUTS None You cannot pipe objects to Rename-SqlLogin .OUTPUTS None This function does not generate any output. .EXAMPLE Rename-SqlLogin "Z002\\sql2k8" "TestPSUnit" "CheckPSUnit" This command renames the login TestPSUnit. .LINK Rename-SqlLogin #> function Rename-SqlLogin { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$name, [Parameter(Position=2, Mandatory=$true)] [string]$newname, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Rename-SqlLogin:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Rename-SqlLogin $($server.Name) $name $newname" try { $login = $server.Logins["$name"] if ($login) { $login.Rename("$newName") $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "Login $name does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Rename-SqlLogin ####################### <# .SYNOPSIS Adds a new user to a database. .DESCRIPTION The Add-SqlUser function adds a new user to the specified database. .INPUTS None You cannot pipe objects to Add-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlUser -dbname $database "TestPSUnit" This command adds the TestPSUnit login to the pubs database. .LINK Add-SqlUser #> function Add-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$false)] [string]$login=$name, [Parameter(Position=4, Mandatory=$false)] [string]$defaultSchema='dbo', [Parameter(Position=5, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=6, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlUser $($database.Name) $name" try { $user = new-object ('Microsoft.SqlServer.Management.Smo.User') $database, $name $user.Login = $login if ($database.parent.Information.Version.Major -ne '8') { $user.DefaultSchema = $defaultschema } $user.Create() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Add-SqlUser ####################### <# .SYNOPSIS Removes a user from a database. .DESCRIPTION The Remove-SqlUser function removes a user from the specified database. .INPUTS None You cannot pipe objects to Remove-SqlUser .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlUser "Z002\\sql2k8" "pubs" "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlUser -dbname $database "TestPSUnit" This command Removes the TestPSUnit user from the pubs database. .LINK Remove-SqlUser #> function Remove-SqlUser { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlUser:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlUser $($database.Name) $name" try { $user = $database.Users[$name] if ($user) { $user.Drop() $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "User $name does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } #Remove-SqlUser ####################### <# .SYNOPSIS Adds a login to a server role. .DESCRIPTION The Add-SqlServerRoleMember function adds a login to the specified server role. .INPUTS None You cannot pipe objects to Add-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Add-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command adds the TestPSUnit login to the bulkadmin server role. .LINK Add-SqlServerRoleMember #> function Add-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Add-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Add-SqlServerRoleMember $($server.Name) $name" if($server.Logins["$loginame"]) { try { $svrole = $server.Roles["$rolename"] if ($svrole) { $svrole.AddMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Add-SqlServerRoleMember ####################### <# .SYNOPSIS Removes a login from a server role. .DESCRIPTION The Remove-SqlServerRoleMember function removes a login from the specified server role. .INPUTS None You cannot pipe objects to Remove-SqlServerRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlServerRoleMember "Z002\\sql2k8" "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .EXAMPLE $server = Get-SqlServer "Z002\\sql2k8" Remove-SqlServerRoleMember $server "TestPSUnit" "bulkadmin" This command Removes the TestPSUnit login from the bulkadmin server role. .LINK Remove-SqlServerRoleMember #> function Remove-SqlServerRoleMember { param( [Parameter(Position=0, Mandatory=$true)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] [string]$loginame, [Parameter(Position=2, Mandatory=$true)] [string]$rolename, [Parameter(Position=3, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=4, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($sqlserver.GetType().Name) { 'String' { $server = Get-SqlServer $sqlserver } 'Server' { $server = $sqlserver } default { throw 'Remove-SqlServerRoleMember:Param `$sqlserver must be a String or Server object.' } } Write-Verbose "Remove-SqlServerRoleMember $($server.Name) $name" if($server.Logins["$loginame"]) { try { $svrole = $server.Roles["$rolename"] if ($svrole) { $svrole.DropMember($loginame) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "ServerRole $rolename does not exist on server $($server.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "Login $loginame does not exist on server $($server.Name)." } } #Remove-SqlServerRoleMember ####################### <# .SYNOPSIS Adds a user or role to a database role. .DESCRIPTION The Add-SqlDatabaseRoleMember function adds a user or role to the specified database role. .INPUTS None You cannot pipe objects to Add-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Add-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Add-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command adds the TestUnit user to the TestPSUnitDBRole database role. .LINK Add-SqlDatabaseRoleMember #> function Add-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Add-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Add-SqlDatabaseRoleMember $($database.Name) $name $rolename" if ($database.Users["$name"]) { try { $role = $database.Roles["$rolename"] if ($role) { $role.AddMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "User $name does not exist in database $($database.Name)." } } #Add-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Removes a user or role from a database role. .DESCRIPTION The Remove-SqlDatabaseRoleMember function removes a user or role from the specified database role. .INPUTS None You cannot pipe objects to Remove-SqlDatabaseRoleMember .OUTPUTS None This function does not generate any output. .EXAMPLE Remove-SqlDatabaseRoleMember "Z002\\sql2k8" "pubs" "TestPSUnit" "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .EXAMPLE $database = Get-SqlDatabase "Z002\\sql2k8" "pubs" Remove-SqlDatabaseRoleMember -dbname $database -name "TestPSUnit" -rolename "TestPSUnitDBRole" This command removes the TestUnit user to the TestPSUnitDBRole database role. .LINK Remove-SqlDatabaseRoleMember #> function Remove-SqlDatabaseRoleMember { param( [Parameter(Position=0, Mandatory=$false)] $sqlserver, [Parameter(Position=1, Mandatory=$true)] $dbname, [Parameter(Position=2, Mandatory=$true)] [string]$name, [Parameter(Position=3, Mandatory=$true)] [string]$rolename, [Parameter(Position=4, Mandatory=$true)] [string]$ChangeOrder, [Parameter(Position=5, Mandatory=$false)] [string]$Description ) $ErrorActionPreference = "Stop" $PSUserName = $PSSenderInfo.UserInfo.Identity.Name switch ($dbname.GetType().Name) { 'String' { $database = Get-SqlDatabase $sqlserver $dbname } 'Database' { $database = $dbname } default { throw "Remove-SqlDatabaseRoleMember:Param '`$dbname' must be a String or Database object." } } Write-Verbose "Remove-SqlDatabaseRoleMember $($database.Name) $name $rolename" if ($database.Users["$name"]) { try { $role = $database.Roles["$rolename"] if ($role) { $role.DropMember($name) $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage } else { throw "DatabaseRole $rolename does not exist in database $($database.Name)." } } catch { $message = $_.Exception.GetBaseException().Message $logmessage = "PSUserName=$PSUserName" + $($psBoundParameters.GetEnumerator() | %{"`n$($_.Key)=$($_.Value)"}) + "`n$message" write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $logmessage -EntryType 'Error' Write-Error $message } } else { throw "User $name does not exist in database $($database.Name)." } } #Remove-SqlDatabaseRoleMember ####################### <# .SYNOPSIS Writes an entry to SqlProxy Log File. .DESCRIPTION The Write-SqlProxyLog function writes an entry to the SqlProxy Log File. .INPUTS None You cannot pipe objects to Write-SqlProxyLog .OUTPUTS None This function does not generate any output. .EXAMPLE $message = "PSUserName=$PSUserName`n" + $($psBoundParameters.GetEnumerator() | %{"$($_.Key)=$($_.Value)"}) write-sqlproxylog -eventID $eventID."$($myinvocation.mycommand.name)" -message $message This command writes a message to the SQLProxy Log .NOTES This must be run as administrator to create the new EventLog and EventLog Source!!! New-EventLog -LogName SqlProxy -Source SqlProxy .LINK Write-SqlProxyLog #> function Write-SqlProxyLog { param( [Parameter(Position=0, Mandatory=$true)] $EventID, [Parameter(Position=1, Mandatory=$true)] $Message, [Parameter(Position=2, Mandatory=$false)] $EntryType='SuccessAudit' ) write-eventlog -logname SqlProxy -source SqlProxy -eventID $eventID -message $message -EntryType $EntryType } #Write-SqlProxyLog
combined_dataset/train/non-malicious/1019.ps1
1019.ps1
$subscriptionId = "<Enter Azure subscription ID here>" $labResourceGroup = "<Enter lab's resource name here>" $labName = "<Enter lab name here>" $userDisplayName = "<Enter user's display name here>" Login-AzAccount Select-AzSubscription -SubscriptionId $subscriptionId $adObject = Get-AzADUser -SearchString $userDisplayName $labId = ('subscriptions/' + $subscriptionId + '/resourceGroups/' + $labResourceGroup + '/providers/Microsoft.DevTestLab/labs/' + $labName) New-AzRoleAssignment -ObjectId $adObject.Id -RoleDefinitionName 'DevTest Labs User' -Scope $labId
combined_dataset/train/non-malicious/sample_20_54.ps1
sample_20_54.ps1
# # Module manifest for module 'Microsoft.SME.RolesFeatures' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.RolesFeatures.psm1' # Version number of this module. ModuleVersion = '4.13.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '0810520a-1db1-4256-baf2-d1caadc6509f' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Get-WACRFRoleAndFeatureDependencies', 'Get-WACRFRolesAndFeatures', 'Install-WACRFRolesAndFeatures', 'Uninstall-WACRFRolesAndFeatures', 'Get-WACRFCimWin32LogicalDisk', 'Get-WACRFCimWin32NetworkAdapter', 'Get-WACRFCimWin32PhysicalMemory', 'Get-WACRFCimWin32Processor', 'Get-WACRFClusterInventory', 'Get-WACRFClusterNodes', 'Get-WACRFDecryptedDataFromNode', 'Get-WACRFEncryptionJWKOnNode', 'Get-WACRFServerInventory' ) # Function attributes: {"localScripts":["Get-WACRFRoleAndFeatureDependencies","Get-WACRFRolesAndFeatures","Install-WACRFRolesAndFeatures","Uninstall-WACRFRolesAndFeatures"],"externalScripts":["Get-WACRFCimWin32LogicalDisk","Get-WACRFCimWin32NetworkAdapter","Get-WACRFCimWin32PhysicalMemory","Get-WACRFCimWin32Processor","Get-WACRFClusterInventory","Get-WACRFClusterNodes","Get-WACRFDecryptedDataFromNode","Get-WACRFEncryptionJWKOnNode","Get-WACRFServerInventory"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzQYJKoZIhvcNAQcCoIInvjCCJ7oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB+GhkVFpVAv716 # ohm1skmMNU3GePRTeNp0nfOT2QdzLKCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINpt # fJOirtuB3/m5VBew4hrC4/XkRoA/Dt+NsIrMu/wQMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA3bkqUeBu2LvE3UMD9guvJ7lbu8BRY7FUigzZ # qFS22iKbukuiJdKqA3Y1DwvXXnQmzFibrO9BP08ya/HglOsaJlVq2NFMehieFU2Z # 1B8DUK08uwCdDqdpFhRGQu54Ja6UQuvd0ZnhbeJKO06yb8cXbKEviZBzhS4Fk+dN # ERQGxWIy4oppewwVrobYIJaTCkMKlv9toGbBKkb55gA1u3pUqB3CTwdBG69aMjab # SfVV3PxnZV35OS+llKqt1kMZCjyTCiyXabD3pt42QrN4y8gEXcV3IyxJKboxYhSm # HDFXqOsNVzMK1A3ZOKCnPqM0BAzZFA8Xc3kgv3rKM+wD2H+0pKGCFygwghckBgor # BgEEAYI3AwMBMYIXFDCCFxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFYBgsqhkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAitak7zW7h3Z9lIyEH3TM1QUlZneObuGQV # JyIUMGAqXAIGZa0VdTOeGBIyMDI0MDEyOTIwMDM1MC4xMVowBIACAfSggdikgdUw # gdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd # VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDz # PbQLowABAAAB5TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDAeFw0yMzEwMTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3Nv # ZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBU # U1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T # dGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvg # Otq7Y7osusk7cfJO871pdqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhL # IkeOQwhQaa6HSs9Xn/b5QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2 # u7YbKaa3WusZw17zTQJwPp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpw # z95ae2RAyzSUrTOYJ8f4G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASL # Nj68WaDH7MO65T8YKEMruSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlW # qk/d2ko8A//i502qlHkch5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/x # xnXWRyjUm9TI5DzH8kOQwWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5B # HsVXt4KpX+V9qOguk83H/3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbP # Yv3pN3Gcg7Y4aZjEEABkBagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz # 9Sn+OkV9CK0t+N3vVxL5wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0n # MmcayRUnmjOGOLRhGxy/VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1Ud # DgQWBBTf/5+Hu01zMSJ8ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP0 # 5dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB # /wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOC # AgEAM/rCE4WMPVp3waQQn2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaA # UGJbAjpc6DDzaF2iUOIwMEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mA # Ljwj5v7bHZU2AYlSxAjI9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTA # V47n7ehJfgl4I1m+DJQ7MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CCh # iKltpO+/vGaLFQkZNuLFiJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNh # nJ4fIDKwwQAtsiF1eAcSHrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51 # y2dcIbnkm4zD/BvtzvVEqKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfp # OqXzhV+lh72IebLs+qrGowXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64 # n8wHrXJG9PWZTHeXKmk7bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML # 5N1lCWP5UyAibxl4QhE0XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgW # nEFlQTyacsq4OVihuOvGHuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgEC # AhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQg # Um9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVa # Fw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V # gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF # RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3X # D9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoP # z130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+ # tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5Jas # AUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/b # fV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuv # XsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg # 8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzF # a/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqP # nhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw # IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf # pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBB # MD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0Rv # Y3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGC # NxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8w # HwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmg # R4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWlj # Um9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEF # BQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29D # ZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEs # H2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk # wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL # btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCg # vxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsId # w2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2 # zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23K # jgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beu # yOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/ # tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjm # jJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBj # U02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHS # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN # aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo # YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg # VGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3 # zkSkzpGLCqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0G # CSqGSIb3DQEBBQUAAgUA6WIfszAiGA8yMDI0MDEyOTIwNTkzMVoYDzIwMjQwMTMw # MjA1OTMxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpYh+zAgEAMAcCAQACAhOq # MAcCAQACAhPiMAoCBQDpY3EzAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQB # hFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEA # Vn42ERjBmWRvUtfRk+5fUIhg6meUu+UTaZR9iXt/Xee1HEbeBGSI9wu1rcVhToTL # MDbbj3ezFH7sSe63Jx6gnVvj1YFPDhi8ltuOsao9yxfdpwH/tjslm2fkQFhhUn5U # J6we+4WGAm2so84S9FMlzCWTNFuD4ZoqaWRyDzjKBMkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB # 5TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCVaVlIjhWD1jzQELsTCGIWmI7J1NkpH/hvkHVQ2KQ2 # NDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vw # j+kCh/TULCFvFQf1Tr3tMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwIgQg1wTFjI8r16v2T/lxhkU0wkRt # 4I4XKdLp6Ja6DaZkvrMwDQYJKoZIhvcNAQELBQAEggIAqTnqKXpTnhAvo1ruuWmP # qaLeLpLJ/Qb0vukZ/7cWWKOHe176FAXQ6BRz+vnjsEoX69xnNYsKs1+MHmDvURmz # aKsRysfT6PggTtGs1c5HbIppKKMjr4EVHq0xat3Nq5CGKCNk2fpppdHUnXjR7Z0N # 3bgIcjiSKK+TNqX4TYngDJ+QJ5Mm3xc8UTa2x9rlX9mSyurxTkDDLdRB2i07LmH9 # 893UT1abolSPOwrKwxVndAbUYnDnY1/FlbaAMigsYD3RCAO4C9UMOqk8QJvnUEk8 # x3wbgtdeEaD2A5Kbzz00WSfO2pf3b4rUhuKmJloByWz3Xdq1xTHE4MztD3mTLJM8 # nxYNpTdQq9UpFGO/tOxNAOXpS2VVvBMHTKsy9l/x3rY5pJLsHcFemLxDZGFLf+yi # 5CmX0fUv+fbOm2TXcRS2LUxejKZUFWJpC2OzYjnEhoLU8oo7Ceftak4WqEYQx9NB # /Ar+UQt0LhnUd3Gun2+cukDXR5BxdZNui6nCQbkR1Z4rO+XFrLz3JOHfoKiwInVz # SeAOraRS/zRee+elNgpJ4jYtZe3pT1l9RG4iyZqfq9O6ObuTUdc3fDGEL9OuFtns # E+VxLAf3t4f8AiyQ/+FpQqWvuVzrh8KptkkSvJQrJxN4FqgDNT9tysGbifDN0EY0 # aUDQo+umZ4XFj2zkzepSn5w= # SIG # End signature block
combined_dataset/train/non-malicious/1951.ps1
1951.ps1
Describe "New-Guid" -Tags "CI" { It "returns a new guid" { $guid = New-Guid $guid | Should -BeOfType System.Guid } It "should not be all zeros" { $guid = New-Guid $guid.ToString() | Should -Not -BeExactly "00000000-0000-0000-0000-000000000000" } It "should return different guids with each call" { $guid1 = New-Guid $guid2 = New-Guid $guid1.ToString() | Should -Not -Be $guid2.ToString() } }
combined_dataset/train/non-malicious/Move-Mailbox _2.ps1
Move-Mailbox _2.ps1
param( #distribution group holding usermailbox(es) [string] $DistGroup = "XC2010Move", #move requests per batch/script run [int] $BatchCount = 5 ) #remove user(s) without mailbox Get-DistributionGroupMember $DistGroup | get-user -Filter {Recipienttype -eq "User"} -EA SilentlyContinue | Remove-DistributionGroupMember -Identity $DistGroup -Confirm:$False #set quotas on moved mailbox(es) and then remove from group Get-DistributionGroupMember $DistGroup | Get-Mailbox -RecipientTypeDetails "UserMailbox" -EA SilentlyContinue | Where {($_.MailboxMoveStatus -eq ‘Completed’)} | Set-Mailbox -IssueWarningQuota "1920MB" -ProhibitSendQuota "1984MB" -ProhibitSendReceiveQuota "2048MB" Get-DistributionGroupMember $DistGroup | Get-Mailbox -EA SilentlyContinue -RecipientTypeDetails "UserMailbox" | Remove-DistributionGroupMember -Identity $DistGroup -Confirm:$False #remove move request(s) upon completion Get-MoveRequest -MoveStatus Completed | Remove-MoveRequest -Confirm:$False #get pre-2010 mailbox(es) not yet moved $MB2Move = Get-DistributionGroupMember $DistGroup | Get-Mailbox -EA SilentlyContinue | Where {($_.RecipientTypeDetails -eq "LegacyMailbox") -and ($_.MailboxMoveStatus -eq ‘None’) -and ($_.ExchangeUserAccountControl -ne "AccountDisabled")} | Get-Random -Count $BatchCount #create batch label as reference $batch = "$($env:computername)_MoveMB_{0:ddMMM_yyyy}" -f (Get-Date) #move pre-2010 mailbox(es) ForEach ($SingleMailbox in $MB2Move) {New-MoveRequest –Identity $SingleMailbox -BadItemLimit 100 -AcceptLargeDataLoss -Batchname $batch}
combined_dataset/train/non-malicious/sample_13_38.ps1
sample_13_38.ps1
#************************************************ # TS_NetworkDTCEnabled.ps1 # Version 1.0.0 # Date: 03-23-2012 # Author: Jeremy LaBorde - jlaborde # Description: Checks to see if Network DTC # is enabled # #************************************************ . .\DistSvcs_Utils.ps1 Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_DSI_DistSvcs_RC_Activity -Status $ScriptStrings.ID_DSI_DistSvcs_RC_NetworkDTCEnabledNotice # read local DTC settings $local:security = Get-Item "registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\Security" # network DTC check $LocalNetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" # report on local DTC settings if( !($LocalNetworkDTCAccessOn) ) { AlertKnownIssue "RC_NetworkDTCEnabled" "Network DTC Is Not Enabled (Local DTC): http://support.microsoft.com/kb/817064" "Internal" } else { if( $global:gDebugSDPOn ) { Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false } } # now check cluster resources $local:clusterkeys = Get-Item "registry::HKEY_LOCAL_MACHINE\Cluster\Resources\*" -ErrorAction SilentlyContinue if( $null -ne $local:clusterkeys ) { # loop through each resource, looking for DTC ones foreach( $local:subkey in $local:clusterkeys ) { $local:type = Get-RegKeyValue $local:subkey.Name "Type" $local:name = Get-RegKeyValue $local:subkey.Name "Name" if( $null -ne $local:type -and $local:type -eq "Distributed Transaction Coordinator" ) { $ClusterResourceName = Get-RegKeyValue $local:subkey.Name "Name" if( [Environment]::OSVersion.Version -gt 5.2 ) # 7 / 2K8R2 / Vista / 2K8 { $local:security = Get-Item ("registry::" + ($local:subkey.Name + "\MSDTCPRIVATE\MSDTC\Security")) $NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" } else { # have to find the subkey that has a REG_SZ named MSDTC $local:clusternode = Get-RegistrySubKeyBasedOnEntry $local:subkey "MSDTC" "" if( $null -ne $local:clusternode ) { $local:security = ($local:clusternode.Name + "\Security") $NetworkDTCAccessOn = Get-RegKeyBool $local:security "NetworkDtcAccess" } } # report on cluster instance DTC settings if( !($NetworkDTCAccessOn) ) { $message = "Network DTC Is Not Enabled (Cluster Resource: " + $ClusterResourceName + "): http://support.microsoft.com/kb/817064" AlertKnownIssue "RC_NetworkDTCEnabled" $message "Internal" } else { if( $global:gDebugSDPOn ) { Update-DiagRootCause -id "RC_NetworkDTCEnabled" -Detected $false } } } } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDv89R5P3ztaEIP # +U5C0fxMkNd3Q+fciI9g8XlV+tRIGaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG0x # Z80PyAVAUkVlQMH8RYvEyhtV2JPyIZbCyZt9SbByMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAYt+riZ2KoJ39XCA6WMMWENMu/OsOynWhl0C0 # xGHYcghAFoaBhiHRYRFkHfS/XHhG3Kry6CN3gtJdPACBjy90CosTQ2BwfkeNTjZ4 # LN6BfPoAUS+KHdKanhaPMpzOsOlS1nUJKC9ADA0wk0hqTd/aqXRLGbAOCI2Ih6Tu # xz29zoH6NVz3AQurdZdLhQyu77vnH2WRQMMG2MK5sbpvwalj67XIb+lS/D2H5O6V # SCOePog4GUy5hmMca9MVcf7fs5Zw3+ieuQA3Ir0irYESbZXHwlA27Jyr89j0UK8m # B1iZL0JklwBrH8wvwxpMLeelLJwti39VWTSSuFocnugu0XkiZaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBzPaqMIQrkRKA9g9a5aaMT1H49qd1ghgyl # RPbzLAYGawIGZv8ZfhF4GBMyMDI0MTAyODExNDAzOS4yMThaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg2EzOsxEYg3A/sx/87OJO2ryiRVPvCQSIaBfypoATposwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICADP/OeZEiKTsZxq4iieteoR78tGpYkRdZ1Ry # jj8SZtp4cCPuVsDI0jzZudQr6DkeG79uVkTRV9s7ahfpH9AbAQBBLsYnNbmUBrjz # Kvk3gNYNmHy5O/W1fiLtNARLSw6bK/qKvS1L8E8fV5h+NRI6W0BANLpusYtwKPjC # XWjjM/r5xheejWdv2AEZGWme2TZ5mj5/ERusZ9lD9+AMArPbnRQvqxMMY4I2cP6y # Sjbf6OKbgfGZcCSAiz8y/I+lNHoD3Om/g+DsWcSs3It1lp3FuJ8qsNK08NcsOpTh # gf4dLePYyF7N9KY4UNNvWCC0m4AHibpxrnZiod4XFgs1/BPjumdCdyJR4z/v7oJU # lA0ABnG3mRbHp7qJBq7Vv//zS6csPYVBHaloIYvOtGm3NlsaT/5w7EzHAI2Ip6Bv # 5XVYgNKv0RvkNgCNX197QIhTv2spWIbJjZ1TKkhwHthMAsgejpHv3OotmA0HXuYL # vrwInTSt2sjqjPkQBXKToXw7fnTrxUqnzxmoYYjImfrMBpBrbcD8Uq3wS0TQ7EOf # oFctWSpOuXV0TZfXK1+/JgAqobDWYvR+2UEVx4u5fGM1dRCSm5KQjA20txn6nJte # uK7kFS3zFelHf8jaU8Wr8VBYp3fp/rAb9YVAB6CoeQgNqPEkvMWlW4LfCM1Mr/dU # EDfCDJoP # SIG # End signature block
combined_dataset/train/non-malicious/sample_2_20.ps1
sample_2_20.ps1
# File DC_RegistryStorage.ps1 # Copyright 2020, Microsoft Corporation. All rights reserved. Import-LocalizedData -BindingVariable UtilsRegistrySetupPerf $OutputFile= $Computername + "_reg_MountedDevices.TXT" RegQuery -RegistryKeys "HKLM\System\MountedDevices" -OutputFile $OutputFile -fileDescription "MountedDevices" $OutputFile= $Computername + "_reg_MountedDevices.HIV" RegSave -RegistryKey "HKLM\System\MountedDevices" -OutputFile $OutputFile -fileDescription "MountedDevices" $iSCSIKeys = "HKLM\SYSTEM\CurrentControlSet\Services\iScsiPrt", "HKLM\SOFTWARE\Microsoft\iSCSI Target", "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\iSCSI" $OutputFile= $Computername + "_reg_iSCSI.TXT" RegQuery -RegistryKeys $iSCSIKeys -OutputFile $OutputFile -fileDescription "iSCSI" -Recursive $true $StorageKeys = "HKLM\System\CurrentControlSet\Control\MPDEV", "HKLM\System\CurrentControlSet\Control\iSCSIPRT", "HKLM\System\CurrentControlSet\Services\MSiSCSI", "HKLM\System\CurrentControlSet\Services\MSDSM", "HKLM\System\CurrentControlSet\Services\MPIO", "HKLM\System\CurrentControlSet\Control\Class\{4d36e97b-e325-11ce-bfc1-08002be10318}", "HKLM\System\CurrentControlSet\Services\Tcpip" $OutputFile= $Computername + "_reg_Storage.TXT" RegQuery -RegistryKeys $StorageKeys -OutputFile $OutputFile -fileDescription $UtilsRegistrySetupPerf.ID_RegSetupPerfStorage -Recursive $true $OutputFile= $Computername + "_reg_Enum.TXT" RegQuery -RegistryKeys "HKLM\SYSTEM\CurrentControlSet\Enum" -OutputFile $OutputFile -fileDescription $UtilsRegistrySetupPerf.ID_RegSetupPerfEnum -Recursive $true # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKRFhSL/BhggCk # knyW65quO5VqtMZbGYz5oJfR9p0d/aCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBl7ft6b3tQ9ztsveDhoq3st # D/dC9V1KoMyxFjxfkHaxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASoV+gnTWjO2XTkxV5JKUSspzCfeoBYcN1fmxPs799f1xre7S+WX8WQBu # KBGJOd9KU7am25zQRDUDrbVvTlzIUKUyp9RD1MK2PaCbR1nBKtl1lfO9EC7rG8BT # r5/fWrq0ZxxZNEk1uBoUQNMlsgkhwxuD6hmU1rieh4+wiSo8ibtV/Z72XF5FhwwC # KNIhiW9qj1rc1BfZNYYJuFYRYc06iPA9KCapOs9BHg8cAjAu8dLRhnIg31RMLjSB # mITMdxBJKa6JXhUhm8nPWHPgxBfo6kYcPas7Eo4BQmXOQi/M/XoEbGfJq5gVH+E5 # /9lRSoBVQ2eGrW9Eyr8Xz5JPhHK+g6GCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCADYFUTjKNv56cIbZMC76OFH2A90jBXuBbE0tVoEZvvrwIGZuspkdLk # GBMyMDI0MTAyODExNDA0Mi4zODNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+KOhJgwMQEj+AAEAAAH4MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOFoXDTI1MTAyMjE4MzEwOFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMyMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxR23pXYnD2BuODdeXs2C # u/T5kKI+bAw8cbtN50Cm/FArjXyL4RTqMe6laQ/CqeMTxgckvZr1JrW0Mi4F15rx # /VveGhKBmob45DmOcV5xyx7h9Tk59NAl5PNMAWKAIWf270SWAAWxQbpVIhhPWCnV # V3otVvahEad8pMmoSXrT5Z7Nk1RnB70A2bq9Hk8wIeC3vBuxEX2E8X50IgAHsyaR # 9roFq3ErzUEHlS8YnSq33ui5uBcrFOcFOCZILuVFVTgEqSrX4UiX0etqi7jUtKyp # gIflaZcV5cI5XI/eCxY8wDNmBprhYMNlYxdmQ9aLRDcTKWtddWpnJtyl5e3gHuYo # j8xuDQ0XZNy7ESRwJIK03+rTZqfaYyM4XSK1s0aa+mO69vo/NmJ4R/f1+KucBPJ4 # yUdbqJWM3xMvBwLYycvigI/WK4kgPog0UBNczaQwDVXpcU+TMcOvWP8HBWmWJQIm # TZInAFivXqUaBbo3wAfPNbsQpvNNGu/12pg0F8O/CdRfgPHfOhIWQ0D8ALCY+Lsi # wbzcejbrVl4N9fn2wOg2sDa8RfNoD614I0pFjy/lq1NsBo9V4GZBikzX7ZjWCRgd # 1FCBXGpfpDikHjQ05YOkAakdWDT2bGSaUZJGVYtepIpPTAs1gd/vUogcdiL51o7s # huHIlB6QSUiQ24XYhRbbQCECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBS9zsZzz57Q # lT5nrt/oitLv1OQ7tjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAYfk8GzzpEVnG # l7y6oXoytCb42Hx6TOA0+dkaBI36ftDE9tLubUa/xMbHB5rcNiRhFHZ93RefdPpc # 4+FF0DAl5lP8xKAO+293RWPKDFOFIxgtZY08t8D9cSQpgGUzyw3lETZebNLEA17A # /CTpA2F9uh8j84KygeEbj+bidWDiEfayoH2A5/5ywJJxIuLzFVHacvWxSCKoF9hl # SrZSG5fXWS3namf4tt690UT6AGyWLFWe895coFPxm/m0UIMjjp9VRFH7nb3Ng2Q4 # gPS9E5ZTMZ6nAlmUicDj0NXAs2wQuQrnYnbRAJ/DQW35qLo7Daw9AsItqjFhbMcG # 68gDc4j74L2KYe/2goBHLwzSn5UDftS1HZI0ZRsqmNHI0TZvvUWX9ajm6SfLBTEt # oTo6gLOX0UD/9rrhGjdkiCw4SwU5osClgqgiNMK5ndk2gxFlDXHCyLp5qB6BoPpc # 82RhO0yCzoP9gv7zv2EocAWEsqE5+0Wmu5uarmfvcziLfU1SY240OZW8ld4sS8fn # ybn/jDMmFAhazV1zH0QERWEsfLSpwkOXaImWNFJ5lmcnf1VTm6cmfasScYtElpjq # Z9GooCmk1XFApORPs/PO43IcFmPRwagt00iQSw+rBeIH00KQq+FJT/62SB70g9g/ # R8TS6k6b/wt2UWhqrW+Q8lw6Xzgex/YwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjozMjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAtkQt/ebWSQ5DnG+aKRzPELCFE9GggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJuKwwIhgPMjAyNDEwMjgwNzE1NTZaGA8yMDI0MTAyOTA3MTU1NlowdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6sm4rAIBADAHAgEAAgIYGzAHAgEAAgITTTAK # AgUA6ssKLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCdo1/IodMsNY0I # gWORzZg8jsEoddsFxXLB6LC/xZZN78xMGY8ik00hGbggj5TzOyaNz/noIF8rSswo # SMgsS4ZwddVQrvYaMGqrGhpDjhieQUnGdME69mRCvIoQFD26RPCKzj29tv+B+uFY # o+vQFAlgX6TPkk0mP1QA2f6Z3lUlDwIgMI253G8VxjqZRY6ZoVliBz9eAi7lBW9k # ULQPtVGmIUPu7ezKTBUkuCNLrcKpQnElDP3Zlk7rT4A0pcf9UEdis9BF366M8Ktt # 8LYZKi+PDCPRy/n75JCQqDqcbHIzxFw0i6SoY8K4+6yqF0TVFbiwLm8UNadYHPkb # zTwcRywIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH4o6EmDAxASP4AAQAAAfgwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgL8S4S5IMht3A # 4W2btaPkHG2VkXBpEHwd9+qS2WUWqSowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCDvzDPyXw1UkAUFYt8bR4UdjM90Qv5xnVaiKD3I0Zz3WjCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+KOhJgwMQEj+AAEAAAH4 # MCIEINY/Dw199apAunA4Ss6RSl7yGIXBNBs5M/tiHZQ6crrSMA0GCSqGSIb3DQEB # CwUABIICAGKzH29IjKCvKJhfvFI6pgGwhhPpN6r2j0m0tri2aadq1C5+kEw3p2cz # wBrgZnFziAXjF1P6fFuQf+WPHSNTbbTDdOmDjWCnpotGbtvdpxFWAYoGCQxQQbLa # /4dInxhzmq6vvKdJR8fboUgffJQEqkubovPKn+sgLaroZqz/MpmjeAQ2PazEPFu3 # l6LmNXtolBdgDDsne9bubN+Abz5UFEEPMgVq83hY5KHxUgYpBpAzuScCQptNUZ4V # AHQl9gAslGiVBaMY7bD0i1a+6zYgUSFdw34qGXMlKznPbDsQIw29h4TnD6UeElzC # 8ufYzJKLyczpTwdxEHGOWZIS/rVqcYbHL3em3mYXZRwu8dGc9pBcuQJumL5i+2zk # 5uctHSnxHph0cT81vHEH1xo5XksQBJ3MYy8y6aNu8BNMhMrsdg4o/2RHd/7YJ6n3 # GxN/oxL5zY7+oTOSjDct8RKiD5OFcTxwtgLzuQjzT5unlM559VISSij+64wA2eqa # GjGT9NDhUAyM8Yqa1C80WxESm2ueAtgPBaTeuaICfcdDFk8DIgCE3UN63985m5uQ # zFoEhpn5Jng/8SDGup3zOafd+aBHH6czU/P0Y3XAXjZcRgh6wwVDV6QKbdUIpX7I # 6Gy8Rgrcr3/iZgTd71qyVu5erlD0HGKge2KK1MifiskG8wG1CyX4 # SIG # End signature block
combined_dataset/train/non-malicious/4420.ps1
4420.ps1
function Update-Script { [CmdletBinding(SupportsShouldProcess = $true, HelpUri = 'https://go.microsoft.com/fwlink/?LinkId=619787')] Param ( [Parameter(ValueFromPipelineByPropertyName = $true, Position = 0)] [ValidateNotNullOrEmpty()] [String[]] $Name, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $RequiredVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNull()] [string] $MaximumVersion, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateNotNullOrEmpty()] [Uri] $Proxy, [Parameter(ValueFromPipelineByPropertyName = $true)] [PSCredential] $ProxyCredential, [Parameter(ValueFromPipelineByPropertyName = $true)] [PSCredential] $Credential, [Parameter()] [Switch] $Force, [Parameter()] [Switch] $AllowPrerelease, [Parameter()] [switch] $AcceptLicense, [Parameter()] [switch] $PassThru ) Begin { Install-NuGetClientBinaries -CallerPSCmdlet $PSCmdlet -Proxy $Proxy -ProxyCredential $ProxyCredential $scriptNamesInPipeline = @() } Process { $scriptFilePathsToUpdate = @() $ValidationResult = Validate-VersionParameters -CallerPSCmdlet $PSCmdlet ` -Name $Name ` -MaximumVersion $MaximumVersion ` -RequiredVersion $RequiredVersion ` -AllowPrerelease:$AllowPrerelease if (-not $ValidationResult) { return } if (-not $Name) { $Name = @('*') } if ($Name) { foreach ($scriptName in $Name) { $availableScriptPaths = Get-AvailableScriptFilePath -Name $scriptName -Verbose:$false if (-not $availableScriptPaths -and -not (Test-WildcardPattern -Name $scriptName)) { $message = $LocalizedData.ScriptNotInstalledOnThisMachine -f ($scriptName, $script:MyDocumentsScriptsPath, $script:ProgramFilesScriptsPath) Write-Error -Message $message -ErrorId "ScriptNotInstalledOnThisMachine" -Category InvalidOperation -TargetObject $scriptName continue } foreach ($scriptFilePath in $availableScriptPaths) { $installedScriptFilePath = Get-InstalledScriptFilePath -Name ([System.IO.Path]::GetFileNameWithoutExtension($scriptFilePath)) | Microsoft.PowerShell.Core\Where-Object { $_ -eq $scriptFilePath } if ($installedScriptFilePath) { $scriptFilePathsToUpdate += $installedScriptFilePath } else { if (-not (Test-WildcardPattern -Name $scriptName)) { $message = $LocalizedData.ScriptNotInstalledUsingPowerShellGet -f ($scriptName) Write-Error -Message $message -ErrorId "ScriptNotInstalledUsingPowerShellGet" -Category InvalidOperation -TargetObject $scriptName } continue } } } } $PSBoundParameters["Provider"] = $script:PSModuleProviderName $PSBoundParameters[$script:PSArtifactType] = $script:PSArtifactTypeScript $PSBoundParameters["InstallUpdate"] = $true foreach ($scriptFilePath in $scriptFilePathsToUpdate) { $scriptName = [System.IO.Path]::GetFileNameWithoutExtension($scriptFilePath) $installedScriptInfoFilePath = $null $installedScriptInfoFileName = "$($scriptName)_$script:InstalledScriptInfoFileName" if ($scriptFilePath.ToString().StartsWith($script:MyDocumentsScriptsPath, [System.StringComparison]::OrdinalIgnoreCase)) { $installedScriptInfoFilePath = Microsoft.PowerShell.Management\Join-Path -Path $script:MyDocumentsInstalledScriptInfosPath ` -ChildPath $installedScriptInfoFileName } elseif ($scriptFilePath.ToString().StartsWith($script:ProgramFilesScriptsPath, [System.StringComparison]::OrdinalIgnoreCase)) { $installedScriptInfoFilePath = Microsoft.PowerShell.Management\Join-Path -Path $script:ProgramFilesInstalledScriptInfosPath ` -ChildPath $installedScriptInfoFileName } $psgetItemInfo = $null if ($installedScriptInfoFilePath -and (Microsoft.PowerShell.Management\Test-Path -Path $installedScriptInfoFilePath -PathType Leaf)) { $psgetItemInfo = DeSerialize-PSObject -Path $installedScriptInfoFilePath } if (-not $psgetItemInfo -or ($scriptNamesInPipeline -contains $psgetItemInfo.Name)) { continue } $scriptFilePath = Microsoft.PowerShell.Management\Join-Path -Path $psgetItemInfo.InstalledLocation ` -ChildPath "$($psgetItemInfo.Name).ps1" if (-not (Microsoft.PowerShell.Management\Test-Path -Path $scriptFilePath -PathType Leaf)) { Microsoft.PowerShell.Management\Remove-Item -Path $installedScriptInfoFilePath -Force -ErrorAction SilentlyContinue continue } $scriptNamesInPipeline += $psgetItemInfo.Name $message = $LocalizedData.CheckingForScriptUpdate -f ($psgetItemInfo.Name) Write-Verbose -Message $message $providerName = Get-ProviderName -PSCustomObject $psgetItemInfo if (-not $providerName) { $providerName = $script:NuGetProviderName } $PSBoundParameters["MessageResolver"] = $script:PackageManagementUpdateScriptMessageResolverScriptBlock $PSBoundParameters["PackageManagementProvider"] = $providerName $PSBoundParameters["Name"] = $psgetItemInfo.Name $PSBoundParameters['Source'] = $psgetItemInfo.Repository if ($AllowPrerelease) { $PSBoundParameters[$script:AllowPrereleaseVersions] = $true } $null = $PSBoundParameters.Remove("AllowPrerelease") $null = $PSBoundParameters.Remove("PassThru") $PSBoundParameters["Scope"] = Get-InstallationScope -PreviousInstallLocation $scriptFilePath -CurrentUserPath $script:MyDocumentsScriptsPath $sid = PackageManagement\Install-Package @PSBoundParameters if ($PassThru) { $sid | Microsoft.PowerShell.Core\ForEach-Object { New-PSGetItemInfo -SoftwareIdentity $_ -Type $script:PSArtifactTypeScript } } } } }
combined_dataset/train/non-malicious/Make a phone call_1.ps1
Make a phone call_1.ps1
<# .NOTES AUTHOR: Sunny Chakraborty([email protected]) WEBSITE: http://tekout.wordpress.com VERSION: 0.1 CREATED: 17th April, 2012 LASTEDIT: 17th April, 2012 Requires: PowerShell v2 or better .CHANGELOG 4/17/2012 Try passing powershell objects to PROTO API and pass the variables to .JS file Pass other system variables and check if text to speech can translate double or a double-to-char conversion is required. .SYNOPSIS Make a phone call from Powershell. .DESCRIPTION The script demonstrates how you can collect state-data in powershell and pass it as an argument to a REST API call and alert a System Admin. For this example, TROPO REST API's were used. (www.tropo.com) The phone-number will receive a Call with the following text To speech Please check the server $this. The percent Free Space on C Drive is $inDecimals. This is a proof of concept. V 0.1 There are numerous areas of improvement. .IMPORTANT Please create a new account and setup your application in tropo. Its free for dev use. http://www.tropo.com Copy and replace the TOKEN in your application with the TOKEN below to initiate a call. .OTHER JAVASCRIPT (Hosted on Tropo) TropoTest.js call('+' + numToCall , { timeout:30, callerID:'19172688401', onAnswer: function() { say("Houston ! We have a problem "); say("Please check the server" + sourceServer ); say("The percent Free Space on C Drive is" + freeCDisk ); say("Goodbye."); log("Call logged Successfully"); }, onTimeout: function() { log("Call timed out"); }, onCallFailure: function() { log("Call could not be completed as dialed"); } }); #> # Proto API section. Please replace protoToken with your own Application Token, # I am posting my API token here so that someone can download and run the script by editing just the cell # field. $baseUrl = "https://api.tropo.com/1.0/sessions?action=create&" # Modify these variables. $protoToken = "10b0026696a79f448eb21d8dbc69d78acf12e2f1f62f291feecec8f2b8d1eac76da63d91dd317061a5a9eeb0" #US 10 Digit only for now. For Example 17327911234,19177911234 $myCell = '11234567890' # Functions Function get-FreeDiskPercentForC { $disk = Get-DiskUsage $free = $disk[0].FreeSpace / $disk[0].TotalSize $freeDiskCPercent = [System.Math]::Round($free, 2) $freeDiskCPercent } # Get some more parameters here. $sourceServer =hostname $cDisk = get-FreeDiskPercentForC # Concatenate and form the Proto API string. I am sure someone can figure out a better way to do this than just adding. $callThis = $baseUrl+ 'token=' + $protoToken + '&numToCall=' + $myCell + '&sourceServer=' + $sourceServer + '&freeCDisk=' + $cDisk # Call the Proto API # I could have tested this with Invoke-RestMethod, but I didn't see the point. I am not receiving any data from the URL. $newClient = new-object System.Net.WebClient $newClient.DownloadString($callThis)
combined_dataset/train/non-malicious/942.ps1
942.ps1
$resourceGroupName = "myResourceGroup" $accountName = "mycosmosaccount" $account = Get-AzResource -ResourceType "Microsoft.DocumentDb/databaseAccounts" ` -ApiVersion "2015-04-08" -ResourceGroupName $resourceGroupName ` -Name $accountName $locations = @( @{ "locationName"="West US 2"; "failoverPriority"=0 }, @{ "locationName"="East US 2"; "failoverPriority"=1 }, @{ "locationName"="South Central US"; "failoverPriority"=2 } ) $account.Properties.locations = $locations $CosmosDBProperties = $account.Properties Set-AzResource -ResourceType "Microsoft.DocumentDb/databaseAccounts" ` -ApiVersion "2015-04-08" -ResourceGroupName $resourceGroupName ` -Name $accountName -PropertyObject $CosmosDBProperties
combined_dataset/train/non-malicious/sample_33_13.ps1
sample_33_13.ps1
# # Module manifest for module 'OCI.PSModules.Osubusage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osubusage.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'dc60bcf2-1864-4348-bd88-b778f8059f02' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osubusage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osubusage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsubusageComputedUsage', 'Get-OCIOsubusageComputedUsageAggregatedsList', 'Get-OCIOsubusageComputedUsagesList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osubusage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_26_25.ps1
sample_26_25.ps1
# # Module manifest for module 'OCI.PSModules.Capacitymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Capacitymanagement.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '847ff9d9-1cd2-4050-8297-31d3b08d96b0' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Capacitymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Capacitymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICapacitymanagementOccAvailabilitiesList', 'Get-OCICapacitymanagementOccAvailabilityCatalog', 'Get-OCICapacitymanagementOccAvailabilityCatalogContent', 'Get-OCICapacitymanagementOccAvailabilityCatalogsInternalList', 'Get-OCICapacitymanagementOccAvailabilityCatalogsList', 'Get-OCICapacitymanagementOccCapacityRequest', 'Get-OCICapacitymanagementOccCapacityRequestsInternalList', 'Get-OCICapacitymanagementOccCapacityRequestsList', 'Get-OCICapacitymanagementOccCustomerGroup', 'Get-OCICapacitymanagementOccCustomerGroupsList', 'Invoke-OCICapacitymanagementPatchOccCapacityRequest', 'Invoke-OCICapacitymanagementPublishOccAvailabilityCatalog', 'New-OCICapacitymanagementOccAvailabilityCatalog', 'New-OCICapacitymanagementOccCapacityRequest', 'Remove-OCICapacitymanagementOccAvailabilityCatalog', 'Remove-OCICapacitymanagementOccCapacityRequest', 'Update-OCICapacitymanagementInternalOccCapacityRequest', 'Update-OCICapacitymanagementOccAvailabilityCatalog', 'Update-OCICapacitymanagementOccCapacityRequest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Capacitymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_11_26.ps1
sample_11_26.ps1
#************************************************ # TS_ServicingPendingXml.ps1 # Version 1.0.1 # Date: 6/6/2012 # Author: v-alyao # Description: [Idea ID 3472] [Windows] Pending Transactions Rule Idea - Pending.xml # Rule number: 3472 # Rule URL: http://sharepoint/sites/rules/Rule Submissions/Forms/DispForm.aspx?ID=3472 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 3472 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_ServicingPendingXml" $PublicContent = "http://support.microsoft.com/kb/2509997" $InternalContent = "" $Verbosity = "Warning" $Visibility = "4" $SupportTopicsID = "8110" $Title = $ScriptStrings.ID_ServicingPendingXml_ST $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Add your logic here to specify on which environments this rule will appy return ((($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 0)) -or #Win Vista/Server 2008 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 1)) -or #Win 7/Server 2008 R2 (($OSVersion.Major -eq 6) -and ($OSVersion.Minor -eq 2)) -or ($OSVersion.Major -eq 10)) } # ************** # Detection Logic # ************** $PendingXmlPath=Join-path -Path $Env:windir "Winsxs\pending.xml" Function CheckPendingXML() { return Test-Path -Path $PendingXmlPath } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (CheckPendingXML) { $RootCauseDetected = $true #Add information to InformationCollected $InformationCollected | add-member -membertype noteproperty -name "File Name" -value $PendingXmlPath } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -InformationCollected $InformationCollected -Verbosity $Verbosity -Visibility $Visibility -SupportTopicsID $SupportTopicsID -InternalContentURL $InternalContent -SolutionTitle $Title } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAsJdYR32egKkO6 # zjFgeGxD5y3Z1Rkd8E5qdd1d1aFDqKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKbn # C3+davS0rJXYqlZhhB8ACqDcGgbUidTiSC3FVWQMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARQeSLlNuftgZMvdKFDX+sRt9ZTjnQzkBbMIw # FWU2VxWQ4eVTDOGfYI/W8wxxYoglwhfRFy7tis1eSoOYwWhiQ8Wp/urjem7szaW9 # rMtMqizG9hsfcSSNoPhCp74CaOgj/FaCDTrbJZDUHLae6il7s2OMEmnfNp+4ue7m # kkgZyTmBIDz4F1yFsOP/5ajAfAHmETsQXZujkvchOFCxgrMbyPUO8NaAUe/+2kHf # KXPgQihVXb1a2nSDVlUQvhaclVtuePabJlrKSnQwNCV9wixhIZrQDeISJrCxOWA7 # bZbE6UilgdznMfWQDwASVx46aFg9pg3xH/IFJTrKi9v0StuelaGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBbQMp8NjLT96eyDOX2ZaDdIuWq7MjLRCa/ # 6+rr5uL9ewIGZusiCs5vGBMyMDI0MTAyODExNDAzOS41MzlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg # dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3 # k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW # 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8 # U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH # TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn # 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE # 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX # D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI # vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ # QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G # qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb # QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL # zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0 # G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt # qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b # a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB # VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM # H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N # iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG # 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V # VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB # jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0 # MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA # AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd # uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0 # GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578 # OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI # /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN # ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVWAaKdH2EikJiGPrfxX9z5PQCyVIuXVyQ4IZatka25kwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So # IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b # gvEVMA0GCSqGSIb3DQEBCwUABIICAFpoh1EYSZAcOTym63UCW667Xep8lXd0VKnu # b/weVcraVCnHoxxhagZ7WKlWn0x2qOtFlq1tWeunfdIMora/13jtjIF7kVXoX4LP # oLsOw4hjtBrjfe29Hq8bLgRk2dhbcoVO5bT7oE9Rhs/b1gB68Eid7hz84iQW5Fdu # nMG9+8VlAnyWA+omF8XVPBqDI0+09e8PB0+uNAs6y8g9/mB4ORKwrem/6j5doZwC # HzxJwUc5JA24wthIsa7aeWT54Kol1jNVl1nYotNTDeTWDZfLBpjjGalVKtCU3m41 # V1hj0AqGr0k8tRjhpG+hty7eo6OmYZ77rKaHMB6njaJgRNUBTWv7P7m1Zz2FC0Nz # XohOUzevfuYUnLP9Wj1FnX/hDA+H7kzWwN1NPNhqYWZeJ4g/8y2U2/pNjZTEWTD3 # wsoqHbexT93dvjvd208i/C/TwMMhO6tcyooV8DwLbyFCzSi0MLLqRgPAkLt6o/v/ # 9Yy5esgODlTv7N7x3/teiHuH9xq7UVovXf4WzOdM+4wEtzWq80YFpd+BY0DpYmGR # 1fnQycGpboCfZInSsFNYrb01w72nIzv2py9E1cmRCSox4M9+mg2G22xiedDm/l1Y # GUSkmve8AOp8GH3AiPLQhaZCVbPgbv79G5iDgr5jGAdNduZF1slhNRrd0leXZi72 # 1eXY+XbV # SIG # End signature block
combined_dataset/train/non-malicious/9.ps1
9.ps1
function Get-GitDirectory { $pathInfo = Microsoft.PowerShell.Management\Get-Location if (!$pathInfo -or ($pathInfo.Provider.Name -ne 'FileSystem')) { $null } elseif ($Env:GIT_DIR) { $Env:GIT_DIR -replace '\\|/', [System.IO.Path]::DirectorySeparatorChar } else { $currentDir = Get-Item -LiteralPath $pathInfo -Force while ($currentDir) { $gitDirPath = Join-Path $currentDir.FullName .git if (Test-Path -LiteralPath $gitDirPath -PathType Container) { return $gitDirPath } if (Test-Path -LiteralPath $gitDirPath -PathType Leaf) { $gitDirPath = Invoke-Utf8ConsoleCommand { git rev-parse --git-dir 2>$null } if ($gitDirPath) { return $gitDirPath } } $headPath = Join-Path $currentDir.FullName HEAD if (Test-Path -LiteralPath $headPath -PathType Leaf) { $refsPath = Join-Path $currentDir.FullName refs $objsPath = Join-Path $currentDir.FullName objects if ((Test-Path -LiteralPath $refsPath -PathType Container) -and (Test-Path -LiteralPath $objsPath -PathType Container)) { $bareDir = Invoke-Utf8ConsoleCommand { git rev-parse --git-dir 2>$null } if ($bareDir -and (Test-Path -LiteralPath $bareDir -PathType Container)) { $resolvedBareDir = (Resolve-Path $bareDir).Path return $resolvedBareDir } } } $currentDir = $currentDir.Parent } } } function Get-GitBranch($gitDir = $(Get-GitDirectory), [Diagnostics.Stopwatch]$sw) { if (!$gitDir) { return } Invoke-Utf8ConsoleCommand { dbg 'Finding branch' $sw $r = ''; $b = ''; $c = '' $step = ''; $total = '' if (Test-Path $gitDir/rebase-merge) { dbg 'Found rebase-merge' $sw if (Test-Path $gitDir/rebase-merge/interactive) { dbg 'Found rebase-merge/interactive' $sw $r = '|REBASE-i' } else { $r = '|REBASE-m' } $b = "$(Get-Content $gitDir/rebase-merge/head-name)" $step = "$(Get-Content $gitDir/rebase-merge/msgnum)" $total = "$(Get-Content $gitDir/rebase-merge/end)" } else { if (Test-Path $gitDir/rebase-apply) { dbg 'Found rebase-apply' $sw $step = "$(Get-Content $gitDir/rebase-apply/next)" $total = "$(Get-Content $gitDir/rebase-apply/last)" if (Test-Path $gitDir/rebase-apply/rebasing) { dbg 'Found rebase-apply/rebasing' $sw $r = '|REBASE' } elseif (Test-Path $gitDir/rebase-apply/applying) { dbg 'Found rebase-apply/applying' $sw $r = '|AM' } else { $r = '|AM/REBASE' } } elseif (Test-Path $gitDir/MERGE_HEAD) { dbg 'Found MERGE_HEAD' $sw $r = '|MERGING' } elseif (Test-Path $gitDir/CHERRY_PICK_HEAD) { dbg 'Found CHERRY_PICK_HEAD' $sw $r = '|CHERRY-PICKING' } elseif (Test-Path $gitDir/REVERT_HEAD) { dbg 'Found REVERT_HEAD' $sw $r = '|REVERTING' } elseif (Test-Path $gitDir/BISECT_LOG) { dbg 'Found BISECT_LOG' $sw $r = '|BISECTING' } $b = Invoke-NullCoalescing ` { dbg 'Trying symbolic-ref' $sw; git symbolic-ref HEAD -q 2>$null } ` { '({0})' -f (Invoke-NullCoalescing ` { dbg 'Trying describe' $sw switch ($Global:GitPromptSettings.DescribeStyle) { 'contains' { git describe --contains HEAD 2>$null } 'branch' { git describe --contains --all HEAD 2>$null } 'describe' { git describe HEAD 2>$null } default { git tag --points-at HEAD 2>$null } } } ` { dbg 'Falling back on parsing HEAD' $sw $ref = $null if (Test-Path $gitDir/HEAD) { dbg 'Reading from .git/HEAD' $sw $ref = Get-Content $gitDir/HEAD 2>$null } else { dbg 'Trying rev-parse' $sw $ref = git rev-parse HEAD 2>$null } if ($ref -match 'ref: (?<ref>.+)') { return $Matches['ref'] } elseif ($ref -and $ref.Length -ge 7) { return $ref.Substring(0,7)+'...' } else { return 'unknown' } } ) } } dbg 'Inside git directory?' $sw if ('true' -eq $(git rev-parse --is-inside-git-dir 2>$null)) { dbg 'Inside git directory' $sw if ('true' -eq $(git rev-parse --is-bare-repository 2>$null)) { $c = 'BARE:' } else { $b = 'GIT_DIR!' } } if ($step -and $total) { $r += " $step/$total" } "$c$($b -replace 'refs/heads/','')$r" } } function GetUniquePaths($pathCollections) { $hash = New-Object System.Collections.Specialized.OrderedDictionary foreach ($pathCollection in $pathCollections) { foreach ($path in $pathCollection) { $hash[$path] = 1 } } $hash.Keys } $castStringSeq = [Linq.Enumerable].GetMethod("Cast").MakeGenericMethod([string]) function Get-GitStatus { param( [Parameter(Position=0)] $GitDir = (Get-GitDirectory), [Parameter()] [switch] $Force ) $settings = $Global:GitPromptSettings $enabled = $Force -or !$settings -or $settings.EnablePromptStatus if ($enabled -and $GitDir) { if ($settings.Debug) { $sw = [Diagnostics.Stopwatch]::StartNew(); Write-Host '' } else { $sw = $null } $branch = $null $aheadBy = 0 $behindBy = 0 $gone = $false $indexAdded = New-Object System.Collections.Generic.List[string] $indexModified = New-Object System.Collections.Generic.List[string] $indexDeleted = New-Object System.Collections.Generic.List[string] $indexUnmerged = New-Object System.Collections.Generic.List[string] $filesAdded = New-Object System.Collections.Generic.List[string] $filesModified = New-Object System.Collections.Generic.List[string] $filesDeleted = New-Object System.Collections.Generic.List[string] $filesUnmerged = New-Object System.Collections.Generic.List[string] $stashCount = 0 if ($settings.EnableFileStatus -and !$(InDotGitOrBareRepoDir $GitDir) -and !$(InDisabledRepository)) { if ($null -eq $settings.EnableFileStatusFromCache) { $settings.EnableFileStatusFromCache = $null -ne (Get-Module GitStatusCachePoshClient) } if ($settings.EnableFileStatusFromCache) { dbg 'Getting status from cache' $sw $cacheResponse = Get-GitStatusFromCache dbg 'Parsing status' $sw $indexAdded.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.IndexAdded)))) $indexModified.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.IndexModified)))) foreach ($indexRenamed in $cacheResponse.IndexRenamed) { $indexModified.Add($indexRenamed.Old) } $indexDeleted.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.IndexDeleted)))) $indexUnmerged.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.Conflicted)))) $filesAdded.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.WorkingAdded)))) $filesModified.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.WorkingModified)))) foreach ($workingRenamed in $cacheResponse.WorkingRenamed) { $filesModified.Add($workingRenamed.Old) } $filesDeleted.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.WorkingDeleted)))) $filesUnmerged.AddRange($castStringSeq.Invoke($null, (,@($cacheResponse.Conflicted)))) $branch = $cacheResponse.Branch $upstream = $cacheResponse.Upstream $gone = $cacheResponse.UpstreamGone $aheadBy = $cacheResponse.AheadBy $behindBy = $cacheResponse.BehindBy if ($cacheResponse.Stashes) { $stashCount = $cacheResponse.Stashes.Length } if ($cacheResponse.State) { $branch += "|" + $cacheResponse.State } } else { dbg 'Getting status' $sw switch ($settings.UntrackedFilesMode) { "No" { $untrackedFilesOption = "-uno" } "All" { $untrackedFilesOption = "-uall" } "Normal" { $untrackedFilesOption = "-unormal" } } $status = Invoke-Utf8ConsoleCommand { git -c core.quotepath=false -c color.status=false status $untrackedFilesOption --short --branch 2>$null } if ($settings.EnableStashStatus) { dbg 'Getting stash count' $sw $stashCount = $null | git stash list 2>$null | measure-object | Select-Object -expand Count } dbg 'Parsing status' $sw switch -regex ($status) { '^(?<index>[^ if ($sw) { dbg "Status: $_" $sw } switch ($matches['index']) { 'A' { $null = $indexAdded.Add($matches['path1']); break } 'M' { $null = $indexModified.Add($matches['path1']); break } 'R' { $null = $indexModified.Add($matches['path1']); break } 'C' { $null = $indexModified.Add($matches['path1']); break } 'D' { $null = $indexDeleted.Add($matches['path1']); break } 'U' { $null = $indexUnmerged.Add($matches['path1']); break } } switch ($matches['working']) { '?' { $null = $filesAdded.Add($matches['path1']); break } 'A' { $null = $filesAdded.Add($matches['path1']); break } 'M' { $null = $filesModified.Add($matches['path1']); break } 'D' { $null = $filesDeleted.Add($matches['path1']); break } 'U' { $null = $filesUnmerged.Add($matches['path1']); break } } continue } '^ if ($sw) { dbg "Status: $_" $sw } $branch = $matches['branch'] $upstream = $matches['upstream'] $aheadBy = [int]$matches['ahead'] $behindBy = [int]$matches['behind'] $gone = [string]$matches['gone'] -eq 'gone' continue } '^ if ($sw) { dbg "Status: $_" $sw } $branch = $matches['branch'] continue } default { if ($sw) { dbg "Status: $_" $sw } } } } } if (!$branch) { $branch = Get-GitBranch $GitDir $sw } dbg 'Building status object' $sw $filesAdded = $filesAdded.ToArray() $indexPaths = @(GetUniquePaths $indexAdded,$indexModified,$indexDeleted,$indexUnmerged) $workingPaths = @(GetUniquePaths $filesAdded,$filesModified,$filesDeleted,$filesUnmerged) $index = (,$indexPaths) | Add-Member -Force -PassThru NoteProperty Added $indexAdded.ToArray() | Add-Member -Force -PassThru NoteProperty Modified $indexModified.ToArray() | Add-Member -Force -PassThru NoteProperty Deleted $indexDeleted.ToArray() | Add-Member -Force -PassThru NoteProperty Unmerged $indexUnmerged.ToArray() $working = (,$workingPaths) | Add-Member -Force -PassThru NoteProperty Added $filesAdded | Add-Member -Force -PassThru NoteProperty Modified $filesModified.ToArray() | Add-Member -Force -PassThru NoteProperty Deleted $filesDeleted.ToArray() | Add-Member -Force -PassThru NoteProperty Unmerged $filesUnmerged.ToArray() $result = New-Object PSObject -Property @{ GitDir = $GitDir RepoName = Split-Path (Split-Path $GitDir -Parent) -Leaf Branch = $branch AheadBy = $aheadBy BehindBy = $behindBy UpstreamGone = $gone Upstream = $upstream HasIndex = [bool]$index Index = $index HasWorking = [bool]$working Working = $working HasUntracked = [bool]$filesAdded StashCount = $stashCount } dbg 'Finished' $sw if ($sw) { $sw.Stop() } return $result } } function InDisabledRepository { $currentLocation = Get-Location foreach ($repo in $Global:GitPromptSettings.RepositoriesInWhichToDisableFileStatus) { if ($currentLocation -like "$repo*") { return $true } } return $false } function InDotGitOrBareRepoDir([string][ValidateNotNullOrEmpty()]$GitDir) { $pathInfo = Microsoft.PowerShell.Management\Get-Location $currentPath = if ($pathInfo.Drive) { $pathInfo.Path } else { $pathInfo.ProviderPath } $res = $currentPath.StartsWith($GitDir, (Get-PathStringComparison)) $res } function Get-AliasPattern($cmd) { $aliases = @($cmd) + @(Get-Alias | Where-Object { $_.Definition -eq $cmd } | Select-Object -Exp Name) "($($aliases -join '|'))" } function Remove-GitBranch { [CmdletBinding(DefaultParameterSetName="Wildcard", SupportsShouldProcess, ConfirmImpact="Medium")] param( [Parameter(Position=0, Mandatory, ParameterSetName="Wildcard")] [ValidateNotNullOrEmpty()] [string] $Name, [Parameter(Position=0, Mandatory, ParameterSetName="Pattern")] [ValidateNotNull()] [string] $Pattern, [Parameter()] [ValidateNotNull()] [string] $ExcludePattern = '(^\*)|(^. (develop|master)$)', [Parameter()] [string] $Commit = "HEAD", [Parameter()] [switch] $IncludeUnmerged, [Parameter()] [switch] $Force, [Parameter()] [switch] $DeleteForce ) if ($IncludeUnmerged) { $branches = git branch } else { $branches = git branch --merged $Commit } $filteredBranches = $branches | Where-Object {$_ -notmatch $ExcludePattern } if ($PSCmdlet.ParameterSetName -eq "Wildcard") { $branchesToDelete = $filteredBranches | Where-Object { $_.Trim() -like $Name } } else { $branchesToDelete = $filteredBranches | Where-Object { $_ -match $Pattern } } $action = if ($DeleteForce) { "delete with force"} else { "delete" } $yesToAll = $noToAll = $false foreach ($branch in $branchesToDelete) { $targetBranch = $branch.Trim() if ($PSCmdlet.ShouldProcess($targetBranch, $action)) { if ($Force -or $yesToAll -or $PSCmdlet.ShouldContinue("Are you REALLY sure you want to $action `"$targetBranch`"?", "Confirm branch deletion", [ref]$yesToAll, [ref]$noToAll)) { if ($noToAll) { return } if ($DeleteForce) { Invoke-Utf8ConsoleCommand { git branch --delete --force $targetBranch } } else { Invoke-Utf8ConsoleCommand { git branch --delete $targetBranch } } } } } } function Update-AllBranches($Upstream = 'master', [switch]$Quiet) { $head = git rev-parse --abbrev-ref HEAD git checkout -q $Upstream $branches = Invoke-Utf8ConsoleCommand { (git branch --no-color --no-merged) } | Where-Object { $_ -notmatch '^\* ' } foreach ($line in $branches) { $branch = $line.SubString(2) if (!$Quiet) { Write-Host "Rebasing $branch onto $Upstream..." } git rebase -q $Upstream $branch > $null 2> $null if ($LASTEXITCODE) { git rebase --abort Write-Warning "Rebase failed for $branch" } } git checkout -q $head }
combined_dataset/train/non-malicious/sample_12_26.ps1
sample_12_26.ps1
#************************************************ # TS_WMIHandleLeakKB2639077.ps1 # Version 1.0.1 # Date: 7/19/2013 # Author: v-kaw # Description: [KSE Rule] [ Windows V3] Handle leak in Svchost.exe when a WMI query is triggered by using the Win32_PowerSettingCapabilities # Rule number: 5c139a00-370c-4d1c-a929-defcdae591dc # Rule URL: https://kse.microsoft.com/Contribute/Idea/de085f8b-e790-4dd1-b69c-26acb0493c63 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber 5c139a00-370c-4d1c-a929-defcdae591dc $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_WMIHandleLeakKB2639077" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Windows 7 and Windows server 2008 R2 sp1 return ($OSVersion.Build -eq 7601) } # ************** # Detection Logic # ************** Function CheckUmpoVersion { $UmpoPath = Join-Path $Env:windir "System32\Umpo.dll" if(Test-Path $UmpoPath) { $UmpoVersionInfo = Get-FileVersionString $UmpoPath $versionPrivatePart = [System.Diagnostics.FileVersionInfo]::GetVersionInfo($UmpoPath).FilePrivatePart add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll current version" -value $UmpoVersionInfo if($versionPrivatePart.StartsWith(18)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll required version" -value "6.1.7601.18331" } if($versionPrivatePart.StartsWith(22)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Umpo.dll required version" -value "6.1.7601.22529" } return ((CheckMinimalFileVersion $UmpoPath 6 1 7601 18331 -LDRGDR) -and (CheckMinimalFileVersion $UmpoPath 6 1 7601 22529 -LDRGDR)) } else { "$UmpoPath does not exist." | WriteTo-StdOut return $false } } Function CheckHandleCountOfWMIServices { Trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText "Checking Handle Count of WMI Services" } $WMIService = Get-CimInstance -Class Win32_Service |Where-Object {$_.Name -eq 'winmgmt' } $ProcessAssociatedWithWmiService = Get-Process -Id $WMIService.ProcessId if ($processAssociatedWithWmiService.HandleCount -gt 10000) { add-member -inputobject $InformationCollected -membertype noteproperty -name "WMI Service process ID" -value $WMIService.ProcessId add-member -inputobject $InformationCollected -membertype noteproperty -name "Current handle count" -value $processAssociatedWithWmiService.HandleCount return $true } return $false } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if ((CheckUmpoVersion) -and (CheckHandleCountOfWMIServices )) { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAr0bTbUMa0hJy # GkiKKXsH1RqamGNgX+b8ku3H41gVH6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA4p # Xk5kPOtox2jTpefyJS9ZEvH8munC/Ym1QM8RmWosMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAC//mmiqlv2+7tk4mdmmFTgimCS6mHQzpt5oc # 1zVGdE2Lf6qHF3kAKEUfF1xxIcO03oIE6jXtH0zV28NbafFTJNRGhhv90Xn/YL3I # QlT0U9twamQgVtdEAo4sD7ZG9x8TkYsks76MwCXGueRz1usMeZovU4GGrj4039pa # GadIAWTyX8kucOzqQjJaOQqNRPMKDECivpTOy9XLNP0n2YeDkvVdFFOTs9kvl/F1 # 9VeH49B1kq5uFajRWoQLOlc7H8fkP036Oh/0t7DsD+hCsTa+1PBCSb0dqlRf3gFE # 6IgWeEDyiVpH59PxLqPMORxcWlO1FzXTsexFMzvrJeULZxn/16GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDWolY3NFyGwf91hL847kNbGU+oeLdrtzQN # M5ose3eemQIGZutwxmXfGBMyMDI0MTAyODExNDA0Mi4xMjdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg6EnacrGu7ryQh+R6cwX/JS0WNqLqufM2TDQ6sx2oh2AwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAGniP4bg+8EhggEGVRB+koQqMnSg2OPiS1Al # mkLcwvHFz0ICi5kjA0YzZ4bDwx3YXEXZ87wSbDWowp7Kuw6JKrT2DLBGNJ4h+dbm # PGNWxnC3HNYuMVyQhP1JWcKIep/gsmByC7/if2BjQ8S8qtKmp3OzDjAXLc9eqk+O # cR3lPR9/CzIBIYY+wSjV+IsMi86VD5wvHX2fi0pgQCtSmsedqiiJ314h5C+QLhg4 # s7CPBuLcppDcste1Yd3KmP5+kzEOxqXSI+X2IE1VwJwriB6jrg/m7/E+Q/4hy6c5 # XolwvnqcBE2Xnvj3DJhbisEF3XljJ02j1ZdnA/4l/txi+KXwfqsyNCKQdvkZYXEU # AmYkkkM3RCTlpdVt0CmrMfViA8aMdsJoCvrrfM8+EgTtB8Rd8SGdZq+UgnmazjmC # 4P+7QuvPzIyEDKNZAYU1TCUoAW9gRfTozSyV+lwICey2eX9oQ0uIbSy+EojbP55D # 9PbDqc4fd1ZOTOr0RS/LIIIT0KxCTjYFw9NEsv+/BCw2c3YRGSbD8HPIPfCV6NUs # lDcDdT3LvXcc+CJ0aBpnyj7IC8pauPca/m93eQYnGGpsfB4NcgNQ9bGdhckZ9dvv # IMKlqzbGcZ/+hsspPeblgGddTbYH6Ev8An5Ch4Z4g6tKByrSB0scuWrIqPYbzMCA # v9a3zZb9 # SIG # End signature block
combined_dataset/train/non-malicious/349.ps1
349.ps1
function Register-PSFFeature { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [string] $Name, [string] $Description, [switch] $NotGlobal, [switch] $NotModuleSpecific, [string] $Owner = (Get-PSCallStack)[1].InvocationInfo.MyCommand.ModuleName ) begin { $featureObject = New-Object PSFramework.Feature.FeatureItem -Property @{ Name = $Name Owner = $Owner Global = (-not $NotGlobal) ModuleSpecific = (-not $NotModuleSpecific) Description = $Description } } process { [PSFramework.Feature.FeatureHost]::Features[$Name] = $featureObject } }
combined_dataset/train/non-malicious/367.ps1
367.ps1
function Export-PSFClixml { [CmdletBinding(HelpUri = 'https://psframework.org/documentation/commands/PSFramework/Export-PSFClixml')] param ( [Parameter(Mandatory = $true, Position = 0)] [string] $Path, [int] $Depth, [Parameter(ValueFromPipeline = $true)] $InputObject, [PSFramework.Serialization.ClixmlDataStyle] $Style = 'Byte', [switch] $NoCompression, [switch] $PassThru, [PSFEncoding] $Encoding = (Get-PSFConfigValue -FullName 'PSFramework.Text.Encoding.DefaultWrite') ) begin { Write-PSFMessage -Level InternalComment -Message "Bound parameters: $($PSBoundParameters.Keys -join ", ")" -Tag 'debug', 'start', 'param' try { $resolvedPath = Resolve-PSFPath -Path $Path -Provider FileSystem -SingleItem -NewChild } catch { Stop-PSFFunction -Message "Could not resolve outputpath: $Path" -EnableException $true -Cmdlet $PSCmdlet -ErrorRecord $_ } [System.Collections.ArrayList]$data = @() } process { $null = $data.Add($InputObject) if ($PassThru) { $InputObject } } end { try { Write-PSFMessage -Level Verbose -Message "Writing data to '$resolvedPath'" if ($Style -like 'Byte') { if ($NoCompression) { if ($Depth) { [System.IO.File]::WriteAllBytes($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToByte($data.ToArray(), $Depth))) } else { [System.IO.File]::WriteAllBytes($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToByte($data.ToArray()))) } } else { if ($Depth) { [System.IO.File]::WriteAllBytes($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToByteCompressed($data.ToArray(), $Depth))) } else { [System.IO.File]::WriteAllBytes($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToByteCompressed($data.ToArray()))) } } } else { if ($NoCompression) { if ($Depth) { [System.IO.File]::WriteAllText($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToString($data.ToArray(), $Depth)), $Encoding) } else { [System.IO.File]::WriteAllText($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToString($data.ToArray())), $Encoding) } } else { if ($Depth) { [System.IO.File]::WriteAllText($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToStringCompressed($data.ToArray(), $Depth)), $Encoding) } else { [System.IO.File]::WriteAllText($resolvedPath, ([PSFramework.Serialization.ClixmlSerializer]::ToStringCompressed($data.ToArray())), $Encoding) } } } } catch { Stop-PSFFunction -Message "Failed to export object" -ErrorRecord $_ -EnableException $true -Target $resolvedPath -Cmdlet $PSCmdlet } } }
combined_dataset/train/non-malicious/4161.ps1
4161.ps1
Import-Module "D:\Program Files\Microsoft Configuration Manager\AdminConsole\bin\ConfigurationManager.psd1" function Get-Updates { param ([String]$Architecture, [String]$OperatingSystem, [String]$Namespace, $Updates ) $Updates = @() $Updates = Get-WmiObject -Class SMS_SoftwareUpdate -Namespace $Namespace $Updates = $Updates | where-object { ($_.LocalizedDisplayName -match $OperatingSystem) } If ($Architecture -eq "x86") { $Updates = $Updates | where-object { ($_.LocalizedDisplayName -notmatch "x64") } } elseif ($Architecture -eq "x64") { $Updates = Get-WmiObject -Class SMS_SoftwareUpdate -Namespace $Namespace | where-object { ($_.LocalizedDisplayName -match $OperatingSystem) -and ($_.LocalizedDisplayName -match "x64") } } Return $Updates } function Set-Filters { param($Filters, $Updates, $UpdateTypes) Set-Variable -Name Filter -Scope Local -Force Set-Variable -Name UpdateType -Scope Local -Force foreach ($Filter in $Filters) { $Updates = $Updates | Where-Object { $_.LocalizedDisplayName -notmatch $Filter } } If ($UpdateTypes.Count -ge 1) { foreach ($UpdateType in $UpdateTypes) { $Updates = $Updates | Where-Object { $_.LocalizedCategoryInstanceNames -match $UpdateType } } If ($UpdateTypes -eq "Update") { $Updates = $Updates | Where-Object { $_.LocalizedDisplayName -notmatch "Security Update" } } } return $Updates Remove-Variable -Name Filter -Scope Local -Force Remove-Variable -Name UpdateType -Scope Local -Force } function Set-TimeSpanByMonthsOld { param ($MonthsOld, $Updates) Set-Variable -Name Day -Scope Local -Force Set-Variable -Name Month -Scope Local -Force Set-Variable -Name FirstDayOfMonth -Scope Local -Force Set-Variable -Name LastDayOfMonth -Scope Local -Force Set-Variable -Name Today -Scope Local -Force If ($MonthsOld -ge 1) { $MonthsOld = $MonthsOld * -1 } $Today = Get-Date $Month = $Today.AddMonths($MonthsOld) $Day = $Month.Day $FirstDayOfMonth = $Month.AddDays(($Day - 1) * -1) $LastDayOfMonth = [System.DateTime]::DaysInMonth($Month.Year, $Month.Month) $LastDayOfMonth = $LastDayOfMonth - 1 $LastDayOfMonth = $FirstDayOfMonth.AddDays($LastDayOfMonth) $FirstDayOfMonth = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime($FirstDayOfMonth) $LastDayOfMonth = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime($LastDayOfMonth) $Updates = $Updates | Where { ($_.DateCreated -ge $FirstDayOfMonth) -and ($_.DateCreated -le $LastDayOfMonth) } return $Updates Remove-Variable -Name Day -Scope Local -Force Remove-Variable -Name Month -Scope Local -Force Remove-Variable -Name FirstDayOfMonth -Scope Local -Force Remove-Variable -Name LastDayOfMonth -Scope Local -Force } function Set-TimeSpanByDatePeriod { param ([String]$StartDate, [String]$EndDate, $Updates) $StartDate = [DateTime]$StartDate $StartDate = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime($StartDate) $EndDate = [DateTime]$EndDate $EndDate = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime($EndDate) $Updates = $Updates | Where { ($_.DateCreated -ge $StartDate) -and ($_.DateCreated -le $EndDate) } return $Updates } function Set-TimeSpanAllUpdatesBeforeDate { param ([String]$StartDate, $Updates) $StartDate = [DateTime]$StartDate $StartDate = [System.Management.ManagementDateTimeConverter]::ToDmtfDateTime($StartDate) $Updates = $Updates | Where { $_.DateCreated -lt $StartDate } return $Updates } function CreateSoftwareUpdateGroup { param ($OperatingSystem, $Architecture, $Updates) Set-Variable -Name Description -Scope Local -Force Set-Variable -Name Month -Scope Local -Force Set-Variable -Name SoftwareUpdateGroupName -Scope Local -Force Set-Variable -Name SoftwareUpdates -Scope Local -Force Set-Variable -Name Temp -Scope Local -Force Set-Variable -Name Update -Scope Local -Force Set-Variable -Name Year -Scope Local -Force $SoftwareUpdates = @() $Year = (Get-Date).Year $Month = Get-Date -format "MMMM" $SoftwareUpdateGroupName = $OperatingSystem + $Architecture + [char]32 + $Month + [char]45 + $Year $Description = $SoftwareUpdateGroupName + [char]32 + "Updates" foreach ($Update in $Updates) { $SoftwareUpdates += ($Update.CI_ID) } cd BNA: $TEMP = New-CMSoftwareUpdateGroup -Name $SoftwareUpdateGroupName -UpdateID $SoftwareUpdates -Description $Description cd c: $SoftwareUpdates = $null Remove-Variable -Name Description -Scope Local -Force Remove-Variable -Name Month -Scope Local -Force Remove-Variable -Name SoftwareUpdateGroupName -Scope Local -Force Remove-Variable -Name SoftwareUpdates -Scope Local -Force Remove-Variable -Name Temp -Scope Local -Force Remove-Variable -Name Update -Scope Local -Force Remove-Variable -Name Year -Scope Local -Force } function ProcessLogFile { param([String]$OperatingSystem, [String]$Architecture) Set-Variable -Name LogFile -Scope Local -Force Set-Variable -Name Month -Scope Local -Force Set-Variable -Name Output -Scope Local -Force Set-Variable -Name temp -Scope Local -Force $Month = Get-Date -format "MMMM" $OperatingSystem = $OperatingSystem -replace '\s','' $LogFile = $env:TEMP + "\" + $OperatingSystem + $Architecture + $Month + "UpdatesReport.csv" if ((Test-Path $LogFile) -eq $true) { Remove-Item $LogFile -Force } if ((Test-Path $LogFile) -eq $false) { $temp = New-Item $LogFile -ItemType file -Force $Output = "Update Name, Article ID, Update Type, Release Date" Out-File -FilePath $LogFile -InputObject $Output -Force -Encoding UTF8 } Return $LogFile Remove-Variable -Name LogFile -Scope Local -Force Remove-Variable -Name Month -Scope Local -Force Remove-Variable -Name Output -Scope Local -Force Remove-Variable -Name temp -Scope Local -Force } function New-Report { param($EmailAddressList, $Updates, $OperatingSystem, $Architecture) Set-Variable -Name ArticleID -Scope Local -Force Set-Variable -Name Body -Scope Local -Force Set-Variable -Name DateCreated -Scope Local -Force Set-Variable -Name EmailAddress -Scope Local -Force Set-Variable -Name Month -Scope Local -Force Set-Variable -Name Output -Scope Local -Force Set-Variable -Name Subject -Scope Local -Force Set-Variable -Name Update -Scope Local -Force foreach ($Update in $Updates) { $Update.LocalizedDisplayName = $Update.LocalizedDisplayName -replace ",", "" $ArticleID = "KB" + $Update.ArticleID [String]$DateCreated = [System.Management.ManagementDateTimeConverter]::ToDateTime($Update.DateCreated) If ($Update.LocalizedCategoryInstanceNames -match "Security Updates") { $Output = $Update.LocalizedDisplayName + "," + $ArticleID + ",Security Update," + $DateCreated } elseif (($Update.LocalizedCategoryInstanceNames -notmatch "Security Updates") -and ($Update.LocalizedCategoryInstanceNames -match "Update")) { $Output = $Update.LocalizedDisplayName + "," + $ArticleID + ",Update," + $DateCreated } else { $Output = $Update.LocalizedDisplayName + "," + $ArticleID + ", ," + $DateCreated } Out-File -FilePath $LogFile -InputObject $Output -Append -Force -Encoding UTF8 } $Month = Get-Date -format "MMMM" $Subject = $OperatingSystem + $Architecture + [char]32 + $Month + [char]32 + "SCCM Windows Update List" $Body = "List of Windows updates added to the" + $OperatingSystem + $Architecture + [char]32 + $Month + " software update group." foreach ($EmailAddress in $EmailAddressList) { Send-MailMessage -To $EmailAddress -From "[email protected]" -Subject $Subject -Body $Body -Attachments $LogFile -SmtpServer "smtp.wallerlaw.com" } $EmailAddresses = $null Remove-Variable -Name ArticleID -Scope Local -Force Remove-Variable -Name Body -Scope Local -Force Remove-Variable -Name DateCreated -Scope Local -Force Remove-Variable -Name EmailAddress -Scope Local -Force Remove-Variable -Name Month -Scope Local -Force Remove-Variable -Name Output -Scope Local -Force Remove-Variable -Name Subject -Scope Local -Force Remove-Variable -Name Update -Scope Local -Force } Set-Variable -Name Architecture -Scope Local -Force Set-Variable -Name EmailAddresses -Scope Local -Force Set-Variable -Name Filters -Scope Local -Force Set-Variable -Name LogFile -Scope Local -Force Set-Variable -Name Namespace -Value root\sms\site_bna -Scope Local -Force Set-Variable -Name OperatingSystem -Scope Local -Force Set-Variable -Name Updates -Scope Local -Force Set-Variable -Name UpdateTypes -Scope Local -Force cls $EmailAddresses = @("[email protected]") $OperatingSystem = "Windows 7" $Architecture = "x86" $UpdateTypes = @() $Filters = @("Internet Explorer 8", "Internet Explorer 9", "Internet Explorer 10") $Updates = @() $LogFile = ProcessLogFile -OperatingSystem $OperatingSystem -Architecture $Architecture $Updates = Get-Updates -Architecture $Architecture -Namespace $Namespace -OperatingSystem $OperatingSystem -Updates $Updates $Updates = Set-Filters -Filters $Filters -Updates $Updates -UpdateTypes $UpdateTypes $Updates = Set-TimeSpanByMonthsOld -MonthsOld 1 -Updates $Updates CreateSoftwareUpdateGroup -OperatingSystem $OperatingSystem -Updates $Updates -Architecture $Architecture New-Report -EmailAddressList $EmailAddresses -Updates $Updates -OperatingSystem $OperatingSystem -Architecture $Architecture Write-Host Write-Host "Total Number of Updates:"$Updates.Count $Filters = $null $Updates = $null $UpdateTypes = $null Remove-Variable -Name Architecture -Scope Local -Force Remove-Variable -Name EmailAddresses -Scope Local -Force Remove-Variable -Name Filters -Scope Local -Force Remove-Variable -Name LogFile -Scope Local -Force Remove-Variable -Name Namespace -Scope Local -Force Remove-Variable -Name OperatingSystem -Scope Local -Force Remove-Variable -Name Updates -Scope Local -Force Remove-Variable -Name UpdateTypes -Scope Local -Force
combined_dataset/train/non-malicious/sample_49_35.ps1
sample_49_35.ps1
# # Module manifest for module 'OCI.PSModules.Cloudbridge' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Cloudbridge.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '23fab747-5070-4685-94b0-d91859b2fd98' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Cloudbridge Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudbridge.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgent', 'Get-OCICloudbridgeAgentDependenciesList', 'Get-OCICloudbridgeAgentDependency', 'Get-OCICloudbridgeAgentsList', 'Get-OCICloudbridgeApplianceImagesList', 'Get-OCICloudbridgeAsset', 'Get-OCICloudbridgeAssetsList', 'Get-OCICloudbridgeAssetSource', 'Get-OCICloudbridgeAssetSourceConnectionsList', 'Get-OCICloudbridgeAssetSourcesList', 'Get-OCICloudbridgeDiscoverySchedule', 'Get-OCICloudbridgeDiscoverySchedulesList', 'Get-OCICloudbridgeEnvironment', 'Get-OCICloudbridgeEnvironmentsList', 'Get-OCICloudbridgeHistoricalMetricsList', 'Get-OCICloudbridgeInventoriesList', 'Get-OCICloudbridgeInventory', 'Get-OCICloudbridgePlugin', 'Get-OCICloudbridgeWorkRequest', 'Get-OCICloudbridgeWorkRequestErrorsList', 'Get-OCICloudbridgeWorkRequestLogsList', 'Get-OCICloudbridgeWorkRequestsList', 'Import-OCICloudbridgeInventory', 'Invoke-OCICloudbridgeAnalyzeAssets', 'Invoke-OCICloudbridgeRefreshAssetSource', 'Invoke-OCICloudbridgeSubmitHistoricalMetrics', 'Move-OCICloudbridgeAgentCompartment', 'Move-OCICloudbridgeAgentDependencyCompartment', 'Move-OCICloudbridgeAssetCompartment', 'Move-OCICloudbridgeAssetSourceCompartment', 'Move-OCICloudbridgeAssetTags', 'Move-OCICloudbridgeDiscoveryScheduleCompartment', 'Move-OCICloudbridgeEnvironmentCompartment', 'New-OCICloudbridgeAgent', 'New-OCICloudbridgeAgentDependency', 'New-OCICloudbridgeAsset', 'New-OCICloudbridgeAssetSource', 'New-OCICloudbridgeDiscoverySchedule', 'New-OCICloudbridgeEnvironment', 'New-OCICloudbridgeInventory', 'Remove-OCICloudbridgeAgent', 'Remove-OCICloudbridgeAgentDependency', 'Remove-OCICloudbridgeAsset', 'Remove-OCICloudbridgeAssetSource', 'Remove-OCICloudbridgeDiscoverySchedule', 'Remove-OCICloudbridgeEnvironment', 'Remove-OCICloudbridgeInventory', 'Stop-OCICloudbridgeWorkRequest', 'Update-OCICloudbridgeAgent', 'Update-OCICloudbridgeAgentDependency', 'Update-OCICloudbridgeAsset', 'Update-OCICloudbridgeAssetSource', 'Update-OCICloudbridgeDiscoverySchedule', 'Update-OCICloudbridgeEnvironment', 'Update-OCICloudbridgeInventory', 'Update-OCICloudbridgePlugin' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudbridge' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/58fc59d6-61a1-47e9-8c5f-1b9b9d17a727.ps1
58fc59d6-61a1-47e9-8c5f-1b9b9d17a727.ps1
#PrinterChecking Script By Henrik Pedersen Ċmark and Daniel Lundgren #This script is designed to check what printers that is still in use. #It's assumed the printer is classed as inactive if it hasnt been used in X months #The script is reading the Systemlog on a printserver of your choice, the one you type in the hostname for, #sorting the log on eventID 10 (successful print) and searching for entries the latest 6 months. #When its done it gets printer ports and ques from the same server and then compare them to the messageline from the eventlog. #And then checking if the mportname of is in the message. #If it is, it will write the name to a file and if not it will write the name to another file. #You will need admin rights to use the script. $date = Get-Date -UFormat %Y%m%d #Finding out what host to check logs from Write-Host "What server do you want to get the eventlog from?" $hostname = Read-Host Write-Host "Getting eventlog from remote server "$hostname". Please wait..." Write-Host "Please wait... (this might take a few minutes)" #Get Eventlog from a remote host $events = gwmi -ComputerName $hostname -query "select * from win32_ntlogevent where logfile='system' and eventcode='10' and sourcename='print'" | Select-Object EventCode, Timegenerated, Message | sort Timegenerated #Making a variable for the printerports $printerports = Get-WmiObject -computername $hostname Win32_Printer | Select-Object Portname, DeviceID, __server, name #Converting newest logtimes to DateTime $newest = [System.Management.ManagementDateTimeConverter]::ToDateTime($events[0].TimeGenerated) Write-Host "Oldest logentry is from:" $newest Write-Host "How many months back do you want to check?" $months = Read-Host #Checks is the path where the files gonna be added exists, it it dont, it creates it if ((Test-Path -path $hostname) -ne $True) { New-Item -type directory -path $hostname } $counter = 0 while ($counter -ne ($printerports.count-1)) { $foundprinted = 0 #Looping through each line and checking for how old the events are and if they match the current printerquename foreach ($line in $events) { #Converting Timegenerated to DateTime $current = ([System.Management.ManagementDateTimeConverter]::ToDateTime($line.TimeGenerated)) #Checking each line for beeing less then X months and has quename in the message if ($current -gt $(Get-Date).AddMonths(-$months) -and ($line.message -match $printerports[$counter].name )) { $foundprinted = 1 } } if ($foundprinted) { write-host -ForegroundColor Green $printerports[$counter].name"is in use!" #Writing to a file add-content -path $hostname\\Validprinters_$date.txt -Value $printerports[$counter].name } else { #Writing to another file write-host -ForegroundColor red $printerports[$counter].name "is not in use!" add-content -path $hostname\\Invalidprinters_$date.txt -Value $printerports[$counter].name } #Adds 1 to the counter so the loop ends after all quenames are checked $counter=$counter+1 }
combined_dataset/train/non-malicious/sample_54_95.ps1
sample_54_95.ps1
<# .SYNOPSIS SyncShare.psd1 file This is a place-holder module file only for agent patch build purposes #> Write-Host "This module functionality is deprecated and is place-holder only" # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCaaVJdJzPffP5l # 7FLnDLm/ocZX0gIE54AFW0M330NKAqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAc+id80+vUgeu2tgLBRS+2g # 6KfeF0fs39e9dsTOu04rMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEACwq9CNW0dl0ZKzwx+hP6HvJhTWliRe1X9U9vwZHWwOxaovpcEW7FIWSY # grVj4ktn8EuWTyL5HNkrtx88XkDltJZ+0fByVqPjA00fSkX59vKIGR0dzcuo2vYX # r+bWfzfg6Od2y44MNONdj1UdOl2vpvLtERDGJ2C0KMNEvPmIYbRPqByyvnLuGLMc # Cb821Tv6h5zRGdHUvwmXcEB6+K/bgpOrWQztmKCQWpvCCtDRNMAbxVsQrXT+ql2B # d/x90fsc75DzalGOiB05GT9Ia0rEGwlLhrxxJxfYf2sqSclpuCdcNa9TBCLIURkQ # ICz+WGgxO2uPrTx2aOEdEma26DPhNqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDxlXr8uoeyB+kZdlNw1zLh/1T2MyBtLs1XbgpSX1ICQQIGZkXvd4gh # GBMyMDI0MDUzMDIyMDU0Mi4zODNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6gLh9DAiGA8yMDI0MDUzMDExMzEw # MFoYDzIwMjQwNTMxMTEzMTAwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqAuH0 # AgEAMAoCAQACAgQ3AgH/MAcCAQACAhSJMAoCBQDqBDN0AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAG3OlyA11MXWp69Ff5x8zIhLsDcvpabqYKiWin66q8Ip # A4XgjHWEzDnF/U9tghg5mFqHKuyS3/hsy7BIxGL2q+92grEQ0rpSi4iFVPXnookn # nmAAgdFqh/PccaGGJW7sw/HprCIVMEccePwXmXiBhuJnJhVuqIItPu+OIykEuekV # UCcokTnrYzpuH17VusZpOZwGhfzxwa4DvwHxFvtSYi61jgX6BIcTSeLKcgxlFZ9y # XDVKBqvFD7JnkiIp3oGt+neS092SP5JQARBtMoGSSmugYD0OOXHu7NJs1Ub4xGU5 # UtfGkAnAGF3GCCZEFFOvjfjoLYuNyZTUcuI/NPg1+O0xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB # 7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAXHPVuzPSHXY+cMX2XtFYFgUUNfWev1WcEQkm4XDab # bjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/ # xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgwoPLpQqoAE0QA+R0b+DdjVGX # UNAciJ94puIR8tR5EpswDQYJKoZIhvcNAQELBQAEggIAFreWS6e51GrnB3oDAcAD # h8fAenawPZB9rL61jxptx8i0bxbCISPNyrO2ylLa4i2PJ3BNUt005eKAq3Io+rjX # h43/XTNqFMng3qPmWZbyDm1Zjb2x0AhyYGm2p+uvhpMjC5VPZxmR45k/YAwZfw3d # MklF924rsOVD0E2UfGsG3Po4CcIEiiVrMEF+UZ7+Wts8r8/ELwKNJSkZzdoa1QjR # A1X58GaEc6JhwMcdtuc/GPyM/EoCAvwoj4uZ7NkPPJp1Z+FDXVtCBRDAicY2wUri # 7BbWf53wT+81udtJ4/+Di6DJ1b37VcE+xBoNTYBRJfItqy2bgy+tao90IP/Xa4HT # PVxUr/8HNcxZuoBJ5Vcx7l9Nh0df+uQlUq56V02VeO1YaMw3w3lvyNmJlNrYLp6v # 0zLtkuhphlt/guW1J2NppvRXr2PkZ8+024uZvKxK10F9xHKIYHTq+rcwKJkAofDl # MUlzGTYErv4ImhQR7eS0VG3+Aa/+pMQbDIF9HX6QXKb5cl19f8GG1waWy2xkdrZn # BJlyE4xb0mt8tPFoqpTiD3YDyEQ0B5LnPlA2b5BWh/XVxpra60JeJmz4kaGQl5ul # +5PY0GOYYMi/emzpG6TDzBGYSRhFG3C9G6ttfc3lZOJQZiw433n+k1Kc3Xy0Y3QA # 2h8QvpJtegdF3pohWfIDttA= # SIG # End signature block
combined_dataset/train/non-malicious/sample_59_28.ps1
sample_59_28.ps1
# # Module manifest for module 'OCI.PSModules.Autoscaling' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Autoscaling.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '98b2f4cc-21d0-4675-bf24-96c27b13f169' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Autoscaling Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Autoscaling.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAutoscalingConfiguration', 'Get-OCIAutoscalingConfigurationsList', 'Get-OCIAutoscalingPoliciesList', 'Get-OCIAutoscalingPolicy', 'Move-OCIAutoscalingConfigurationCompartment', 'New-OCIAutoscalingConfiguration', 'New-OCIAutoscalingPolicy', 'Remove-OCIAutoscalingConfiguration', 'Remove-OCIAutoscalingPolicy', 'Update-OCIAutoscalingConfiguration', 'Update-OCIAutoscalingPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Autoscaling' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_32_9.ps1
sample_32_9.ps1
/////////////////////////////////////////////////////////////////////////////// // Constants // MUST be kept in sync with the constants used in TreDesigner /////////////////////////////////////////////////////////////////////////////// var kOrthographicCameraUniqueId = "Microsoft.VisualStudio.3D.OrthographicCamera"; var kOrthographicCameraMatrixTraitId = "CameraMatrix"; var kOrthographicCameraZoomFactorTraitId = "ZoomFactor"; var kViewportWidthTraitId = "ViewportWidth"; var kViewportHeightTraitId = "ViewportHeight"; var cameraElement = document.elements.getElement(kOrthographicCameraUniqueId); var zoomFactorTrait = cameraElement.getTrait(kOrthographicCameraZoomFactorTraitId); var oldZoomFactor = zoomFactorTrait.value; var sizeFudgeFactor = -8; var viewportWidth = cameraElement.getTrait(kViewportWidthTraitId).value + sizeFudgeFactor; var viewportHeight = cameraElement.getTrait(kViewportHeightTraitId).value + sizeFudgeFactor; // get the main document element var textureElement = document.elements.getElement("Microsoft.VisualStudio.Canvas"); if (textureElement == null) { textureElement = document.elements.getElement("Microsoft.VisualStudio.DxgiViewerElement"); } var textureWidth = textureElement.getTrait("Width").value; var textureHeight = textureElement.getTrait("Height").value; var newZoomFactor; var zoomFactorWidth = textureWidth / viewportWidth; var zoomFactorHeight = textureHeight / viewportHeight; if (zoomFactorWidth > zoomFactorHeight) { newZoomFactor = zoomFactorWidth; } else { newZoomFactor = zoomFactorHeight; } newZoomFactor = document.capZoomLevel(newZoomFactor); if (newZoomFactor != oldZoomFactor) { zoomFactorTrait.value = newZoomFactor; } // re-position the camera at the origin var cameraMatrixTrait = cameraElement.getTrait(kOrthographicCameraMatrixTraitId); var cameraMatrix = cameraMatrixTrait.value; var translation = math.getTranslation(cameraMatrix); translation[0] = 0; translation[1] = 0; math.setTranslation(cameraMatrix, translation); cameraMatrixTrait.value = cameraMatrix; // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // lPs0pZdeQitArN1ZTsITVrgfBNyjGbTyh6dQTQ7b5rWg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCC1+8i8fdZS/7BlWL87kjT2XjA+xXbVWe4+ // SIG // RJE5kVWfWDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAKLz7flx // SIG // gspgrjS4I31ccqy1du5e6UlUMdT2Kzj2y64aCaOMlue4 // SIG // pBrD5J0llEDD8JKG1QL1RFIzfXbkK/MtfjXXFXQuoxo5 // SIG // ZPDeEh54AEGszbjhAUs8Ihj3QcVX8dT11xmhQByZancA // SIG // 9YbUXq2yQ+LAeU2l91VmXuLU8AqX9txxJFm0shNFEzO+ // SIG // q2Bm/A8hgrqAExBEiaGuihtOWE4A+5CmVh4akkaaMcxV // SIG // IOvPlLRop9AZZzaPSw5Ts5iE4gx2c6gZ4Hs5F4c2pL/n // SIG // rad/Mc2m4F2oaVfID3Y1zmeWlCqenFgubvsi3MAgcNcN // SIG // dGnVDzo+c7jnlDLh+C9abe2DI5GhghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgYVcj6N5o+OmB7H0o/dtw // SIG // fuqh1GGinVIVo2/8+7/FznsCBmXV5UM+ZxgTMjAyNDAy // SIG // MjkyMjMwMDYuNjg1WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5 // SIG // QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB2o7V // SIG // yVoA0RGxAAEAAAHaMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDY1OVoXDTI1MDExMDE5MDY1OVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCTkAYIdrVRUdY/I0AODQ3/G3Fa10jdPNAjSj0kKO0u // SIG // e7Apz1NBSheO8Ni+qh7cJuBJwpRdnK7lxaf5ez6TEINu // SIG // RO1/MQ5r8a/AQROogEgDwn603m7rwLGVnCWIcu6a4Arg // SIG // X+zonV6YLFtcvKelbO7A9mrqf9Lr3mMXl5SrbD4zAqZR // SIG // 5JNG2vh4C4aNCevCnY4twzNiufcB8vca7bGCvl/Xq2wx // SIG // mdppl9++uWkuUO/7oA8TFYM8o/NMiZ+lC55Jw/YuJFEM // SIG // VYaldXXPwxelAXrs37pJDHne7a81BGTEcpWu6ob8FHkJ // SIG // YMwkIaWY8/s7EIKV5T3M7xndIqq+5QAsH1RqIOaZSM3R // SIG // Mb7dUwPCZnn/NfWkysB9SFRCMGCwOrr0vJEXQOkcbzHG // SIG // //7pTYyLhnHsspDAFxMp1ayxvVbyuK36wrBi9499C5on // SIG // boPqMK3Ao0GoGJqxpNYQcpF4paPWAfEMsuUNSoRrh+uV // SIG // d8xcvGtJMGygUbPFUeB7aD2MPc9Q3XCX2QTtnYc198gD // SIG // IqQhpukpr5r2r0bF4cvNOY4gKQ8jfrNP2+6LNs/IkVhi // SIG // ZOjPbrk9uPd4BVf/SSxoOWCSQiVyPssZDvzl52SbLhrd // SIG // Ps1i3R0uFyFwRte6D7uSrBX0Ux0RJaEdnSOhsGmsSMg8 // SIG // kh2DrbyMnZWu7uJX53wo2P6ikwIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFKF8jclRPWYTlYsxFFcITYC/D19FMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQC5g1XU7biNIwBLeNTtjjPAlNt+ // SIG // 0xjMoaxq+xcyghBWl8baKpPyDm0K4qtXGh1Ydr8rkNuJ // SIG // 8903Tgb+63LP6pz4zsZ1xS8mT3mli7DbgEVZlFYslWF4 // SIG // 12AeQ8M2lmYEnGPBii+8ho8lq4e/FiVIIe6xNfuVQ+Yd // SIG // P+q7PXQUagMyPX4Wc+7KbI7fL58edFhMWwUkh+632mx3 // SIG // p3aXqm05lv0X3Gk/hhSLE/oNno+8ESiKv0IZ7KBfJqRT // SIG // Tx1dav1iv6xfwoaL5ISTA75arRE1ovexqJTkimpmQvW2 // SIG // IHDyn89vHnduVictdFbUPT+fgv9nTnw2s9UZnjm9uym3 // SIG // oIWtEnz3K4k3zkVb6jw0mt5/Te3YU2O/uPSPHr6GnfYX // SIG // WfAnyDj37cLd8U19kYTGSQlaBZWmx3L32/OK2hTOnM+R // SIG // GJPsdWlRIl7YCukdMZ9cIzFx39AFpUo6kZM70p0SsxbG // SIG // cBJe+FWoZSlYSPgovUU/fuhnNMVsye80CFBRNyYosefu // SIG // yi/AKx3wWPVBS8+LJ26Ce0IqdyAA25FOGS9IkPI/CMa2 // SIG // u2kmH06FHn5nLd3TOvX3+BHodiofTbCooqYefPQKf8Ut // SIG // YxEpa34y/4P2W6GkuXfWtnwOffJrmw7yw+ceTz9++9NL // SIG // 5v2PjyIZqdn077ktrJ3XmQZsk6nFDR0TZgpPp41d5zCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046MDg0Mi00QkU2LUMyOUExJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAEKiHyGJYx1GzaGNP8I4V0Z/7EgN // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDpiu5OMCIYDzIwMjQw // SIG // MjI5MTk1MTQyWhgPMjAyNDAzMDExOTUxNDJaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOmK7k4CAQAwBwIBAAIC // SIG // BHIwBwIBAAICEdcwCgIFAOmMP84CAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQB8 // SIG // ODdMa83zJWGEWAVOrIiIBD+xSqLko++RjG8Ziv6PavWH // SIG // 6udHW3pHkpDpeoqqi7BFgHLtADqb3xB/28bxXpxL3zKG // SIG // U7jjR0lPMtmwry7xCHZhO1yek0nCzJlrUXkkJf8XJd6w // SIG // qdp3JRqB2cMsVAY8q0FYGJWD15pTXj/DUyLa8zGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIMvT+ehsJa5mph6a // SIG // WqeAjuYF5T4VXW++74aP7cQeKKdpMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQgIqWjaWLA756k3veQ49Qt // SIG // PdNtCOZY4m61v53SAjsYPcYwgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANER // SIG // sQABAAAB2jAiBCCkCn8j4uWEvAcpSQO5+L09jX//Xaab // SIG // FcFaG196uKkHvzANBgkqhkiG9w0BAQsFAASCAgBTPqzb // SIG // ya0FHErjftriSKzv5UPBB5Ldw5tcXyvgIsDfE+9jz3Am // SIG // ZTngfK7QjVbjYyHwQBZhHyaExUA/0YCXGuiv4Ty1fD4U // SIG // jq+IEWw6kPRtZjXmlRi+9nhP06tHD5EcIG9VUleXoQZ6 // SIG // Tst4uHsrjz/Hf06oWgrd1LaMCWsE9rita5jAfFCsTLY7 // SIG // 4pAd6TOqva1QvcR8N1xA7j1EeL4QbLJ0OPRcGJdcoXsA // SIG // 0gM8/XUib5xdmoPPI3Q3VL6FoWVoJPXRoJiOzPTsMYNr // SIG // x6Qek2PQL/+QBMI38U8zWncrxIEXvpqXhwZkUYF2dbIR // SIG // rH+0PaBYqZpJUOMK5lRdxkEA+tIoIQTgIsfw6QFf7Z7R // SIG // N84vuCyi3xZ/djTMavAkwEpfNRavtEni+7BdQbKQ5bk1 // SIG // c+F/5wUmG4w2+ESHZCrTmBInN7U1CblzNj1rulQNp1Zs // SIG // /+Wl1cWqN+anTLI/2O+eXm2L0/SgcmapZEJ7R4DykLcp // SIG // 8dndMmEO/7tcEdQJP+ta3WOHZJjxF+ceFnh9gK3R/3pp // SIG // nfDZSo97h/wzE3k0yliid8pdO1pTY42MgSkkLRnj4CzA // SIG // 5u3vNAJQs3Bo+qff1zu9NOrGg1hf2uuZWdiqUe9GZQnQ // SIG // /scZsQIWXmjE+Wy0YFENAhDaIeQa3m3P7MaU+/HWP0PR // SIG // crD6N6kPQtR2Bro0NA== // SIG // End signature block
combined_dataset/train/non-malicious/1593.ps1
1593.ps1
$DebugPreference = "SilentlyContinue" $UserName = (Get-Item Env:\USERNAME).Value $origComputerName = (Get-Item Env:\COMPUTERNAME).Value $ComputerName = Read-Host 'What is the computer name?' $FileName = (Join-Path -Path ((Get-ChildItem Env:\USERPROFILE).value) -ChildPath $ComputerName) + ".html" $style = @" <style> BODY{background-color:Lavender} TABLE{border-width: 1px;border-style: solid;border-color: black;border-collapse: collapse} TH{border-width: 1px;padding: 3px;border-style: solid;border-color: black;background-color:thistle} TD{border-width: 1px;padding: 3px;border-style: solid;border-color: black;background-color:PaleGoldenrod} </style> "@ if (Test-Path -Path $FileName) { Remove-Item $FileName Write-Debug "$FileName removed" } Get-WmiObject win32_Product -ComputerName $ComputerName | Select Name,Version,PackageName,Installdate,Vendor | Sort Installdate -Descending | ConvertTo-Html -Head $style -PostContent "Report generated on $(get-date) by $UserName on computer $origComputerName" -PreContent "<h1>Computer Name: $ComputerName<h1><h2>Software Installed</h2>" -Title "Software Information for $ComputerName" | Out-File -FilePath $FileName Write-Debug "File saved $FileName" Invoke-Item -Path $FileName
combined_dataset/train/non-malicious/1630.ps1
1630.ps1
function Get-PrinterHosts { Param ( [string]$comp = $env:COMPUTERNAME ) if (!$comp) { throw 'No comps.' } $ping = New-Object System.Net.NetworkInformation.Ping try { $result = $ping.Send($comp) } catch { $result = $null } if ($result.Status -eq 'Success') { $printers = Get-WmiObject Win32_Printer -ComputerName $comp | select name, sharename, systemname, portname, shared, printerpapernames, capabilitydescriptions, location, comment, drivername $ip = $result.Address.ToString() foreach ($printer in $printers) { [pscustomobject]@{ Computer = $comp.ToUpper() ComputerIP = $ip Printer = $printer.Name.ToUpper() ShareName = $(try { $printer.ShareName.ToUpper() } catch { $null }) SystemName = $(if ($printer.SystemName.StartsWith('\')) {$printer.SystemName.Substring(2).ToUpper()} else {$printer.SystemName.ToUpper()}) Location = $(try { $printer.Location } catch { $null }) Comment = $(try { $printer.Comment } catch { $null }) DriverName = $(try { $printer.DriverName } catch { $null }) Port = $printer.PortName Shared = $printer.Shared PrinterPaperNames = $printer.PrinterPaperNames CapabilityDescriptions = $printer.CapabilityDescriptions } } } else { [pscustomobject]@{ Computer = $comp.ToUpper() ComputerIP = '-' Printer = '-' ShareName = '-' SystemName = '-' Location = '-' Comment = '-' DriverName = '-' Port = '-' Shared = '-' PrinterPaperNames = '-' CapabilityDescriptions = '-' } } }
combined_dataset/train/non-malicious/3663.ps1
3663.ps1
function Test-CreateDatabase { Test-CreateDatabaseInternal "Southeast Asia" } function Test-CreateDatabaseInternal ($location = "westcentralus") { $rg = Create-ResourceGroupForTest $server = Create-ServerForTest $rg $location try { $databaseName = Get-DatabaseName $job1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -AsJob $job1 | Wait-Job $db = $job1.Output Assert-AreEqual $databaseName $db.DatabaseName Assert-NotNull $db.MaxSizeBytes Assert-NotNull $db.Edition Assert-NotNull $db.CurrentServiceObjectiveName Assert-NotNull $db.CollationName $databaseName = Get-DatabaseName $db = $server | New-AzSqlDatabase -DatabaseName $databaseName Assert-AreEqual $db.DatabaseName $databaseName Assert-NotNull $db.MaxSizeBytes Assert-NotNull $db.Edition Assert-NotNull $db.CurrentServiceObjectiveName Assert-NotNull $db.CollationName $databaseName = Get-DatabaseName $collationName = "SQL_Latin1_General_CP1_CI_AS" $maxSizeBytes = 250GB $job2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName $collationName -MaxSizeBytes $maxSizeBytes -Edition DataWarehouse -RequestedServiceObjectiveName DW100 -AsJob $job2 | Wait-Job $dwdb = $job2.Output Assert-AreEqual $dwdb.DatabaseName $databaseName Assert-AreEqual $dwdb.MaxSizeBytes $maxSizeBytes Assert-AreEqual $dwdb.Edition DataWarehouse Assert-AreEqual $dwdb.CurrentServiceObjectiveName DW100 Assert-AreEqual $dwdb.CollationName $collationName $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName "Japanese_Bushu_Kakusu_100_CS_AS" -MaxSizeBytes 1GB -Edition Basic -RequestedServiceObjectiveName Basic -Tags @{"tag_key"="tag_value"} Assert-AreEqual $db.DatabaseName $databaseName Assert-AreEqual $db.MaxSizeBytes 1GB Assert-AreEqual $db.Edition Basic Assert-AreEqual $db.CurrentServiceObjectiveName Basic Assert-AreEqual $db.CollationName "Japanese_Bushu_Kakusu_100_CS_AS" Assert-NotNull $db.Tags Assert-AreEqual True $db.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_value" $db.Tags["tag_key"] $databaseName = Get-DatabaseName $db = $server | New-AzSqlDatabase -DatabaseName $databaseName ` -CollationName "Japanese_Bushu_Kakusu_100_CS_AS" -MaxSizeBytes 1GB -Edition Basic -RequestedServiceObjectiveName Basic -Tags @{"tag_key"="tag_value"} Assert-AreEqual $db.DatabaseName $databaseName Assert-AreEqual $db.MaxSizeBytes 1GB Assert-AreEqual $db.Edition Basic Assert-AreEqual $db.CurrentServiceObjectiveName Basic Assert-AreEqual $db.CollationName "Japanese_Bushu_Kakusu_100_CS_AS" Assert-NotNull $db.Tags Assert-AreEqual True $db.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_value" $db.Tags["tag_key"] } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateVcoreDatabase { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location try { $databaseName = Get-DatabaseName $job1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -RequestedServiceObjectiveName GP_Gen4_2 -Edition GeneralPurpose -AsJob $job1 | Wait-Job $db = $job1.Output Assert-AreEqual $databaseName $db.DatabaseName Assert-NotNull $db.MaxSizeBytes Assert-AreEqual GP_Gen4_2 $db.CurrentServiceObjectiveName Assert-AreEqual 2 $db.Capacity Assert-AreEqual GeneralPurpose $db.Edition $databaseName = Get-DatabaseName $job1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -VCore 2 -ComputeGeneration Gen4 -Edition GeneralPurpose -AsJob $job1 | Wait-Job $db = $job1.Output Assert-AreEqual $databaseName $db.DatabaseName Assert-NotNull $db.MaxSizeBytes Assert-AreEqual GP_Gen4_2 $db.CurrentServiceObjectiveName Assert-AreEqual 2 $db.Capacity Assert-AreEqual GeneralPurpose $db.Edition } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateVcoreDatabaseWithLicenseType { $location = Get-Location "Microsoft.Sql" "operations" "West Central US" $rg = Create-ResourceGroupForTest $server = Create-ServerForTest $rg $location try { $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -RequestedServiceObjectiveName GP_Gen4_1 -Edition GeneralPurpose -LicenseType BasePrice Assert-AreEqual BasePrice $db.LicenseType $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -RequestedServiceObjectiveName GP_Gen4_1 -Edition GeneralPurpose -LicenseType LicenseIncluded Assert-AreEqual LicenseIncluded $db.LicenseType $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -VCore 2 -ComputeGeneration Gen4 -Edition GeneralPurpose -LicenseType BasePrice Assert-AreEqual BasePrice $db.LicenseType $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -VCore 2 -ComputeGeneration Gen4 -Edition GeneralPurpose -LicenseType LicenseIncluded Assert-AreEqual LicenseIncluded $db.LicenseType } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateServerlessDatabase { $location = Get-Location "Microsoft.Sql" "operations" "Japan East" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location try { $databaseName = Get-DatabaseName $job1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -RequestedServiceObjectiveName GP_S_Gen5_2 -AutoPauseDelayInMinutes 360 -MinVCore 0.5 -AsJob $job1 | Wait-Job $db = $job1.Output Assert-AreEqual $databaseName $db.DatabaseName Assert-NotNull $db.MaxSizeBytes Assert-AreEqual GP_S_Gen5_2 $db.CurrentServiceObjectiveName Assert-AreEqual 2 $db.Capacity Assert-AreEqual 360 $db.AutoPauseDelayInMinutes Assert-AreEqual 0.5 $db.MinimumCapacity Assert-AreEqual GeneralPurpose $db.Edition } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateDatabaseWithSampleName { $location = "westcentralus" $rg = Create-ResourceGroupForTest try { $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -SampleName "AdventureWorksLT" -RequestedServiceObjectiveName Basic ` -Tags @{"tag_key"="tag_value"} Assert-AreEqual $db.DatabaseName $databaseName Assert-AreEqual $db.CurrentServiceObjectiveName Basic Assert-NotNull $db.MaxSizeBytes Assert-NotNull $db.Edition Assert-NotNull $db.CurrentServiceObjectiveName Assert-NotNull $db.CollationName Assert-NotNull $db.Tags Assert-AreEqual True $db.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_value" $db.Tags["tag_key"] } finally { Remove-ResourceGroupForTest $rg } } function Test-CreateDatabaseWithZoneRedundancy { $location = Get-Location "Microsoft.Sql" "operations" "West Europe" $rg = Create-ResourceGroupForTest $location try { $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $job = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -Edition Premium -AsJob $job | Wait-Job $db = $job.Output Assert-AreEqual $db.DatabaseName $databaseName Assert-NotNull $db.Edition Assert-NotNull $db.ZoneRedundant Assert-AreEqual "false" $db.ZoneRedundant $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -Edition Premium -ZoneRedundant Assert-AreEqual $db.DatabaseName $databaseName Assert-NotNull $db.Edition Assert-NotNull $db.ZoneRedundant Assert-AreEqual "true" $db.ZoneRedundant $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -Edition Premium -ZoneRedundant:$false Assert-AreEqual $db.DatabaseName $databaseName Assert-NotNull $db.Edition Assert-NotNull $db.ZoneRedundant Assert-AreEqual "false" $db.ZoneRedundant } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateDatabase { Test-UpdateDatabaseInternal "Southeast Asia" } function Test-UpdateDatabaseInternal ($location = "westcentralus") { $rg = Create-ResourceGroupForTest $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -Edition Standard -MaxSizeBytes 250GB -RequestedServiceObjectiveName S0 Assert-AreEqual $db.DatabaseName $databaseName try { $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -MaxSizeBytes 1GB -Edition Basic -RequestedServiceObjectiveName Basic -Tags @{"tag_key"="tag_new_value"} -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.MaxSizeBytes 1GB Assert-AreEqual $db1.Edition Basic Assert-AreEqual $db1.CurrentServiceObjectiveName Basic Assert-AreEqual $db1.CollationName $db.CollationName Assert-NotNull $db1.Tags Assert-AreEqual True $db1.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_new_value" $db1.Tags["tag_key"] $db2 = $db1 | Set-AzSqlDatabase -MaxSizeBytes 100GB -Edition Standard -RequestedServiceObjectiveName S1 -Tags @{"tag_key"="tag_new_value2"} Assert-AreEqual $db2.DatabaseName $db.DatabaseName Assert-AreEqual $db2.MaxSizeBytes 100GB Assert-AreEqual $db2.Edition Standard Assert-AreEqual $db2.CurrentServiceObjectiveName S1 Assert-AreEqual $db2.CollationName $db.CollationName Assert-NotNull $db2.Tags Assert-AreEqual True $db2.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_new_value2" $db2.Tags["tag_key"] $databaseName = Get-DatabaseName $collationName = "SQL_Latin1_General_CP1_CI_AS" $maxSizeBytes = 250GB $dwdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName $collationName -MaxSizeBytes $maxSizeBytes -Edition DataWarehouse -RequestedServiceObjectiveName DW100 $job = Set-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $dwdb.DatabaseName ` -MaxSizeBytes $maxSizeBytes -RequestedServiceObjectiveName DW200 -Edition DataWarehouse -AsJob $job | Wait-Job $dwdb2 = $job.Output Assert-AreEqual $dwdb2.DatabaseName $dwdb.DatabaseName Assert-AreEqual $dwdb2.MaxSizeBytes $maxSizeBytes Assert-AreEqual $dwdb2.Edition DataWarehouse Assert-AreEqual $dwdb2.CurrentServiceObjectiveName DW200 Assert-AreEqual $dwdb2.CollationName $collationName } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateVcoreDatabase() { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -VCore 2 -Edition GeneralPurpose -ComputeGeneration Gen4 -MaxSizeBytes 250GB Assert-AreEqual $db.DatabaseName $databaseName try { $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-NotNull $db1.MaxSizeBytes Assert-NotNull $db1.Edition Assert-NotNull $db1.CurrentServiceObjectiveName $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -MaxSizeBytes 5GB -VCore 1 -Edition GeneralPurpose -ComputeGeneration Gen4 -Tags @{"tag_key"="tag_new_value"} -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.MaxSizeBytes 5GB Assert-AreEqual $db1.Edition GeneralPurpose Assert-AreEqual $db1.CurrentServiceObjectiveName GP_Gen4_1 Assert-AreEqual $db1.CollationName $db.CollationName Assert-NotNull $db1.Tags Assert-AreEqual True $db1.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_new_value" $db1.Tags["tag_key"] $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Edition BusinessCritical -ComputeGeneration Gen4 -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition BusinessCritical Assert-AreEqual $db1.CurrentServiceObjectiveName BC_Gen4_1 $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -VCore 2 -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition BusinessCritical Assert-AreEqual $db1.CurrentServiceObjectiveName BC_Gen4_2 $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Edition GeneralPurpose -RequestedServiceObjectiveName GP_Gen4_2 -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition GeneralPurpose Assert-AreEqual $db1.CurrentServiceObjectiveName GP_Gen4_2 } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateVcoreDatabaseLicenseType() { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -RequestedServiceObjectiveName GP_Gen4_1 -Edition GeneralPurpose Assert-AreEqual $db.DatabaseName $databaseName Assert-AreEqual $db.LicenseType LicenseIncluded try { $db1 = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName -LicenseType LicenseIncluded Assert-AreEqual LicenseIncluded $db1.LicenseType $db1 = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName -LicenseType BasePrice Assert-AreEqual BasePrice $db1.LicenseType $db1 = $db1 | Set-AzSqlDatabase -LicenseType LicenseIncluded Assert-AreEqual LicenseIncluded $db1.LicenseType $db1 = $db1 | Set-AzSqlDatabase -LicenseType BasePrice Assert-AreEqual BasePrice $db1.LicenseType } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateDatabaseWithZoneRedundant () { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -Edition Premium Assert-AreEqual $db1.DatabaseName $databaseName Assert-NotNull $db1.ZoneRedundant Assert-AreEqual "false" $db1.ZoneRedundant $databaseName = Get-DatabaseName $db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -Edition Premium -ZoneRedundant Assert-AreEqual $db2.DatabaseName $databaseName Assert-NotNull $db2.ZoneRedundant Assert-AreEqual "true" $db2.ZoneRedundant try { $sdb1 = Set-AzSqlDatabase -ResourceGroupName $db1.ResourceGroupName -ServerName $db1.ServerName -DatabaseName $db1.DatabaseName ` -ZoneRedundant Assert-AreEqual $sdb1.DatabaseName $db1.DatabaseName Assert-NotNull $sdb1.ZoneRedundant Assert-AreEqual "true" $sdb1.ZoneRedundant $sdb2 = Set-AzSqlDatabase -ResourceGroupName $db2.ResourceGroupName -ServerName $db2.ServerName -DatabaseName $db2.DatabaseName ` -ZoneRedundant:$false Assert-AreEqual $sdb2.DatabaseName $db2.DatabaseName Assert-NotNull $sdb2.ZoneRedundant Assert-AreEqual "false" $sdb2.ZoneRedundant } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateServerlessDatabase() { $location = Get-Location "Microsoft.Sql" "operations" "Japan East" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -VCore 2 -Edition GeneralPurpose -ComputeGeneration Gen5 -MaxSizeBytes 250GB -ComputeModel Serverless Assert-AreEqual $db.DatabaseName $databaseName try { $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-NotNull $db1.MaxSizeBytes Assert-NotNull $db1.Edition Assert-NotNull $db1.CurrentServiceObjectiveName Assert-NotNull $db1.MinimumCapacity Assert-NotNull $db1.AutoPauseDelayInMinutes $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Edition Premium -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition Premium Assert-Null $db1.MinimumCapacity Assert-Null $db1.AutoPauseDelayInMinutes $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -VCore 2 -Edition GeneralPurpose -ComputeModel Serverless -ComputeGeneration Gen5 -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition GeneralPurpose Assert-AreEqual $db1.CurrentServiceObjectiveName GP_S_Gen5_2 Assert-NotNull $db1.MinimumCapacity Assert-NotNull $db1.AutoPauseDelayInMinutes $job = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Vcore 2 -Edition GeneralPurpose -ComputeModel Serverless -ComputeGeneration Gen5 -MinimumCapacity 2 -AutoPauseDelayInMinutes 1440 -AsJob $job | Wait-Job $db1 = $job.Output Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual $db1.Edition GeneralPurpose Assert-AreEqual $db1.CurrentServiceObjectiveName GP_S_Gen5_2 Assert-AreEqual $db1.MinimumCapacity 2 Assert-AreEqual $db1.AutoPauseDelayInMinutes 1440 } finally { Remove-ResourceGroupForTest $rg } } function Test-UpdateDatabaseWithZoneRedundantNotSpecified () { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -Edition Premium -ZoneRedundant Assert-AreEqual $db.DatabaseName $databaseName Assert-NotNull $db.ZoneRedundant Assert-AreEqual "true" $db.ZoneRedundant try { $db1 = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Tags @{"tag_key"="tag_new_value2"} Assert-AreEqual $db1.DatabaseName $db.DatabaseName Assert-AreEqual True $db1.Tags.ContainsKey("tag_key") Assert-AreEqual "tag_new_value2" $db1.Tags["tag_key"] Assert-NotNull $db1.ZoneRedundant Assert-AreEqual "true" $db1.ZoneRedundant } finally { Remove-ResourceGroupForTest $rg } } function Test-RenameDatabase { $rg = Create-ResourceGroupForTest try { $location = "westcentralus" $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -MaxSizeBytes 1GB Assert-AreEqual $db1.DatabaseName $databaseName $name2 = "name2" $db2 = Set-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -NewName $name2 Assert-AreEqual $db2.DatabaseName $name2 Assert-ThrowsContains -script { $db1 | Get-AzSqlDatabase } -message "not found" $db2 | Get-AzSqlDatabase $name3 = "name3" $db3 = $db2 | Set-AzSqlDatabase -NewName $name3 Assert-AreEqual $db3.DatabaseName $name3 Assert-ThrowsContains -script { $db1 | Get-AzSqlDatabase } -message "not found" Assert-ThrowsContains -script { $db2 | Get-AzSqlDatabase } -message "not found" $db3 | Get-AzSqlDatabase } finally { Remove-ResourceGroupForTest $rg } } function Test-GetDatabase { Test-GetDatabaseInternal "Southeast Asia" } function Test-GetDatabaseInternal ($location = "westcentralus") { $rg = Create-ResourceGroupForTest $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -MaxSizeBytes 1GB Assert-AreEqual $db1.DatabaseName $databaseName $databaseName = Get-DatabaseName $db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName "Japanese_Bushu_Kakusu_100_CS_AS" -MaxSizeBytes 1GB -Edition Basic -RequestedServiceObjectiveName Basic Assert-AreEqual $db2.DatabaseName $databaseName try { $databaseName = Get-DatabaseName $dwdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName SQL_Latin1_General_CP1_CI_AS -MaxSizeBytes 250GB -Edition DataWarehouse -RequestedServiceObjectiveName DW100 $dwdb2 = Get-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupname -ServerName $server.ServerName -DatabaseName $dwdb.DatabaseName Assert-AreEqual $dwdb2.DatabaseName $dwdb.DatabaseName Assert-AreEqual $dwdb2.MaxSizeBytes $dwdb.MaxSizeBytes Assert-AreEqual $dwdb2.Edition $dwdb.Edition Assert-AreEqual $dwdb2.CurrentServiceObjectiveName $dwdb.CurrentServiceObjectiveName Assert-AreEqual $dwdb2.CollationName $dwdb.CollationName $all = $server | Get-AzSqlDatabase Assert-AreEqual $all.Count 4 $gdb1 = Get-AzSqlDatabase -ResourceGroupName $server.ResourceGroupname -ServerName $server.ServerName -DatabaseName $db1.DatabaseName Assert-NotNull $gdb1 Assert-AreEqual $db1.DatabaseName $gdb1.DatabaseName Assert-AreEqual $db1.Edition $gdb1.Edition Assert-AreEqual $db1.CollationName $gdb1.CollationName Assert-AreEqual $db1.CurrentServiceObjectiveName $gdb1.CurrentServiceObjectiveName Assert-AreEqual $db1.MaxSizeBytes $gdb1.MaxSizeBytes $gdb2 = $db2 | Get-AzSqlDatabase Assert-NotNull $gdb2 Assert-AreEqual $db2.DatabaseName $gdb2.DatabaseName Assert-AreEqual $db2.Edition $gdb2.Edition Assert-AreEqual $db2.CollationName $gdb2.CollationName Assert-AreEqual $db2.CurrentServiceObjectiveName $gdb2.CurrentServiceObjectiveName Assert-AreEqual $db2.MaxSizeBytes $gdb2.MaxSizeBytes } finally { Remove-ResourceGroupForTest $rg } } function Test-GetDatabaseWithZoneRedundancy { $location = Get-Location "Microsoft.Sql" "operations" "West Europe" $rg = Create-ResourceGroupForTest $location try { $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -Edition Premium -ZoneRedundant $gdb1 = Get-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupname -ServerName $server.ServerName -DatabaseName $db1.DatabaseName Assert-AreEqual $gdb1.DatabaseName $db1.DatabaseName Assert-AreEqual "true" $gdb1.ZoneRedundant $databaseName = Get-DatabaseName $db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName ` -DatabaseName $databaseName -Edition Premium $gdb2 = Get-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupname -ServerName $server.ServerName -DatabaseName $db2.DatabaseName Assert-AreEqual $gdb2.DatabaseName $db2.DatabaseName Assert-AreEqual "false" $gdb2.ZoneRedundant } finally { Remove-ResourceGroupForTest $rg } } function Test-RemoveDatabase { Test-RemoveDatabaseInternal "Southeast Asia" } function Test-RemoveDatabaseInternal ($location = "westcentralus") { $rg = Create-ResourceGroupForTest $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db1 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName -MaxSizeBytes 1GB Assert-AreEqual $db1.DatabaseName $databaseName $databaseName = Get-DatabaseName $db2 = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName "Japanese_Bushu_Kakusu_100_CS_AS" -MaxSizeBytes 1GB -Edition Basic -RequestedServiceObjectiveName Basic Assert-AreEqual $db2.DatabaseName $databaseName try { $databaseName = Get-DatabaseName $dwdb = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -CollationName "SQL_Latin1_General_CP1_CI_AS" -MaxSizeBytes 250GB -Edition DataWarehouse -RequestedServiceObjectiveName DW100 Assert-AreEqual $dwdb.DatabaseName $databaseName Remove-AzSqlDatabase -ResourceGroupName $server.ResourceGroupname -ServerName $server.ServerName -DatabaseName $dwdb.DatabaseName -Force $all = $server | Get-AzSqlDatabase Assert-AreEqual $all.Count 3 Remove-AzSqlDatabase -ResourceGroupName $server.ResourceGroupname -ServerName $server.ServerName -DatabaseName $db1.DatabaseName -Force $db2 | Remove-AzSqlDatabase -Force $all = $server | Get-AzSqlDatabase Assert-AreEqual $all.Count 1 } finally { Remove-ResourceGroupForTest $rg } } function Test-CancelDatabaseOperation { Test-CancelDatabaseOperationInternal } function Test-CancelDatabaseOperationInternal { $location = Get-Location "Microsoft.Sql" "operations" "Southeast Asia" $rg = Create-ResourceGroupForTest $location $server = Create-ServerForTest $rg $location $databaseName = Get-DatabaseName $db = New-AzSqlDatabase -ResourceGroupName $rg.ResourceGroupName -ServerName $server.ServerName -DatabaseName $databaseName ` -Edition Standard -MaxSizeBytes 250GB -RequestedServiceObjectiveName S0 Assert-AreEqual $db.DatabaseName $databaseName 'Create database failed.' try { $db1 = Set-AzSqlDatabase -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName ` -Edition Standard -RequestedServiceObjectiveName S1 Assert-AreEqual $db1.DatabaseName $db.DatabaseName 'Alter db name not equal' Assert-AreEqual $db1.Edition Standard 'Alter db edition not equal' Assert-AreEqual $db1.CurrentServiceObjectiveName S1 'Alter db slo not equal' $dbactivity = Get-AzSqlDatabaseActivity -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName Assert-AreEqual $dbactivity.DatabaseName $db.DatabaseName Assert-AreEqual $dbactivity.Operation "UpdateLogicalDatabase" $dbactivityId = $dbactivity.OperationId try { $dbactivityCancel = Stop-AzSqlDatabaseActivity -ResourceGroupName $db.ResourceGroupName -ServerName $db.ServerName -DatabaseName $db.DatabaseName -OperationId $dbactivityId } Catch { $ErrorMessage = $_.Exception.Message Assert-AreEqual True $ErrorMessage.Contains("Cannot cancel management operation '" + $dbactivityId + "' in the current state") } } finally { Remove-ResourceGroupForTest $rg } }
combined_dataset/train/non-malicious/sample_33_99.ps1
sample_33_99.ps1
# # Module manifest for module 'OCI.PSModules.Queue' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Queue.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c5d60ce-a44b-46ce-97f7-351848bec841' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Queue Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Queue.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIQueue', 'Get-OCIQueueChannelsList', 'Get-OCIQueueMessages', 'Get-OCIQueuesList', 'Get-OCIQueueStats', 'Get-OCIQueueWorkRequest', 'Get-OCIQueueWorkRequestErrorsList', 'Get-OCIQueueWorkRequestLogsList', 'Get-OCIQueueWorkRequestsList', 'Invoke-OCIQueuePurgeQueue', 'Move-OCIQueueCompartment', 'New-OCIQueue', 'Remove-OCIQueue', 'Remove-OCIQueueMessage', 'Remove-OCIQueueMessages', 'Update-OCIQueue', 'Update-OCIQueueMessage', 'Update-OCIQueueMessages', 'Write-OCIQueueMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Queue' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3702.ps1
3702.ps1
function Get-AzVMGuestPolicyStatusHistory-VmNameScope { $rgName = "aashishGoodPolicy" $vmName = "aashishvm1" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-VmNameScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-InitiativeIdScope { $rgName = "aashishGoodPolicy" $vmName = "aashishvm1" $initiativeId = "/providers/Microsoft.Authorization/policySetDefinitions/8bc55e6b-e9d5-4266-8dac-f688d151ec9c" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-InitiativeIdScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $initiativeId = "/subscriptions/b5e4748c-f69a-467c-8749-e2f9c8cd3db0/providers/Microsoft.Authorization/policySetDefinitions/60062d3c-3282-4a3d-9bc4-3557dded22ca" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -InitiativeId $initiativeId Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-InitiativeNameScope { $rgName = "aashishGoodPolicy" $vmName = "aashishvm1" $initiativeName = "8bc55e6b-e9d5-4266-8dac-f688d151ec9c" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-InitiativeNameScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $initiativeName = "60062d3c-3282-4a3d-9bc4-3557dded22ca" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -InitiativeName $initiativeName Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-ShowOnlyChangeSwitch-VmNameScope { $rgName = "aashishGoodPolicy" $vmName = "aashishvm1" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -ShowOnlyChange Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } } function Get-AzVMGuestPolicyStatusHistory-ShowOnlyChangeSwitch-VmNameScope_Custom { $rgName = "aashishCustomrole7ux" $vmName = "aashishCustomrole7ux" $historicalStatuses = Get-AzVMGuestPolicyStatusHistory -ResourceGroupName $rgName -VMName $vmName -ShowOnlyChange Assert-NotNull $historicalStatuses Assert-True { $historicalStatuses.Count -gt 0 } }
combined_dataset/train/non-malicious/sample_22_30.ps1
sample_22_30.ps1
account-settings-title = Настройки за удостоверяване account-channel-title = Подразбирани канали chat-autologin = .label = Вписване при пускане chat-encryption-generic = Общо chat-encryption-log = .label = Включете шифровани от край до край съобщения в регистрационните файлове на разговорите chat-encryption-label = Нативно шифроване от край до край chat-encryption-description = { $protocol } осигурява шифроване от край до край за съобщения в чат. Това не позволява на трети страни да подслушват разговорa. Може да е необходима допълнителна настройка по-долу, за да работи шифроването. chat-encryption-status = Състояние на шифроването chat-encryption-placeholder = Шифроването не е инициализирано. chat-encryption-sessions = Сесии chat-encryption-sessions-description = За да работи правилно шифроването от край до край, трябва да се доверите на другите сесии в профила ви. Изисква се взаимодействие с другия кореспондент за проверка на сесия. Проверката може да доведе до това, че всички сесии, на които се доверявате, също се доверяват на { -brand-short-name }. chat-encryption-session-verify = Подвърждаване .title = Потвърждаване на валидността на сесията chat-encryption-session-trusted = Доверена .title = Тази сесия e проверена
combined_dataset/train/non-malicious/sample_10_54.ps1
sample_10_54.ps1
ConvertFrom-StringData @' id_appliedsectemploutput=Applied Security Templates id_appliedsectemplobtaining=Gathering applied security templates '@ # SIG # Begin signature block # MIIoVAYJKoZIhvcNAQcCoIIoRTCCKEECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDMO44RTwPSzkwb # nqjwOLKr2rtbSa9yaD7TVGOq+rCar6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMfT # 8tUBctfXR2/YKi5tlzg2fBbKRz7CDW977mUbEuNAMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAer4bEJ7SlWq/sStroMJ9CuPyBp7UOZUVzo6F # GCl/AAfhAQgEmU6qsBE9TETzGfMT1Y8drv45+RGqWXDJy2rumDi7szon+0kUpP/P # XvIIhHW6P9dpDJNNJrM8fwS2hmvqw7bgJuonawF8tNuWmECndJMwbq+oMGrvq7ab # nh+q9zWg4C22MLKKslgjN4EVTATaacG5aM0AcROa6sA9gB3Bzg3/lAaJoXKSB7uz # 9K/qm6/CHHKZjgKQtFfgVSnsEJcyNrZRrTZz3Bja/wuaVt+d8x2MjFleZGFdHNzh # 82RK9vviW6z6hEbHxms+pcPt+XfK1rES19uZmf5/VcnVR2tnNaGCF68wgherBgor # BgEEAYI3AwMBMYIXmzCCF5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCP/OyGFMMqnSyGXjXry2v4Q0zG2qn0IA7G # z1e2JHYCKgIGZutLSAOMGBIyMDI0MTAyODExNDA0MC40NFowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH/Ejh8 # 98Fl1qEAAQAAAf8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NEMxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ # 6JXSkHtuDz+pz+aSIN0lefMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1T # hUKQBkReq+TE/lA1O0Ebkil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGH # F8cVXu+G2aocsIKYPGFk+YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCed # xR22nXGMaYKl0EzKCT8rSHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9Mwq # NgPqkt4E/SFkOHk/d/jGEYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvR # J1HupCW/mnAM16tsrdhIQMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v3 # 98gSk8CULxiKzFdoZfhGkMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G # 5bN1SKvRneOI461oOrtd3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJp # uiLXa6xXxrG2VP90J48Lid1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0Dj # Lezob6BDfmj3SPaLpqZprwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj21 # 2xZMiBlZU5JL25QeFJiRuAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFMP6leT+tP93sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQA5I03kykuLK6ebzrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCn # pa2CiUitq2K9eM4bWUiNrIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86 # J699uwjNOT8bnX66JQmTvvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZm # Or87hn89yZUa2MamzZMK0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ # 3w3nqOmX2Si0uF293z1Fs6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd # 0thMAj3WBM1QXsED2rUS9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPL # Q8PzdoK3v1FrQh0MgxK7BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52B # F7y1d0auAOgF65U4r5xEKVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K26 # 6VhhxEr3mqKEXSKtCzr9Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDdd # FE7AC/TXogK5PyFjUifJbuPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJj # g4a4ZTVJdofj0lI/e3zIZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVy # c+TBEsVE9cWymaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6snaZTAiGA8yMDI0MTAyODA5Mzk0OVoYDzIwMjQx # MDI5MDkzOTQ5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqydplAgEAMAoCAQAC # AgU8AgH/MAcCAQACAhQpMAoCBQDqyyvlAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAC5Q0mZXZYSZmBYEzcnJMnCN3t5Hxb7Mh+9aVdlRs4Ds6h6ctOa91ofI # +MgGrNVVf46wKYwDisJIGIVXK3u8PunDoLSBDsbvikcTgar2Kxq7z1XrIVlvRypa # BzGly9Hn5cWIqjG02tn4gI1A0tIClGHW0Vn0Cc5rqkQATmkArMUWn+IpkZWd51Zx # aIPp3Jg+OInXRmWUMkCQh5L/CjIpVWoRHGKp+e+aHgX30Fpj7f3ssB8u9ZBpDtpj # yQ1q8MjADCb9YW1jNLAW/+CVOOA5Ke8WHeYrqB7VGJwwzdVOWr98Dm9KK7r1r7iz # APhAkFRjuT7rUWTleVm7qGj0XE7U7w4xggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCDgCnOm7m3+BXeVdUrXDY/61q84qgMcCmX4ROG7u3+vojCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONI # RXy6nKf9MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAH/Ejh898Fl1qEAAQAAAf8wIgQg7T5lmlzzvfxlHMbUmRWINSo0bA6YaFy+4mQP # 1xdlyRswDQYJKoZIhvcNAQELBQAEggIAW9Cnmwccf/woZbhRbVM/N1VFrHOrmCm4 # b4sgOxLhJoRAuEaoYlDZUNdxOEGmzQrqU9VDaWOElmNjMdOgSNbn1KVSf8VdJWn9 # TyFmAA2a+uITGJcIcok9npv9DU1SbbMS29FN2h4ur+/BQwzosKol4wu33qPDUhwR # gYJcFOTNg5pJRTYGp/LtWmu5jpiHoZciYoa6IbJGb3CQa92E1HAnfrFmwEbuBVAF # AdNoxwy03vLXbtNkrH/cSBuX13mIVjRK4wmLQINfWGd/ig4ybFWNNelclsWzW0Aj # gX+SBhvEwKmtG364L9zKWvRMGk6Mjyqs+LKieCFNAdDTrQV9PjubLeEX415CABKF # DJinhzfPjMw+DhV/jxPZY9a3LYtuUQ6SB5VOleA6zNi2yv3qZfBYtiV89EiT0XGg # 2fHWUIYEpYiY4p/HHExIH+8FreH10e+qlL+mp24otkEQFxOTN+1vN/eBcYWfYDTv # tDGdDCwcCXBRDkS+ijcZGqNRB65p1imcX8bK9fte50w/GtWyrhLLHW1a/dfVlbzV # r9vxHiloZ+uF7KsLy+6MplPUvbZsWYSzUNtSZps2T0CLLBbpkQx3ds9a91A9D5GB # xgVsdoBejt7YTB27aDTBsJ0YXeftkuue4Yx11cwaXF0J/o+cbLGAj9+oMges+2w5 # n5bU7Vz0rdA= # SIG # End signature block
combined_dataset/train/non-malicious/3333.ps1
3333.ps1
function Get-Role { [PoshBot.BotCommand( Aliases = ('gr', 'getrole'), Permissions = 'view-role' )] [cmdletbinding()] param( [parameter(Mandatory)] $Bot, [parameter(Position = 0)] [string]$Name ) if ($PSBoundParameters.ContainsKey('Name')) { $r = $Bot.RoleManager.GetRole($Name) if (-not $r) { New-PoshBotCardResponse -Type Warning -Text "Role [$Name] not found :(" -Title 'Rut row' -ThumbnailUrl $thumb.rutrow } else { $msg = [string]::Empty $msg += "`nDescription: $($r.Description)" $msg += "`nPermissions:`n$($r.Permissions.Keys | Format-List | Out-String)" New-PoshBotCardResponse -Type Normal -Title "Details for role [$Name]" -Text $msg } } else { $roles = foreach ($key in ($Bot.RoleManager.Roles.Keys | Sort-Object)) { [pscustomobject][ordered]@{ Name = $key Description = $Bot.RoleManager.Roles[$key].Description Permissions = $Bot.RoleManager.Roles[$key].Permissions.Keys } } New-PoshBotCardResponse -Type Normal -Text ($roles | Format-List | Out-String) } }
combined_dataset/train/non-malicious/chkhash_1.ps1
chkhash_1.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } function noequal ( $first, $second) { foreach($s in $second) { if ($first -eq $s) {return $false} } return $true } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 del variable:\\exclude -ea 0 $args3=@() $args2=$args $nu = 0 $errs = 0 $fc = 0 $upd = $false $create = $false for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" " -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)." "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -a -x c:\\users\\alice\\hashes\\pictureshashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" " PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes" "" "Note: files in subdirectories of any specified directory are automatically processed." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") {$i++;$hashespath=$args2[$i];continue} # Get hashes xml database path if ($args2[$i] -like "-e*") # Exclude files, dirs { do { $i++ $exclude+=@($args2[$i]) } while ($args2[$i] -notlike "-*" -and $i -lt $args2.count-1) continue } $args3+=@($args2[$i]) # Add files/dirs } "ChkHash.ps1 - .\\chkhash.ps1 -h for usage." "" if ($args3.count -eq 0) {exit} # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir -literalpath $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files if ($files.count -eq 0) {"No files found. Exiting."; exit} if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database $files = $files | %{write-host "Hashing $($_.fullname) ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hashes saved. Exiting." exit } $xfiles=@(import-clixml $hashespath) "Loaded $($xfiles.count) file hash(es) from $hashespath" $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {"Needs to be added: `"$($f.fullname)`"";continue} # if not updating, then continue "Hashing $($f.fullname) ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $xfiles+=@($f) # then add file + hash to list continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} # Update and continue is specified. $fc++ # increment files checked. if ($xfiles[$n].SHA512 -eq $f.SHA512) # Check SHA512 for mixmatch. { continue } $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; "Updated `"$($f.fullname)`"";continue} "Bad SHA-512 found: `"$($f.fullname)`"" } if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated $hashespath" "$nu file hash(es) added to database." "$errs file hash(es) updated in database." exit } "$errs SHA-512 mixmatch(es) found." "$fc file(s) SHA512 matched." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
combined_dataset/train/non-malicious/sample_29_49.ps1
sample_29_49.ps1
# Localized 06/28/2023 07:56 AM (GMT) 303:7.0.30723 cl_localizationdata.psd1 ConvertFrom-StringData @' ###PSLOC Troubleshoot_Title=Rozwiązywanie problemów Troubleshoot_DetectNetworkCache=Trwa sprawdzanie sieciowej pamięci podręcznej programu Windows Media Player... Resolution_Title=Rozwiązanie Resolution_ResetConfiguration=Trwa resetowanie wszystkich ustawień konfiguracyjnych... Resolution_ResetNetworkCache=Trwa resetowanie konfiguracji sieciowej pamięci podręcznej... BinaryPath=Ścieżka binarna Version=Wersja Report_Name_WMPInformation=Analizowana wersja Report_Description_WMPInformation=Informacje o programie Windows Media Player Report_Name_NetWorkCachedFile=Konfiguracja pamięci podręcznej Report_Description_NetWorkCachedFile=Informacje o konfiguracji sieciowej pamięci podręcznej programu Windows Media Player ###PSLOC '@
combined_dataset/train/non-malicious/sample_19_41.ps1
sample_19_41.ps1
--- parameters: - name: version type: string default: '' - name: version_prefix type: string default: '' - name: draft type: boolean default: false - name: working_directory type: string default: $(Build.SourcesDirectory) - name: gh_token type: string - name: repo type: string default: $(Build.Repository.Name) - name: filename type: string default: 'ADOChangelog.md' - name: assets type: string default: '' - name: create_draft type: boolean default: false - name: use_gh_api type: boolean default: true steps: - task: Powershell@2 displayName: Setting version inputs: targetType: inline script: | if("${{ parameters.version }}" -eq ""){ Write-Host "##vso[task.setvariable variable=version]$(gitversion.docker_version)" } else { Write-Host "##vso[task.setvariable variable=version]${{ parameters.version }}" } - task: Powershell@2 displayName: Generate Release Notes condition: and(succeeded(), eq('${{ parameters.use_gh_api }}', 'false')) continueOnError: true inputs: targetType: 'inline' pwsh: true script: | Set-Location ${{ parameters.working_directory }} Add-Type -AssemblyName System.Web $branch = [System.Web.HttpUtility]::UrlEncode("$(Build.SourceBranch)") $versions= @() $headers = @{} $headers.Add("Authorization", "token ${{ parameters.gh_token }}") function toSemVer($version){ $version -match "^?(?<prefix>\D*)(?<major>\d+)(\.(?<minor>\d+))?(\.(?<patch>\d+))?(\-(?<pre>[0-9A-Za-z\-\.]+))?(\+(?<build>[0-9A-Za-z\-\.]+))?$" | Out-Null $major = [int]$matches['major'] $minor = [int]$matches['minor'] $patch = [int]$matches['patch'] $prefix = [string]$matches['prefix'] if($matches['pre'] -eq $null){$pre = @()} else{$pre = $matches['pre'].Split(".")} New-Object PSObject -Property @{ Major = $major Minor = $minor Patch = $patch Pre = $pre VersionString = $version Prefix = $prefix } } function compareSemVer($a, $b){ $result = 0 $result = $a.Major.CompareTo($b.Major) if($result -ne 0){return $result} $result = $a.Minor.CompareTo($b.Minor) if($result -ne 0){return $result} $result = $a.Patch.CompareTo($b.Patch) if($result -ne 0){return $result} $ap = $a.Pre $bp = $b.Pre if($ap.Length -eq 0 -and $bp.Length -eq 0) {return 0} if($ap.Length -eq 0){return 1} if($bp.Length -eq 0){return -1} $minLength = [Math]::Min($ap.Length, $bp.Length) for($i = 0; $i -lt $minLength; $i++){ $ac = $ap[$i] $bc = $bp[$i] $anum = 0 $bnum = 0 $aIsNum = [Int]::TryParse($ac, [ref] $anum) $bIsNum = [Int]::TryParse($bc, [ref] $bnum) if($aIsNum -and $bIsNum) { $result = $anum.CompareTo($bnum) if($result -ne 0) { return $result } } if($aIsNum) { return -1 } if($bIsNum) { return 1} $result = [string]::CompareOrdinal($ac, $bc) if($result -ne 0) { return $result } } return $ap.Length.CompareTo($bp.Length) } function rankedSemVer($versions){ for($i = 0; $i -lt $versions.Length; $i++){ $rank = 0 for($j = 0; $j -lt $versions.Length; $j++){ $diff = 0 $diff = compareSemVer $versions[$i] $versions[$j] if($diff -gt 0) { $rank++ } } $current = [PsObject]$versions[$i] Add-Member -InputObject $current -MemberType NoteProperty -Name Rank -Value $rank } return $versions } $thisVersion = toSemVer ${{ parameters.version_prefix }}$(version) $tags = @() $releaseUrl = "https://api.github.com/repos/${{ parameters.repo }}/releases?per_page=100" do { $response=$(invoke-webrequest -UseBasicParsing -Headers $headers -Uri $releaseUrl) $tags = Convertfrom-Json $response.content | Where-Object { $_.draft -eq $false } if ($thisVersion.Prefix -ne "v") { $tags = $tags | Where-Object {$_.tag_name -like $thisVersion.Prefix + "*"} } if ($tags) { break } $releaseUrl = $response.RelationLink.next } while ($releaseUrl) $filteredTags = $tags.tag_name if (!$filteredTags) { Write-Host "No previous releases, please create a release before running the pipeline" exit 1; } Write-host "##vso[task.setvariable variable=create_draft]true" Write-host "##vso[task.setvariable variable=create_full_release]true" if ($filteredTags.Contains($thisVersion.VersionString)) { if ($tags[$tags.tag_name.IndexOf($thisVersion.VersionString)].draft) { Write-host "Draft release exists" Write-host "##vso[task.setvariable variable=create_draft]false" } else { Write-host "Full release exists" Write-host "##vso[task.setvariable variable=create_full_release]false" Write-host "##vso[task.setvariable variable=create_draft]false" } } if ($thisVersion.Prefix -ne "v") { $releaseTags = $tags | Where-Object { $_.draft -eq $false } | Where-Object { $_.tag_name -like $thisVersion.Prefix + "*" } } else { $releaseTags = $tags | Where-Object { $_.draft -eq $false } } foreach ($v in $releaseTags.tag_name) { $versions += toSemVer $v } $versions = rankedSemVer($versions) $versions = $versions | Sort-Object -Property Rank $lastRelease = $versions[-1].VersionString $head=convertfrom-json $(invoke-webrequest -UseBasicParsing -Headers $headers -Uri https://api.github.com/repos/${{ parameters.repo }}/commits/$branch).content $commithash=$head.sha $compare=convertfrom-json $(invoke-webrequest -UseBasicParsing -Headers $headers -Uri https://api.github.com/repos/${{ parameters.repo }}/compare/$lastRelease...$commithash -Method GET).content $comparecommits=convertfrom-json $(convertto-json $compare.commits) $prs = New-Object System.Collections.ArrayList $count=0 foreach ($commit in $comparecommits.sha) { if($count -eq 0){ $query="repo:${{ parameters.repo }}%20type:pr" } $query+="%20SHA:$($commit.substring(0,7))" $count=$count+1 if(!($count % 10)){ $prResults=convertfrom-json $(invoke-webrequest -UseBasicParsing -Headers $headers -Uri https://api.github.com/search/issues?q=$query).Content $prItems= convertFrom-json $(convertto-json -InputObject $prResults.items) foreach ($pr in $prItems) { $user = convertfrom-json $(convertto-json $pr.user) $temp = New-Object System.Object $temp | Add-Member -MemberType NoteProperty -Name "Number" -Value $pr.number $temp | Add-Member -MemberType NoteProperty -Name "Title" -Value $pr.title $temp | Add-Member -MemberType NoteProperty -Name "URL" -Value $pr.html_url $temp | Add-Member -MemberType NoteProperty -Name "UserLogin" -Value $user.login $temp | Add-Member -MemberType NoteProperty -Name "UserURL" -Value $user.html_url $prs.Add($temp) } $count=0 } } if($count -gt 0) { $prResults=convertfrom-json $(invoke-webrequest -UseBasicParsing -Headers $headers -Uri https://api.github.com/search/issues?q=$query).Content $prItems= convertFrom-json $(convertto-json -InputObject $prResults.items) foreach ($pr in $prItems) { $user = convertfrom-json $(convertto-json $pr.user) $temp = New-Object System.Object $temp | Add-Member -MemberType NoteProperty -Name "Number" -Value $pr.number $temp | Add-Member -MemberType NoteProperty -Name "Title" -Value $pr.title $temp | Add-Member -MemberType NoteProperty -Name "URL" -Value $pr.html_url $temp | Add-Member -MemberType NoteProperty -Name "UserLogin" -Value $user.login $temp | Add-Member -MemberType NoteProperty -Name "UserURL" -Value $user.html_url $prs.Add($temp) } } $prs = $prs | sort-object number -Unique $prNumbers = $prs.Number Write-host "##vso[task.setvariable variable=prNumbers;isOutput=true]$prNumbers" New-Item -Path .\ -Name ${{ parameters.filename }} -Force -ItemType "file" foreach ($pr in $prs) { Add-Content -Path ${{ parameters.filename }} -Value "- [`#$($pr.Number)]($($pr.URL)) $($pr.Title) ([@$($pr.UserLogin)]($($pr.URL)))" } #Cleanup drafts $drafts = $tags | Where-Object {$_.draft -eq $true -and (Get-Date -Date $_.created_at) -lt (Get-Date).AddDays(-7)} foreach ($draft in $drafts) { Write-Host "Deleting $draft.tag_name" try{ invoke-webrequest -UseBasicParsing -Headers $headers -Uri $draft.url -Method DELETE } catch { $Failure = $_.Exception.Response } } - task: Powershell@2 displayName: Generate Release Notes via GitHub api name: releaseNotes condition: and(succeeded(), eq('${{ parameters.use_gh_api }}', 'true')) continueOnError: true inputs: targetType: 'inline' pwsh: true script: | $headers = New-Object "System.Collections.Generic.Dictionary[[String],[String]]" $headers.Add("Authorization", "Bearer ${{ parameters.gh_token }}") $headers.Add("Content-Type", "application/json") $body = '{"tag_name": "${{ parameters.version_prefix }}$(version)", "target_commitish": "$(Build.SourceVersion)"}' $response = Invoke-RestMethod 'https://api.github.com/repos/${{ parameters.repo }}/releases/generate-notes' -Method 'POST' -Headers $headers -Body $body Write-Host $response Write-host "##vso[task.setvariable variable=create_full_release]true" New-Item -Path .\ -Name ${{ parameters.filename }} -Force -ItemType "file" Add-Content -Path ${{ parameters.filename }} -Value $response.body - task: GitHubRelease@1 displayName: Create Github draft release condition: and(succeeded(), and(eq(variables.create_draft, true), eq('${{ parameters.draft }}', true), eq('${{ parameters.create_draft }}', true))) continueOnError: true inputs: gitHubConnection: 'infotrack-ado' repositoryName: $(Build.Repository.Name) action: 'create' target: $(Build.SourceVersion) tagSource: 'userSpecifiedTag' tag: ${{ parameters.version_prefix }}$(version) title: ${{ parameters.version_prefix }}$(version) releaseNotesFilePath: ${{ parameters.filename }} addChangeLog: false isDraft: true assets: ${{ parameters.assets }} - task: GitHubRelease@1 displayName: Create Github release condition: and(succeeded(), and(eq(variables.create_full_release, true), eq('${{ parameters.draft }}', 'false'))) continueOnError: true inputs: gitHubConnection: 'infotrack-ado' repositoryName: $(Build.Repository.Name) action: 'edit' target: $(Build.SourceVersion) releaseNotesFilePath: ${{ parameters.filename }} addChangeLog: false tagSource: 'userSpecifiedTag' tag: ${{ parameters.version_prefix }}$(version) title: ${{ parameters.version_prefix }}$(version) isDraft: false assets: ${{ parameters.assets }} - task: GitHubRelease@1 displayName: Delete Github draft condition: failed() continueOnError: true inputs: gitHubConnection: 'infotrack-ado' repositoryName: $(Build.Repository.Name) action: 'delete' target: $(Build.SourceVersion) tagSource: 'userSpecifiedTag' tag: ${{ parameters.version_prefix }}$(version)
combined_dataset/train/non-malicious/571.ps1
571.ps1
function Add-SPONoteFieldtoList { [CmdletBinding()] param ( [Parameter(Mandatory=$true, Position=1)] [string] $listTitle, [Parameter(Mandatory=$true, Position=2)] [string] $fieldName ) $newField = "<Field Type='Note' DisplayName='$fieldName' Name='$fieldName' required='FALSE' NumLines='6' RichText='FALSE' Sortable='FALSE' />" Add-SPOField $listTitle $fieldName $newField }
combined_dataset/train/non-malicious/sample_11_74.ps1
sample_11_74.ps1
@{ GUID="A1DA990A-4DC2-4f7e-BEB4-046A89B9D473" Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="© Microsoft Corporation. All rights reserved." ModuleVersion = "2.0.0.0" PowerShellVersion = "3.0" ClrVersion = "4.0" TypesToProcess="Microsoft.Iscsi.Target.Commands.Types.ps1xml" RootModule="Microsoft.Iscsi.Target.Commands" NestedModules = @("ImportExportIscsiTargetConfiguration.psm1") CmdletsToExport = @( "Add-ClusteriSCSITargetServerRole", "Add-IscsiVirtualDiskTargetMapping", "Checkpoint-IscsiVirtualDisk", "Convert-IscsiVirtualDisk", "Dismount-IscsiVirtualDiskSnapshot", "Export-IscsiVirtualDiskSnapshot", "Get-IscsiServerTarget", "Get-IscsiTargetServerSetting", "Get-IscsiVirtualDisk", "Get-IscsiVirtualDiskSnapshot", "Import-IscsiVirtualDisk", "Mount-IscsiVirtualDiskSnapshot", "New-IscsiServerTarget", "New-IscsiVirtualDisk", "Remove-IscsiServerTarget", "Remove-IscsiVirtualDisk", "Remove-IscsiVirtualDiskSnapshot", "Remove-IscsiVirtualDiskTargetMapping", "Resize-IscsiVirtualDisk", "Restore-IscsiVirtualDisk", "Set-IscsiServerTarget", "Set-IscsiTargetServerSetting", "Set-IscsiVirtualDisk", "Set-IscsiVirtualDiskSnapshot", "Stop-IscsiVirtualDiskOperation") FunctionsToExport = ("Import-IscsiTargetServerConfiguration", "Export-IscsiTargetServerConfiguration") AliasesToExport = "Expand-IscsiVirtualDisk" HelpInfoUri="https://aka.ms/winsvr-2025-pshelp" }
combined_dataset/train/non-malicious/sample_39_19.ps1
sample_39_19.ps1
[CmdletBinding()] param ( [string]$OutFile, [string]$AltDownload, [string]$Proxy, [string]$AltHisEndpoint ) $ErrorActionPreference = 'Stop' $ProgressPreference = 'SilentlyContinue' $refVersion = [version] '4.5' $provider = 'Microsoft.HybridCompute' # Error codes used by azcmagent are in range of [0, 125]. # Installation scripts will use [127, 255]. Check install_linux_azcmagent.sh for the codes used for Linux script. $global:errorcode="AZCM0150" <# Throw a structured exception#> function Invoke-Failure { [CmdletBinding()] param( [Parameter(Mandatory=$true)] $Message, [Parameter(Mandatory=$true)] $ErrorCode, [Parameter(Mandatory=$false)] $Details ) $ex = new-object -TypeName System.Exception -ArgumentList @($Message) $ex.Data["Details"] = $details $ex.Data["ErrorCode"] = $errorcode throw $ex } function Test-AzureStackHCI() { [CmdletBinding()] param ( ) try { $product=Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName | select -ExpandProperty ProductName } catch { Write-Verbose -Message "Error $_ Unable to determine product SKU from registry" -Verbose # Will attempt to install anyway return $false } if ($product -eq 'Azure Stack HCI') { return $true } return $false } function Test-PowerShellVersion() { [CmdletBinding()] param ( ) Write-Verbose -Message "PowerShell version: $($PSVersionTable.PSVersion)" -Verbose return ($PSVersionTable.PSVersion -ge [Version]"3.0") } function Test-DotNetFramework() { [CmdletBinding()] param ( ) try { $installedVersion = [version] (Get-ItemProperty -LiteralPath 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full' -Name Version | select -ExpandProperty Version) } catch { Write-Verbose -Message "Error $_ Unable to determine .NET Framework version" -Verbose # Will attempt to install anyway return $true } Write-Verbose -Message ".NET Framework version: $installedVersion" -Verbose if ($installedVersion -ge $refVersion) { return $true } return $false } function Test-IsAzure() { [CmdletBinding()] param ( ) Write-Verbose -Message "Checking if this is an Azure virtual machine" -Verbose try { if ($PSVersionTable.PSVersion -ge [Version]"6.0") { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -NoProxy -TimeoutSec 1 -ErrorAction SilentlyContinue } else { $response = Invoke-WebRequest -UseBasicParsing -Uri "http://169.254.169.254/metadata/instance/compute?api-version=2019-06-01" -Headers @{Metadata = "true"} -TimeoutSec 1 -ErrorAction SilentlyContinue } if ($null -ne $response -and $response.StatusCode -eq 200) { $content = ConvertFrom-Json $($response.Content.ToString()) if ($null -ne $content.resourceId) { Write-Verbose -Message "Azure check indicates that we are in Azure" -Verbose return $true } } } catch { Write-Verbose -Message "Error $_ checking if we are in Azure" -Verbose return $false } return $false } function Get-MsiLogSummary() { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string]$LogPath ) try { $LogPath = Resolve-Path $LogPath Write-Verbose -Message "Reading Logs from $LogPath" -Verbose $patterns = @( "Installation success or error status", "Product: Azure Connected Machine Agent" ); $regex = "(" + ($patterns -join ")|(" ) + ")" Write-Verbose -Message "Looking for Patterns: $regex" -Verbose $inCustomAction = $false $logCustomAction = $false $caOutput = new-object -TypeName System.Collections.ArrayList Get-Content $LogPath | % { # log interesting lines if ( ($_ -match $regex)) { $_ # output to pipeline } # Wix custom actions start with "Calling custom Action". Gather the log from the CA till we see if it passed # At the end, log that output only if it failed with "returned actual error" if ($_ -match "Calling custom action") { $inCustomAction = $true $logCustomAction = $false } if ($_ -match "MSI \(s\)") { $inCustomAction = $false } if ($_ -match "returned actual error") { $logCustomAction = $true } if ($inCustomAction) { $null = $caOutput.Add($_) } else { if($logCustomAction) { $caOutput # output saved lines to pipeline } $caOutput.Clear() } } } catch { # This code is optional so if something goes wrong we'll just swallow the error and have no details Write-Verbose -Message "Error while parsing MSI log: $_" -Verbose } } function Send-Failure { [CmdletBinding()] param ( [Parameter(Mandatory = $true)] [System.Exception] $Error, [Parameter(Mandatory = $true)] [string] $ErrorCode, [Parameter(Mandatory = $false)] [string] $AltHisEndpoint ) $hisEndpoint = "https://gbl.his.arc.azure.com" if ($env:CLOUD -eq "AzureUSGovernment") { $hisEndpoint = "https://gbl.his.arc.azure.us" } elseif ($env:CLOUD -eq "AzureChinaCloud") { $hisEndpoint = "https://gbl.his.arc.azure.cn" } elseif ($env:CLOUD -eq "AzureStackCloud") { if ($AltHisEndpoint) { $hisEndpoint = $AltHisEndpoint } else { Write-Warning "error in Send-Failure due to invalid his endpoint." return } } $message = "$Error" if ($Error.Data["Details"]) { $message = $Error.Data["Details"] } $message = $message.Substring(0, [Math]::Min($message.Length, 500)) if ( $env:PROVIDER_NAMESPACE ) { $provider = $env:PROVIDER_NAMESPACE } $logBody = @{subscriptionId="$env:SUBSCRIPTION_ID";resourceGroup="$env:RESOURCE_GROUP";tenantId="$env:TENANT_ID";location="$env:LOCATION";correlationId="$env:CORRELATION_ID";authType="$env:AUTH_TYPE";operation="onboarding";namespace="$provider";osType="windows";messageType="$ErrorCode";message="$message";} try { Invoke-WebRequest -UseBasicParsing -Uri "$hisEndpoint/log" -Method "PUT" -Body ($logBody | ConvertTo-Json) -ErrorAction SilentlyContinue } catch {} } # Based on the MSI error code, we may have some hint to provide as to the issue # See https://learn.microsoft.com/en-us/windows/win32/msi/error-codes function Get-MsiErrorDetails() { [CmdletBinding()] param( $exitCode ) $message = (net helpmsg $exitCode) -join "" $hint = "" $errorCode = "AZCM0149" # exitCode is the return value from msiexec. errorCode is the error code of the script switch($exitCode) { 1603 { # ERROR_INSTALL_FAILURE $hint = "A fatal error occurred during installation" $errorCode = "AZCM0156" } 1633 { # ERROR_INSTALL_PLATFORM_UNSUPPORTED $hint = "Unsupported: Azure Connected Machine Agent is only compatible with X64 operating systems" $errorCode = "AZCM0153" } } return [PSCustomObject]@{ Message = $message Hint = $hint ErrorCode = $errorCode } } function CheckRSOPLogonRights { # Checks RSOP to see if a group policy may prevent himds from running # Support PS 1-2 for initial requirements check even though PS4 is required for product if ($PSVersionTable.PSVersion.Major -ge 3) { $securitySettings = Get-CimInstance -Namespace "root/RSOP/Computer" -ClassName "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } else { $securitySettings = Get-WmiObject -Namespace "root/RSOP/Computer" -Class "RSOP_SecuritySettings" -ErrorAction SilentlyContinue -ErrorVariable "rsoperror" } if ($rsoperror -ne $null) { Write-Warning "Unable to retrieve RSOP data to check local security policy." return } # Find the RSOP results for SeLogonAsAService, might be empty $logonAsServicePolicy = $securitySettings | Where-Object { $_.UserRight -eq "SeServiceLogonRight" } $logonAsServicePrincipals = $logonAsServicePolicy | Select-Object -ExpandProperty AccountList # If the list is empty, contains NT SERVICE\ALL SERVICES (default), or contains NT SERVICE\himds then our service can run if ($logonAsServicePrincipals -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\ALL SERVICES" -and ` $logonAsServicePrincipals -notcontains "NT SERVICE\himds" -and ` $logonAsServicePrincipals -notcontains "S-1-5-80-4215458991-2034252225-2287069555-1155419622-2701885083") { Write-Warning "The local security policy on this system will prevent the agent from loading. Contact your Group Policy administrator to ensure 'NT SERVICE\ALL SERVICES' is included in any Group Policy Objects that configure the Logon as a Service User Rights Assignment. See https://aka.ms/ArcServerURA for more information." Write-Warning "GPO ID: $($logonAsServicePolicy.GPOID)" } } function Check-Physical-Memory() { [CmdletBinding()] param ( ) $memory = systeminfo | Select-String '^Total Physical Memory' Write-Verbose -Message "$memory" -Verbose } function Download-With-Retries() { [CmdletBinding()] param ( [Parameter(Mandatory=$true)][string]$downloadUri, [Parameter(Mandatory=$false)][int]$maxAttempts = 3 ) $attempts=1 do { try { if (([Uri]$downloadUri).Scheme -in @("https","http")) { Write-Verbose -Message "Downloading agent package from $downloadUri to $msiFile" -Verbose # It's a web site, download it if ($Proxy) { Invoke-WebRequest -UseBasicParsing -Proxy $Proxy -Uri $downloadUri -OutFile $msiFile } else { Invoke-WebRequest -UseBasicParsing -Uri $downloadUri -OutFile $msiFile } } else { # This could be a UNC path or a local file, just try and copy it Write-Verbose -Message "Copying agent package from $downloadUri to $msiFile" -Verbose Copy-Item $downloadUri $msiFile } return } catch { $attempts++ Write-Verbose -Message "Download failure: $_ ..Retrying..." -Verbose } } while ($attempts -le $maxAttempts) Invoke-Failure -ErrorCode "AZCM0148" -Message "Download of $downloadUri failed: $_" } try { #Check if PowerShell is running as administrator if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { Invoke-Failure -Message "This script must be run as an administrator." -ErrorCode "AZCM0155" } # Ensure TLS 1.2 is accepted. Older PowerShell builds (sometimes) complain about the enum "Tls12" so we use the underlying value [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 3072 # Ensure TLS 1.3 is accepted, if this .NET supports it (older versions don't) try { [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor 12288 } catch {} Write-Verbose -Message "Installing Azure Connected Machine Agent" -Verbose Check-Physical-Memory $hci = Test-AzureStackHCI if ($hci) { Invoke-Failure -Message "This server is running Azure Stack HCI and should be connected to Azure Arc using the built-in registration experience: https://aka.ms/install-arc-on-hci-host" -ErrorCode "AZCM0152" } $validPowerShell = Test-PowerShellVersion if (-Not $validPowerShell) { Invoke-Failure -Message "Azure Connected Machine Agent requires PowerShell version 4.0 or later" -ErrorCode "AZCM0154" } $validFramework = Test-DotNetFramework if (-Not $validFramework) { Invoke-Failure -Message "Azure Connected Machine Agent requires .NET Framework version $refVersion or later" -ErrorCode "AZCM0151" } $inAzure = Test-IsAzure if ($inAzure) { $override = [System.Environment]::GetEnvironmentVariable("MSFT_ARC_TEST", [System.EnvironmentVariableTarget]::Machine) if ('true' -eq $override) { Write-Warning '''Running on an Azure Virtual Machine with MSFT_ARC_TEST set. Azure Connected Machine Agent is designed for use outside Azure. This virtual machine should only be used for testing purposes. See https://aka.ms/azcmagent-testwarning for more details. ''' } else { Invoke-Failure -ErrorCode "AZCM0147" -Message '''Cannot install Azure Connected Machine agent on an Azure Virtual Machine. Azure Connected Machine Agent is designed for use outside Azure. To connect an Azure VM for TESTING PURPOSES ONLY, see https://aka.ms/azcmagent-testwarning for more details. ''' } } CheckRSOPLogonRights # Download the package $msiFile = Join-Path "$env:Temp" "AzureConnectedMachineAgent.msi" if ($AltDownload) { $downloadUri = $AltDownload } else { $downloadUri = "https://aka.ms/AzureConnectedMachineAgent" } Download-With-Retries -downloadUri $downloadUri # Install the package $logFile = Join-Path "$env:Temp" "installationlog.txt" Write-Verbose -Message "Installing agent package" -Verbose $exitCode = (Start-Process -FilePath msiexec.exe -ArgumentList @("/i", "$msiFile" , "/l*v", "$logFile", "/qn") -Wait -Passthru).ExitCode if ($exitCode -ne 0) { # Treat ERROR_SUCCESS_REBOOT_INITIATED (1641) and ERROR_SUCCESS_REBOOT_REQUIRED (3010) as success if ($exitCode -eq 1641 -Or $exitCode -eq 3010) { Write-Verbose -Message "Msiexec returned: $exitCode - treating it as success" -Verbose } else { $details = (Get-MsiErrorDetails $exitCode) $logInfo = ((Get-MsiLogSummary "$logFile") -join "`n") Invoke-Failure -Message "Installation failed: [$exitCode]: $($details.Message) $($details.Hint)`: See $logFile for additional details." -ErrorCode $details.ErrorCode -Details $logInfo } } # Check if we need to set proxy environment variable if ($PSBoundParameters.ContainsKey("Proxy")) { if ($Proxy) { Write-Verbose -Message "Setting proxy configuration: $Proxy" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config set proxy.url ${Proxy} } else { Write-Verbose -Message "Clearing proxy configuration" -Verbose & "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent" config clear proxy.url } } } catch { $code = $_.Exception.Data.ErrorCode $details = $_.Exception.Data.Details if(!$code) { $code = "AZCM0150" } # default if we do not have some more specific error if ($OutFile) { [ordered]@{ status = "failed" error = [ordered]@{ message = $_.Exception.Message code = $code details = $details } } | ConvertTo-Json | Out-File $OutFile } Write-Error $_ -ErrorAction Continue if ($details) { Write-Output "Details: $details" } Send-Failure $_.Exception $code $AltHisEndpoint exit 1 } # Installation was successful if we got this far if ($OutFile) { [ordered]@{ status = "success" message = "Installation of azcmagent completed successfully" } | ConvertTo-Json | Out-File $OutFile } Write-Host "Installation of azcmagent completed successfully" exit 0 # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAitmxRzMj2mgAz # 7IYcNqpSTZ3j9XzIoIX5/eLIkeukHqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGibB2zWqPczy0PEUQK/d9i0 # TCSFUzcxErEmGx40YfRVMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALK1YVF6I65pl8zGMSBoBmOLghgpgSnFknsSfKHhP6/cj9AQ9vZAE/M90 # obp4t/XmE8TqHlSmSckOo/X/kz89or3aASuLkeKdoxXTfQvmS6H6zV0/FTYvPIEb # Szv1/nQVNbxG0QgQ2yiSDg1ioT5bNjztgThXTmQxdD7A8b16nrgdQ3N0H3xlvdk8 # vBOZtF7uFLMjTTBIZVbx6jzQMgUea+9Q3H0A1HYgbD+mtbMRTXUca2A9I9iCuiwA # 3zkigWg5k9XfDVDP/moY3U4xuM4CU657Vmm56HLMcjweiuY4yH9q2KUcfni4Lkmb # +NcLuEcdHB2FjKLeISs7Tt+jpQcri6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDdgPyyHcg+Z2ixaBTJPHGjQWttwfD2gfQMtOYQqnN+8gIGZc4yHCsf # GBMyMDI0MDIyMDE4MTgzNy45NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X9IADAiGA8yMDI0MDIyMDE1NDcx # MloYDzIwMjQwMjIxMTU0NzEyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpf0gA # AgEAMAcCAQACAg3WMAcCAQACAhOBMAoCBQDpgJmAAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAEE7f/pIHVCn6qA7/uQNhDuJdPtofY+OO4TesBp5nX3Ic2SF # RlvQiSjjUpiQVIlY2oJN3O9CUrKkFJW+6e3b/g8eMgmCQ2VG8ibIBb5/9uyy2X2I # KCdriGkGCDzmNOC+8NbQWlU/YXSOGVwhsNmrxjMGh5dKlMFIcNq456jXCsQhFMw8 # pv9J80eNokFVZquK5/hVwuY8k2LFmnmf9DzJuVC3Rd+xkuX5zbPsdKWpmOVtD2ZX # bD/VFDIKfQqNomSFQfsqIQE156rCBxx1LwhFvAkQ5sd2FIXMfyhjd7eKIFqq7/fm # 2f0uY+ahr8LxQm6cJ4XiX1pBFZTZdBnSy1xW3aoxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCZD22AL3sl5ZfRL87OYl6NESS5lpW398FJuh7gkG2ESzCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u # KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgpZ0O2UzZir194m9V1SAHkLI6gTot # v16LZ0B8wTDNXLIwDQYJKoZIhvcNAQELBQAEggIAACghw1ecwlOwVu2VsfCq7kCF # kaKQXyeipZ2QfNLW0lVSQxMytAsteWs6Eekqck/FCSqU2JEUoKfTGm6cUrcqqGga # TG52dsyPcL1qs6Rl7kRZYnxoiG3Kq37EBSRvATJk+CXx/7HEHEOxdBKxLxIMuFY4 # kujXN9/bmlICqO6Qq7EGxbZ812jwD6iKM0M+c7jARduJGUn3fdl9PJPA1MERF1lQ # sJllkWJkkeqi5GVS/rPZgJa0kr0VS694Qx5tNqUxU85aL7UG0ndmfYf0lIip0sUM # 9q3RkRJhC3dB2eufV8WpKmqgPXk2D69XA47o06N6akyHs7WQh0zVuqhoZDmJDQmP # MfEtvyAGSrK537jKhtQ5485DnC2WcDppd7NTKwcJ69sVReKsGeixnloFL04iwhRy # hsQ18D1MsG3py+cqiUEOeotCOu7V3J4/z80gN4MSemJn2lX6i8NrOG/1rqySnUpc # LsFvjW1+brptwF9qpBywcoYhTFGb7sRYMJgwtS/Z67sTliDDF7aNw6417+bNAG/R # wcN3/AYLBcx8S/DPs3UmuQF0jKWbmCYpwYDubZapbU1sg+Jwfky6xd/2dwZVXp5g # WkyRg6Sc7QYVr0OSPMJATzZupBu8dOPoBmTG2rqTKmguJ0Z+6eqfJIwsLIbg0nY/ # p70cH8PAqE/T0CM9hO0= # SIG # End signature block
combined_dataset/train/non-malicious/sample_35_88.ps1
sample_35_88.ps1
# # Module manifest for module 'OCI.PSModules.Dns' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dns.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'd69f0172-1c3b-4e1b-97f5-d455d0244e12' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dns Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dns.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDnsDomainRecords', 'Get-OCIDnsResolver', 'Get-OCIDnsResolverEndpoint', 'Get-OCIDnsResolverEndpointsList', 'Get-OCIDnsResolversList', 'Get-OCIDnsRRSet', 'Get-OCIDnsSteeringPoliciesList', 'Get-OCIDnsSteeringPolicy', 'Get-OCIDnsSteeringPolicyAttachment', 'Get-OCIDnsSteeringPolicyAttachmentsList', 'Get-OCIDnsTsigKey', 'Get-OCIDnsTsigKeysList', 'Get-OCIDnsView', 'Get-OCIDnsViewsList', 'Get-OCIDnsZone', 'Get-OCIDnsZoneContent', 'Get-OCIDnsZoneRecords', 'Get-OCIDnsZonesList', 'Get-OCIDnsZoneTransferServersList', 'Invoke-OCIDnsPatchDomainRecords', 'Invoke-OCIDnsPatchRRSet', 'Invoke-OCIDnsPatchZoneRecords', 'Move-OCIDnsResolverCompartment', 'Move-OCIDnsSteeringPolicyCompartment', 'Move-OCIDnsTsigKeyCompartment', 'Move-OCIDnsViewCompartment', 'Move-OCIDnsZoneCompartment', 'New-OCIDnsResolverEndpoint', 'New-OCIDnsSteeringPolicy', 'New-OCIDnsSteeringPolicyAttachment', 'New-OCIDnsTsigKey', 'New-OCIDnsView', 'New-OCIDnsZone', 'New-OCIDnsZoneFromZoneFile', 'Remove-OCIDnsDomainRecords', 'Remove-OCIDnsResolverEndpoint', 'Remove-OCIDnsRRSet', 'Remove-OCIDnsSteeringPolicy', 'Remove-OCIDnsSteeringPolicyAttachment', 'Remove-OCIDnsTsigKey', 'Remove-OCIDnsView', 'Remove-OCIDnsZone', 'Update-OCIDnsDomainRecords', 'Update-OCIDnsResolver', 'Update-OCIDnsResolverEndpoint', 'Update-OCIDnsRRSet', 'Update-OCIDnsSteeringPolicy', 'Update-OCIDnsSteeringPolicyAttachment', 'Update-OCIDnsTsigKey', 'Update-OCIDnsView', 'Update-OCIDnsZone', 'Update-OCIDnsZoneRecords' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dns' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/62.ps1
62.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Add-MDMApplication(){ [cmdletbinding()] param ( $JSON ) $graphApiVersion = "Beta" $App_resource = "deviceAppManagement/mobileApps" try { if(!$JSON){ write-host "No JSON was passed to the function, provide a JSON variable" -f Red break } Test-JSON -JSON $JSON $uri = "https://graph.microsoft.com/$graphApiVersion/$($App_resource)" Invoke-RestMethod -Uri $uri -Method Post -ContentType "application/json" -Body $JSON -Headers $authToken } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Test-JSON(){ param ( $JSON ) try { $TestJSON = ConvertFrom-Json $JSON -ErrorAction Stop $validJson = $true } catch { $validJson = $false $_.Exception } if (!$validJson){ Write-Host "Provided JSON isn't in valid JSON format" -f Red break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ImportPath = Read-Host -Prompt "Please specify a path to a JSON file to import data from e.g. C:\IntuneOutput\Policies\policy.json" $ImportPath = $ImportPath.replace('"','') if(!(Test-Path "$ImportPath")){ Write-Host "Import Path for JSON file doesn't exist..." -ForegroundColor Red Write-Host "Script can't continue..." -ForegroundColor Red Write-Host break } $JSON_Data = Get-Content "$ImportPath" $JSON_Convert = $JSON_Data | ConvertFrom-Json | Select-Object -Property * -ExcludeProperty id,createdDateTime,lastModifiedDateTime,version,'@odata.context',uploadState,packageId,appIdentifier,publishingState,usedLicenseCount,totalLicenseCount,productKey,licenseType,packageIdentityName $DisplayName = $JSON_Convert.displayName $JSON_Output = $JSON_Convert | ConvertTo-Json write-host write-host "MDM Application '$DisplayName' Found..." -ForegroundColor Yellow write-host $JSON_Output write-host Write-Host "MDM Application '$DisplayName'" -ForegroundColor Yellow Add-MDMApplication -JSON $JSON_Output
combined_dataset/train/non-malicious/Send-Growl _3.0.ps1
Send-Growl _3.0.ps1
## This is the first version of a Growl module (just dot-source to use in PowerShell 1.0) ## v 1.0 supports a very simple notice, and no callbacks ## v 2.0 supports registering multiple message types ## supports callbacks ## v 2.1 redesigned to be a module used from apps, rather than it's own "PowerGrowler" app ## ## TODO: ## * Test sending notices to other PCs directly ## 2011/04/13 fix for Growl for Windows v2.0.6 Set-StrictMode -Version 2 ## this is just a default now, you'll have opportunities to override it... $script:appName = "PowerGrowler" [Reflection.Assembly]::LoadFrom("$(Split-Path (gp HKCU:\\Software\\Growl).'(default)')\\Growl.Connector.dll") | Out-Null if(!(Test-Path Variable:Global:PowerGrowlerNotices)) { $global:PowerGrowlerNotices = @{} } ## We can safely recreate this, it doesn't store much $script:PowerGrowler = New-Object "Growl.Connector.GrowlConnector" function Register-GrowlType { #.Synopsis # Register a new Type name for growl notices from PowerGrowl #.Description # Creates a new type name that can be used for sending growl notices #.Parameter AppName # The name of the application you want to register as #.Parameter Name # The type name to be used sending growls #.Parameter DisplayName # The test to use for display (defaults to use the same value as the type name) #.Parameter Icon # Overrides the default icon of the message (accepts .ico, .png, .bmp, .jpg, .gif etc) #.Parameter MachineName # The name of a remote machine to register remotely instead of locally. #.Parameter Priority # Overrides the default priority of the message (use sparingly) #.Example # Register-GrowlType "PoshTwitter" "Command Completed" # # Registers the type "Command Completed," using the default icon, for sending notifications to the local PC # PARAM( [Parameter(Mandatory=$true,Position=0)] [String]$AppName , [Parameter(Mandatory=$true,Position=1)] [ValidateScript( {!$global:PowerGrowlerNotices.Contains($AppName) -OR !$global:PowerGrowlerNotices.$AppName.Notices.ContainsKey($_)} )] [String]$Name , [Parameter(Mandatory=$false,Position=5)] [String]$Icon = "$PSScriptRoot\\default.ico" , [Parameter(Mandatory=$false,Position=6)] [String]$DisplayName = $Name , [Parameter(Mandatory=$false,Position=7)] [String]$MachineName , [Parameter(Mandatory=$false)] [String]$AppIcon ) [Growl.Connector.NotificationType]$Notice = $Name $Notice.DisplayName = $DisplayName $Notice.Icon = Convert-Path (Resolve-Path $Icon) if($MachineName) { $Notice.MachineName = $MachineName } if(!$global:PowerGrowlerNotices.Contains($AppName)) { $global:PowerGrowlerNotices.Add( $AppName, ([Growl.Connector.Application]$AppName) ) $global:PowerGrowlerNotices.$AppName = Add-Member -input $global:PowerGrowlerNotices.$AppName -Name Notices -Type NoteProperty -Value (New-Object hashtable) -Passthru $global:PowerGrowlerNotices.$AppName.Icon = Convert-Path (Resolve-Path $AppIcon) } $global:PowerGrowlerNotices.$AppName.Notices.Add( $Name, $Notice ) $script:PowerGrowler.Register( $global:PowerGrowlerNotices.$AppName , [Growl.Connector.NotificationType[]]@($global:PowerGrowlerNotices.$AppName.Notices.Values) ) } function Set-GrowlPassword { #.Synopsis # Set the Growl password #.Description # Set the password and optionally, the encryption algorithm, for communicating with Growl #.Parameter Password # The password for Growl #.Parameter Encryption # The algorithm to be used for encryption (defaults to AES) #.Parameter KeyHash # The algorithm to be used for key hashing (defaults to SHA1) PARAM( [Parameter(Mandatory=$true,Position=0)] [String]$Password , [Parameter(Mandatory=$false,Position=1)] [ValidateSet( "AES", "DES", "RC2", "TripleDES", "PlainText" )] [String]$Encryption = "AES" , [Parameter(Mandatory=$false,Position=2)] [ValidateSet( "MD5", "SHA1", "SHA256", "SHA384", "SHA512" )] [String]$KeyHash = "SHA1" ) $script:PowerGrowler.EncryptionAlgorithm = [Growl.Connector.Cryptography+SymmetricAlgorithmType]::"$Encryption" $script:PowerGrowler.KeyHashAlgorithm = [Growl.Connector.Cryptography+SymmetricAlgorithmType]::"$KeyHash" $script:PowerGrowler.Password = $Password } ## Register the "PowerGrowler" "Default" notice so everything works out of the box Register-GrowlType $script:AppName "Default" -appIcon "$PsScriptRoot\\default.ico" function Register-GrowlCallback { #.Synopsis # Register a script to be called when each notice is finished. #.Description # Registers a scriptblock as a handler for the NotificationCallback event. You should accept two parameters, a Growl.Connector.Response and a Growl.Connector.CallbackData object. # # The NotificationCallback only happens when a callback is requested, which in this Growl library only happens if you pass both CallbackData and CallbackType to the Send-Growl function. #.Example # Register-GrowlCallback { PARAM( $response, $context ) # Write-Host "Response $($response|out-string)" -fore Cyan # Write-Host "Context $($context|fl|out-string)" -fore Green # Write-Host $("Response Type: {0}`nNotification ID: {1}`nCallback Data: {2}`nCallback Data Type: {3}`n" -f $context.Result, $context.NotificationID, $context.Data, $context.Type) -fore Yellow # } # # Registers an informational debugging-style handler. # PARAM( [Parameter(Mandatory=$true)] [Scriptblock]$Handler ) Register-ObjectEvent $script:PowerGrowler NotificationCallback -Action $Handler } function Send-Growl { [CmdletBinding(DefaultParameterSetName="DataCallback")] #.Synopsis # Send a growl notice #.Description # Send a growl notice with the scpecified values #.Parameter Caption # The short caption to display #.Parameter Message # The message to send (most displays will resize to accomodate) #.Parameter NoticeType # The type of notice to send. This MUST be the name of one of the registered types, and senders should bear in mind that each registered type has user-specified settings, so you should not abuse the types, but create your own for messages that will recur. # For example, the user settings allow certain messages to be disabled, set to a different "Display", or to have their Duration and Stickyness changed, as well as have them be Forwarded to another device, have Sounds play, and set different priorities. #.Parameter Icon # Overrides the default icon of the message (accepts .ico, .png, .bmp, .jpg, .gif etc) #.Parameter Priority # Overrides the default priority of the message (use sparingly) #.Example # Send-Growl "Greetings" "Hello World!" # # The Hello World of Growl. #.Example # Send-Growl "You've got Mail!" "Message for you sir!" -icon ~\\Icons\\mail.png # # Displays a message with a couple of movie quotes and a mail icon. # PARAM ( [Parameter(Mandatory=$true, Position=0)] [ValidateScript( {$global:PowerGrowlerNotices.Contains($AppName)} )] [string]$AppName , [Parameter(Mandatory=$true, Position=1)][Alias("Type")] [ValidateScript( {$global:PowerGrowlerNotices.$AppName.Notices.ContainsKey($_)} )] [string]$NoticeType , [Parameter(Mandatory=$true, Position=2)] [string]$Caption , [Parameter(Mandatory=$true, Position=3)] [string]$Message , [Parameter(Mandatory=$false, Position=4, ParameterSetName="UrlCallback")] [Uri]$Url , [Parameter(Mandatory=$false, Position=4, ParameterSetName="DataCallback")] [string]$CallbackData , [Parameter(Mandatory=$false, Position=5, ParameterSetName="DataCallback")] [string]$CallbackType , [string]$Icon , [Growl.Connector.Priority]$Priority = "Normal" ) $notice = New-Object Growl.Connector.Notification $appName, $NoticeType, (Get-Date).Ticks.ToString(), $caption, $Message if($Icon) { $notice.Icon = Convert-Path (Resolve-Path $Icon) } if($Priority) { $notice.Priority = $Priority } if($DebugPreference -gt "SilentlyContinue") { Write-Output $notice } if( Test-Path Variable:Local:Url ) { $context = new-object Growl.Connector.CallbackContext $(if(Test-Path Variable:Local:CallbackData){$CallbackData}else{$Url.ToString()}) Write-Host $Url -Fore Cyan $script:PowerGrowler.Notify($notice, $context) } elseif( (Test-Path Variable:Local:CallbackData) -and (Test-Path Variable:Local:CallbackType) ) { $context = new-object Growl.Connector.CallbackContext $CallbackData,$CallbackType Write-Host $context.CallbackUrl -Fore Magenta $script:PowerGrowler.Notify($notice, $context) } else { $script:PowerGrowler.Notify($notice) } } Export-ModuleMember -Function Send-Growl, Set-GrowlPassword, Register-GrowlCallback, Register-GrowlType
combined_dataset/train/non-malicious/2853.ps1
2853.ps1
function Invoke-psake { [CmdletBinding()] param( [Parameter(Position = 0, Mandatory = $false)] [string]$buildFile, [Parameter(Position = 1, Mandatory = $false)] [string[]]$taskList = @(), [Parameter(Position = 2, Mandatory = $false)] [string]$framework, [Parameter(Position = 3, Mandatory = $false)] [switch]$docs = $false, [Parameter(Position = 4, Mandatory = $false)] [hashtable]$parameters = @{}, [Parameter(Position = 5, Mandatory = $false)] [hashtable]$properties = @{}, [Parameter(Position = 6, Mandatory = $false)] [alias("init")] [scriptblock]$initialization = {}, [Parameter(Position = 7, Mandatory = $false)] [switch]$nologo, [Parameter(Position = 8, Mandatory = $false)] [switch]$detailedDocs, [Parameter(Position = 9, Mandatory = $false)] [switch]$notr ) try { if (-not $nologo) { "psake version {0}$($script:nl)Copyright (c) 2010-2018 James Kovacs & Contributors$($script:nl)" -f $psake.version } if (!$buildFile) { $buildFile = Get-DefaultBuildFile } elseif (!(Test-Path $buildFile -PathType Leaf) -and ($null -ne (Get-DefaultBuildFile -UseDefaultIfNoneExist $false))) { $taskList = $buildFile.Split(', ') $buildFile = Get-DefaultBuildFile } $psake.error_message = $null ExecuteInBuildFileScope $buildFile $MyInvocation.MyCommand.Module { param($currentContext, $module) $stopwatch = [System.Diagnostics.Stopwatch]::StartNew() if ($docs -or $detailedDocs) { WriteDocumentation($detailedDocs) return } try { foreach ($key in $parameters.keys) { if (test-path "variable:\$key") { set-item -path "variable:\$key" -value $parameters.$key -WhatIf:$false -Confirm:$false | out-null } else { new-item -path "variable:\$key" -value $parameters.$key -WhatIf:$false -Confirm:$false | out-null } } } catch { WriteColoredOutput "Parameter '$key' is null" -foregroundcolor Red throw } while ($currentContext.properties.Count -gt 0) { $propertyBlock = $currentContext.properties.Pop() . $propertyBlock } foreach ($key in $properties.keys) { if (test-path "variable:\$key") { set-item -path "variable:\$key" -value $properties.$key -WhatIf:$false -Confirm:$false | out-null } } . $module $initialization & $currentContext.buildSetupScriptBlock try { if ($taskList) { foreach ($task in $taskList) { invoke-task $task } } elseif ($currentContext.tasks.default) { invoke-task default } else { throw $msgs.error_no_default_task } } finally { & $currentContext.buildTearDownScriptBlock } $successMsg = $msgs.psake_success -f $buildFile WriteColoredOutput ("$($script:nl)${successMsg}$($script:nl)") -foregroundcolor Green $stopwatch.Stop() if (-not $notr) { WriteTaskTimeSummary $stopwatch.Elapsed } } $psake.build_success = $true } catch { $psake.build_success = $false $psake.error_message = FormatErrorMessage $_ $inNestedScope = ($psake.context.count -gt 1) if ( $inNestedScope ) { throw $_ } else { if (!$psake.run_by_psake_build_tester) { WriteColoredOutput $psake.error_message -foregroundcolor Red } } } finally { CleanupEnvironment } }
combined_dataset/train/non-malicious/sample_60_82.ps1
sample_60_82.ps1
$url = $args[0] Write-Host "Downloading Microsoft Edge Dev" $wc = New-Object net.webclient $msiInstaller = "$env:temp\microsoft-edge-dev.msi" $wc.Downloadfile($url, $msiInstaller) Write-Host "Installing Microsoft Edge Dev" $arguments = "/i `"$msiInstaller`" /quiet" Start-Process msiexec.exe -ArgumentList $arguments -Wait Remove-Item $msiInstaller $suffix = "\\Microsoft\\Edge Dev\\Application\\msedge.exe" if (Test-Path "${env:ProgramFiles(x86)}$suffix") { (Get-Item "${env:ProgramFiles(x86)}$suffix").VersionInfo } elseif (Test-Path "${env:ProgramFiles}$suffix") { (Get-Item "${env:ProgramFiles}$suffix").VersionInfo } else { write-host "ERROR: failed to install Microsoft Edge" exit 1 } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCADMmpfIFdXXhCe # m6Q+NeQN596UnSVzYU7JtWLGiS1zzqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMdvGUm7aF0Zb46hREU/zrq2 # u9UKTPE5IivLW0213k/NMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHEVfhow4PEHIM01GKNJdhjB4GZYFP0iSPHQbK0wL/AgWJQuA1JMyyODq # Co9Sbtf/grv8I9L4l4NAIAafD6btbdlryrKnhpTD66bSX71EV6zooNfRI40ymzbw # uRk/wM6dScbTtZm0Y+cu/glNacQhn+B534I2Muy26u0u2mfj2Fwtdlw43zT4IYCH # /tEwJPIGfrKs6/EeJXQNnkEj54LSzHGDJPe3Z36r20TzWIQgOE8On5Otx5kHuXlF # eQf8BzjStu1zM3+edcrBos6edEVwKl9SsuISrny73SHV/0h4azvEn62ICEKpf9So # gjBnswNN9WYMSN7dLvpgbrz3bkUGJKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCNcpM2yxizzUvTPNH+UbJFsRqxUbcgoXS1S4A8uAXS2QIGZk3U4SQM # GBMyMDI0MDUyMzE2MzYzNS40NjNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOn5pL4wIhgPMjAyNDA1MjMxOTE5MjZaGA8yMDI0MDUyNDE5MTkyNlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fmkvgIBADAHAgEAAgIFoDAHAgEAAgIRWzAKAgUA # 6fr2PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHAHOnFkAOIhZG98e5ul # TnYMj006y8ddnDfW+fxkC14Sa+fCfTbL1RK6WwLMN/ipRc49JVDIeM+FWw7+T+uJ # CQr/Dgl1eeYCJ/XR6QXkaomMFwlVbn7c03vhMD8xpAKj7KVGOEkJRooQQNHTA9Fu # Z0pIVmx47Yqg7t8iS03jAc/NMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg4YzYUq1kvaHofUU8C3MthVFUxgh2rsphRjvWXe5wpA8wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEIJOrmzej/kgpdUIWtxN84/vV9/w3N0VowYvY46GfvX0i # MA0GCSqGSIb3DQEBCwUABIICAK7Tss34SicM2v8eT1uNAMU6I28buTRonyIruIJZ # kez9Z7vLk38vOocPPWtV+d4R7/iIJMrM5j+nKdM+dfIGMcGo2AWVoULglZvWoqXL # 4N5ymDibPNxM9NMTVblVMBBaTD74Yu5JZy/MKxPUdxBycxGfvMBl0qW5YbT9391q # 7ySCHTlyoaqrGwlsf2SILSoAnaYJkB5tmGwnEKMFgdiNmA4BXeeSfbdHTZk4aB4W # E8iz5xMpO7SQhRVDZdFWXkNQ3I8VBIYnH+0d83SdW7WzEDqVP62ad8Y50h6ffe7s # BNgAzgmAg9KupR3yim7v1NPgT7DPvYFpxZNT0RzxCtD+pjZKiBaQ/SivtCXn1ETM # 8IKBgMVuaS1vHdSiFk5R27Q/ttNVWfnvHX8Ui5C2+Ty4l8znz45oNiSjI5y/capf # WjO6ToEGsOFqLEasJ/vHoJglAGXryR19THGXOfCzJByiMAc0bMN/r4ypOsliHrAQ # FNK+GV1d2PvlGzAnUJWW1lMG5kXwtQSxcSP4bkoMi/cUJMwBsL+3VWg5XajX/nKq # 1dScfhZGifs95ZxP4zQamfTL6xsmBT+gQFqPLUh8ZfGZBdzMMDrcytgYRNJTK/0e # 2FVtFQSU+1n7YulOC7ah++sxJHjHtAqS2SPlD4/dxLfAi+t3gW1Br12DCtg38Tyy # +diZ # SIG # End signature block
combined_dataset/train/non-malicious/2729.ps1
2729.ps1
$ErrorActionPreference = "SilentlyContinue" $o = "" | Select-Object IISInstalled if ((Get-ItemProperty HKLM:\Software\Microsoft\InetStp\Components\).W3SVC) { $o.IISInstalled = "True" } else { $o.IISInstalled = "False" } $o
combined_dataset/train/non-malicious/sample_47_1.ps1
sample_47_1.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# PowerShell Diagnostics Module This module contains a set of wrapper scripts that enable a user to use ETW tracing in Windows PowerShell. #> $script:Logman="$env:windir\system32\logman.exe" $script:wsmanlogfile = "$env:windir\system32\wsmtraces.log" $script:wsmprovfile = "$env:windir\system32\wsmtraceproviders.txt" $script:wsmsession = "wsmlog" $script:pssession = "PSTrace" $script:psprovidername="Microsoft-Windows-PowerShell" $script:wsmprovidername = "Microsoft-Windows-WinRM" $script:oplog = "/Operational" $script:analyticlog="/Analytic" $script:debuglog="/Debug" $script:wevtutil="$env:windir\system32\wevtutil.exe" $script:slparam = "sl" $script:glparam = "gl" function Start-Trace { Param( [Parameter(Mandatory=$true, Position=0)] [string] $SessionName, [Parameter(Position=1)] [ValidateNotNullOrEmpty()] [string] $OutputFilePath, [Parameter(Position=2)] [ValidateNotNullOrEmpty()] [string] $ProviderFilePath, [Parameter()] [Switch] $ETS, [Parameter()] [ValidateSet("bin", "bincirc", "csv", "tsv", "sql")] $Format, [Parameter()] [int] $MinBuffers=0, [Parameter()] [int] $MaxBuffers=256, [Parameter()] [int] $BufferSizeInKB = 0, [Parameter()] [int] $MaxLogFileSizeInMB=0 ) Process { $executestring = " start $SessionName" if ($ETS) { $executestring += " -ets" } if ($null -ne $OutputFilePath) { $executestring += " -o ""$OutputFilePath""" } if ($null -ne $ProviderFilePath) { $executestring += " -pf ""$ProviderFilePath""" } if ($null -ne $Format) { $executestring += " -f $Format" } if ($MinBuffers -ne 0 -or $MaxBuffers -ne 256) { $executestring += " -nb $MinBuffers $MaxBuffers" } if ($BufferSizeInKB -ne 0) { $executestring += " -bs $BufferSizeInKB" } if ($MaxLogFileSizeInMB -ne 0) { $executestring += " -max $MaxLogFileSizeInMB" } & $script:Logman $executestring.Split(" ") } } function Stop-Trace { param( [Parameter(Mandatory=$true, Position=0)] $SessionName, [Parameter()] [switch] $ETS ) Process { if ($ETS) { & $script:Logman update $SessionName -ets & $script:Logman stop $SessionName -ets } else { & $script:Logman update $SessionName & $script:Logman stop $SessionName } } } function Enable-WSManTrace { # winrm "{04c6e16d-b99f-4a3a-9b3e-b8325bbc781e} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii # winrsmgr "{c0a36be8-a515-4cfa-b2b6-2676366efff7} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsExe "{f1cab2c0-8beb-4fa2-90e1-8f17e0acdd5d} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WinrsCmd "{03992646-3dfe-4477-80e3-85936ace7abb} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # IPMIPrv "{651d672b-e11f-41b7-add3-c2f6a4023672} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append #IpmiDrv "{D5C6A3E9-FA9C-434e-9653-165B4FC869E4} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # WSManProvHost "{6e1b64d7-d3be-4651-90fb-3583af89d7f1} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append # Event Forwarding "{6FCDF39A-EF67-483D-A661-76D715C6B008} 0xffffffff 0xff" | Out-File $script:wsmprovfile -Encoding ascii -Append Start-Trace -SessionName $script:wsmsession -ETS -OutputFilePath $script:wsmanlogfile -Format bincirc -MinBuffers 16 -MaxBuffers 256 -BufferSizeInKB 64 -MaxLogFileSizeInMB 256 -ProviderFilePath $script:wsmprovfile } function Disable-WSManTrace { Stop-Trace $script:wsmsession -ETS } function Enable-PSWSManCombinedTrace { param ( [switch] $DoNotOverwriteExistingTrace ) $provfile = [io.path]::GetTempFilename() $traceFileName = [string][Guid]::NewGuid() if ($DoNotOverwriteExistingTrace) { $fileName = [string][guid]::newguid() $logfile = $PSHOME + "\\Traces\\PSTrace_$fileName.etl" } else { $logfile = $PSHOME + "\\Traces\\PSTrace.etl" } "Microsoft-Windows-PowerShell 0 5" | Out-File $provfile -Encoding ascii "Microsoft-Windows-WinRM 0 5" | Out-File $provfile -Encoding ascii -Append if (!(Test-Path $PSHOME\Traces)) { New-Item -ItemType Directory -Force $PSHOME\Traces | Out-Null } if (Test-Path $logfile) { Remove-Item -Force $logfile | Out-Null } Start-Trace -SessionName $script:pssession -OutputFilePath $logfile -ProviderFilePath $provfile -ETS Remove-Item $provfile -Force -ea 0 } function Disable-PSWSManCombinedTrace { Stop-Trace -SessionName $script:pssession -ETS } function Set-LogProperties { param( [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true)] [Microsoft.PowerShell.Diagnostics.LogDetails] $LogDetails, [switch] $Force ) Process { if ($LogDetails.AutoBackup -and !$LogDetails.Retention) { throw (New-Object System.InvalidOperationException) } $enabled = $LogDetails.Enabled.ToString() $retention = $LogDetails.Retention.ToString() $autobackup = $LogDetails.AutoBackup.ToString() $maxLogSize = $LogDetails.MaxLogSize.ToString() $osVersion = [Version] (Get-CimInstance Win32_OperatingSystem).Version if (($LogDetails.Type -eq "Analytic") -or ($LogDetails.Type -eq "Debug")) { if ($LogDetails.Enabled) { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ms:$MaxLogSize } } } else { if($osVersion -lt 6.3.7600) { & $script:wevtutil $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } else { & $script:wevtutil /q:$Force $script:slparam $LogDetails.Name -e:$Enabled -rt:$Retention -ab:$AutoBackup -ms:$MaxLogSize } } } } function ConvertTo-Bool([string]$value) { if ($value -ieq "true") { return $true } else { return $false } } function Get-LogProperties { param( [Parameter(Mandatory=$true, ValueFromPipeline=$true, Position=0)] $Name ) Process { $details = & $script:wevtutil $script:glparam $Name $indexes = @(1,2,8,9,10) $value = @() foreach($index in $indexes) { $value += @(($details[$index].SubString($details[$index].IndexOf(":")+1)).Trim()) } $enabled = ConvertTo-Bool $value[0] $retention = ConvertTo-Bool $value[2] $autobackup = ConvertTo-Bool $value[3] New-Object Microsoft.PowerShell.Diagnostics.LogDetails $Name, $enabled, $value[1], $retention, $autobackup, $value[4] } } function Enable-PSTrace { param( [switch] $Force, [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if (!$Properties.Enabled) { $Properties.Enabled = $true if ($Force) { Set-LogProperties $Properties -Force } else { Set-LogProperties $Properties } } } } function Disable-PSTrace { param( [switch] $AnalyticOnly ) $Properties = Get-LogProperties ($script:psprovidername + $script:analyticlog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } if (!$AnalyticOnly) { $Properties = Get-LogProperties ($script:psprovidername + $script:debuglog) if ($Properties.Enabled) { $Properties.Enabled = $false Set-LogProperties $Properties } } } Add-Type @" using System; namespace Microsoft.PowerShell.Diagnostics { public class LogDetails { public string Name { get { return name; } } private string name; public bool Enabled { get { return enabled; } set { enabled = value; } } private bool enabled; public string Type { get { return type; } } private string type; public bool Retention { get { return retention; } set { retention = value; } } private bool retention; public bool AutoBackup { get { return autoBackup; } set { autoBackup = value; } } private bool autoBackup; public int MaxLogSize { get { return maxLogSize; } set { maxLogSize = value; } } private int maxLogSize; public LogDetails(string name, bool enabled, string type, bool retention, bool autoBackup, int maxLogSize) { this.name = name; this.enabled = enabled; this.type = type; this.retention = retention; this.autoBackup = autoBackup; this.maxLogSize = maxLogSize; } } } "@ if (Get-Command logman.exe -Type Application -ErrorAction SilentlyContinue) { Export-ModuleMember Disable-PSTrace, Disable-PSWSManCombinedTrace, Disable-WSManTrace, Enable-PSTrace, Enable-PSWSManCombinedTrace, Enable-WSManTrace, Get-LogProperties, Set-LogProperties, Start-Trace, Stop-Trace } else { # Currently we only support these cmdlets as logman.exe is not available on systems like Nano and IoT Export-ModuleMember Disable-PSTrace, Enable-PSTrace, Get-LogProperties, Set-LogProperties } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBzuFp8c8UN6ilP # /hSmUPDtAUbo8uWTs6wUbaR/ZpM1B6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEgd441WP1jGfFhxRg3sMtiU # C5JDLIMXuzkPYRsZdTzgMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAfrns6dpwB8J5PFqn9EY3w1jyXLch6Hu+cnUuHnMRtURhQGmV6npmTceC # f03h5PrA/RMvd1MxmJHwwus1l0JWyM5qnaAiNjSw+7s0dGX55b4RTfKHI5TRimCz # GX9BJLVHiexkkb7D96jjoFbFa4Z6KZrd5ZGsCq88xYOS0naSWkvQ8i5eQDA7Uevs # IQAv0CDZeklxhozTg5pdYkO3ZRIZJI8DJLqTUTnqo1pFU1GcWxlayIwZKg28x76Q # OdAtue/YvXdiO/6Uj7uvrQgtCXT9bWVWx7Qo3ffP8yMDmBOyGKmYvRU4DiBBywG4 # M6ONybBa2gMS6RqBqvQ3raclfZFdm6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD8Qgy33jQQavSA/SWfEYCZDuBMGqfPhAh2f5fecr4F/gIGZbqfZ73m # GBMyMDI0MDIxNDIxMDAyOC44NjlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl3kJMwIhgPMjAyNDAyMTUwMzE4NDNaGA8yMDI0MDIxNjAzMTg0M1owdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6XeQkwIBADAKAgEAAgICsgIB/zAHAgEAAgISVDAK # AgUA6XjiEwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBABYIlfTD6DvNgZdf # NbQtUqWNr0qC08R6BMCkSGgggx8ePLM7APkzZmeHhPYzrpniefTFS1U4/hVJm3kD # YEAx7M6OQ9L5TcnXJ9DdefXYD7A4GvVOmGoajCpKAXU9gyxvsxRX4BnlXPJDjXEq # 6U/sr3rAWmM2VjGeMma9CTy6czjpMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg6wMxEnjZnnOoxC4SszcgQir2bsxGNldLiNNIdmVDrmEwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIKaaEoOXEjjHeAD99MmoMlDVtIg/PdqddyY0aIfg # 87njMA0GCSqGSIb3DQEBCwUABIICAFwzIvayOCx2g3adCVbQMS8HiXGBbTO6BeLn # +pdmqvlr41c0QUidwtrZqiS2u6mIYwyjVjbdzmVNLLzXfaG2BXnsBLIkBzHJVyjD # IWV33q3c167sMYmQILVPyW1zlvTG9lvv+kt6ZL2R4jsr0YYmGV8u+MEyQ6kCgz4J # 8hNHZe7Ku5Y4Myf/gFHvLO3ym29Rfu9uAdLV5gBS5Vn4qmOzwCSrOeM26s/0Yysv # lpyzXQwwPkWD3avGQlso7JKFG4qU2yseajrtYgMxWSxSrh6LEhgRD5WKUfjajQrQ # wdd1ZDIRWs5wRcEhRAj+4Rr7CSe1zJvzaDIzJ8oYz9UDXpi9fghc2ezHSaUvl6qb # Q0038GIg8huEDUVcNXZ0E4z6iDtyl0C1yUXnncGu9eftjiyxaVMQsRjhP9FCmabO # EtMG3kaNIPjl8654f1XH69RzVrnxTrEGUXhqe84QspDcZQmlK26kI+OasRoTXoQG # pai3YS2FrXCqVGxfZvOTcYH3rOAMhH8u7uqy55R/fBEZXj/aVod2FDRdoI4H8pXA # cJHb5N5suD5mD08LBmEqEdFfomvrlFkWI+k8EXnS8mj09tk1UvuYmRHO40vMrc6X # A5tH0wGsIHlrAeE5wC5Qc72zSICpTB6tHsGqe/YRHPDREynl9dA0FoiwvVy5K8nw # Y8vCwqAH # SIG # End signature block
combined_dataset/train/non-malicious/Compare 2 foldertrees_1.ps1
Compare 2 foldertrees_1.ps1
function Compare-Foldertrees { param( $path1, $path2 ) $len1 = $path1.length $len2 = $path2.length . Require-function Get-MD5 Write-Host "====== First path only =======`n" gci $path1 -rec | ? {! $_.PSISContainer} | % { $fileName1 = $_.fullName $fileName = $fileName1.substring($len1) $filename2 = $path2 + $fileName #$filename1 #$filename2 if (! (Test-Path $filename2)) { "$filename" } } Write-Host "`n====== Second path only =======`n" gci $path2 -rec | ? {! $_.PSISContainer} | % { $fileName2 = $_.fullName $fileName = $fileName2.substring($len2) $filename1 = $path2 + $fileName #$filename1 #$filename2 if (! (Test-Path $filename1)) { "$filename" } } Write-Host "`n====== Different =======`n" gci $path1 -rec | ? {! $_.PSISContainer} | % { $fileName1 = $_.fullName $fileName = $fileName1.substring($len1) $filename2 = $path2 + $fileName #$filename1 #$filename2 if ( (Test-Path $filename2)) { $md1 = Get-MD5($filename1) $md2 = Get-MD5($filename2) if ($md1 -ne $md2) { "$filename" & 'C:\\Program Files\\Microsoft Visual Studio 9.0\\Common7\\IDE\\diffmerge.exe' $fileName1 $filename2 } } } }
combined_dataset/train/non-malicious/sample_20_55.ps1
sample_20_55.ps1
$resourceModuleRoot = Split-Path -Path (Split-Path -Path $PSScriptRoot -Parent) -Parent # Import localization helper functions. $helperName = 'PowerShellGet.LocalizationHelper' $dscResourcesFolderFilePath = Join-Path -Path $resourceModuleRoot -ChildPath "Modules\$helperName\$helperName.psm1" Import-Module -Name $dscResourcesFolderFilePath $script:localizedData = Get-LocalizedData -ResourceName 'MSFT_PSRepository' -ScriptRoot $PSScriptRoot # Import resource helper functions. $helperName = 'PowerShellGet.ResourceHelper' $dscResourcesFolderFilePath = Join-Path -Path $resourceModuleRoot -ChildPath "Modules\$helperName\$helperName.psm1" Import-Module -Name $dscResourcesFolderFilePath <# .SYNOPSIS Returns the current state of the repository. .PARAMETER Name Specifies the name of the repository to manage. #> function Get-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [Parameter(Mandatory = $true)] [System.String] $Name ) $returnValue = @{ Ensure = 'Absent' Name = $Name SourceLocation = $null ScriptSourceLocation = $null PublishLocation = $null ScriptPublishLocation = $null InstallationPolicy = $null PackageManagementProvider = $null Trusted = $false Registered = $false } Write-Verbose -Message ($localizedData.GetTargetResourceMessage -f $Name) $repository = Get-PSRepository -Name $Name -ErrorAction 'SilentlyContinue' if ($repository) { $returnValue.Ensure = 'Present' $returnValue.SourceLocation = $repository.SourceLocation $returnValue.ScriptSourceLocation = $repository.ScriptSourceLocation $returnValue.PublishLocation = $repository.PublishLocation $returnValue.ScriptPublishLocation = $repository.ScriptPublishLocation $returnValue.InstallationPolicy = $repository.InstallationPolicy $returnValue.PackageManagementProvider = $repository.PackageManagementProvider $returnValue.Trusted = $repository.Trusted $returnValue.Registered = $repository.Registered } else { Write-Verbose -Message ($localizedData.RepositoryNotFound -f $Name) } return $returnValue } <# .SYNOPSIS Determines if the repository is in the desired state. .PARAMETER Ensure If the repository should be present or absent on the server being configured. Default values is 'Present'. .PARAMETER Name Specifies the name of the repository to manage. .PARAMETER SourceLocation Specifies the URI for discovering and installing modules from this repository. A URI can be a NuGet server feed, HTTP, HTTPS, FTP or file location. .PARAMETER ScriptSourceLocation Specifies the URI for the script source location. .PARAMETER PublishLocation Specifies the URI of the publish location. For example, for NuGet-based repositories, the publish location is similar to http://someNuGetUrl.com/api/v2/Packages. .PARAMETER ScriptPublishLocation Specifies the URI for the script publish location. .PARAMETER InstallationPolicy Specifies the installation policy. Valid values are 'Trusted' or 'Untrusted'. The default value is 'Untrusted'. .PARAMETER PackageManagementProvider Specifies a OneGet package provider. Default value is 'NuGet'. #> function Test-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $SourceLocation, [Parameter()] [System.String] $ScriptSourceLocation, [Parameter()] [System.String] $PublishLocation, [Parameter()] [System.String] $ScriptPublishLocation, [Parameter()] [ValidateSet('Trusted', 'Untrusted')] [System.String] $InstallationPolicy = 'Untrusted', [Parameter()] [System.String] $PackageManagementProvider = 'NuGet' ) Write-Verbose -Message ($localizedData.TestTargetResourceMessage -f $Name) $returnValue = $false $getTargetResourceResult = Get-TargetResource -Name $Name if ($Ensure -eq $getTargetResourceResult.Ensure) { if ($getTargetResourceResult.Ensure -eq 'Present' ) { $returnValue = Test-DscParameterState ` -CurrentValues $getTargetResourceResult ` -DesiredValues $PSBoundParameters ` -ValuesToCheck @( 'SourceLocation' 'ScriptSourceLocation' 'PublishLocation' 'ScriptPublishLocation' 'InstallationPolicy' 'PackageManagementProvider' ) } else { $returnValue = $true } } if ($returnValue) { Write-Verbose -Message ($localizedData.InDesiredState -f $Name) } else { Write-Verbose -Message ($localizedData.NotInDesiredState -f $Name) } return $returnValue } <# .SYNOPSIS Creates, removes or updates the repository. .PARAMETER Ensure If the repository should be present or absent on the server being configured. Default values is 'Present'. .PARAMETER Name Specifies the name of the repository to manage. .PARAMETER SourceLocation Specifies the URI for discovering and installing modules from this repository. A URI can be a NuGet server feed, HTTP, HTTPS, FTP or file location. .PARAMETER ScriptSourceLocation Specifies the URI for the script source location. .PARAMETER PublishLocation Specifies the URI of the publish location. For example, for NuGet-based repositories, the publish location is similar to http://someNuGetUrl.com/api/v2/Packages. .PARAMETER ScriptPublishLocation Specifies the URI for the script publish location. .PARAMETER InstallationPolicy Specifies the installation policy. Valid values are 'Trusted' or 'Untrusted'. The default value is 'Untrusted'. .PARAMETER PackageManagementProvider Specifies a OneGet package provider. Default value is 'NuGet'. #> function Set-TargetResource { <# These suppressions are added because this repository have other Visual Studio Code workspace settings than those in DscResource.Tests DSC test framework. Only those suppression that contradict this repository guideline is added here. #> [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-FunctionBlockBraces', '')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('DscResource.AnalyzerRules\Measure-IfStatement', '')] [CmdletBinding()] param ( [Parameter()] [ValidateSet('Present', 'Absent')] [System.String] $Ensure = 'Present', [Parameter(Mandatory = $true)] [System.String] $Name, [Parameter()] [System.String] $SourceLocation, [Parameter()] [System.String] $ScriptSourceLocation, [Parameter()] [System.String] $PublishLocation, [Parameter()] [System.String] $ScriptPublishLocation, [Parameter()] [ValidateSet('Trusted', 'Untrusted')] [System.String] $InstallationPolicy = 'Untrusted', [Parameter()] [System.String] $PackageManagementProvider = 'NuGet' ) $getTargetResourceResult = Get-TargetResource -Name $Name # Determine if the repository should be present or absent. if ($Ensure -eq 'Present') { $repositoryParameters = New-SplatParameterHashTable ` -FunctionBoundParameters $PSBoundParameters ` -ArgumentNames @( 'Name' 'SourceLocation' 'ScriptSourceLocation' 'PublishLocation' 'ScriptPublishLocation' 'InstallationPolicy' 'PackageManagementProvider' ) # Determine if the repository is already present. if ($getTargetResourceResult.Ensure -eq 'Present') { Write-Verbose -Message ($localizedData.RepositoryExist -f $Name) # Repository exist, update the properties. Set-PSRepository @repositoryParameters -ErrorAction 'Stop' } else { Write-Verbose -Message ($localizedData.RepositoryDoesNotExist -f $Name) # Repository did not exist, create the repository. Register-PSRepository @repositoryParameters -ErrorAction 'Stop' } } else { if ($getTargetResourceResult.Ensure -eq 'Present') { Write-Verbose -Message ($localizedData.RemoveExistingRepository -f $Name) # Repository did exist, remove the repository. Unregister-PSRepository -Name $Name -ErrorAction 'Stop' } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBlZKKmsIDI2MiW # t2Bt6XXxjORDDSKWDjB5NwOM5+2tUaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILPkVNiecDWnEn0VQqfk6D8s # 58N6XJW/9IT512/CzwquMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAEkXeZittBJJkesFrZHoyraVQOabQrwA1UMVAHW68Q9VVNPYBeVq0UaNU # oZKp3jwFXrmmhFFNswXK1mhT8Fua5eZm9kzyIspvH6BJCKL3kOoYXcVR7GCqQLb4 # OcVUh/lBYspuq0mPCZFY9xkH88LGHvvBZWYV42cgwtkk7kLpt4Axau/jVmBLljy0 # lWrYHlbSC/5SJP1dO8dXPK6NK1M/AOEw7QX1ij7UztmDsasuhJs1nQ0/kcbtWJQb # f0z04VV4GjrJiaS522b8ts8XtIi6kxnMnvmoPEppa5SBWnT4bgxjJcNFn3kZNoEC # rc++vac4IRZlFPHf1cu6G/5OoBcs8KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBzjXyOt4tgYW5eWWyqkQqQE2U2WdskytNMITzqiZhEhwIGZh+2TAGQ # GBMyMDI0MDQyMzAyMjQwOS4wMDRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRdFswIhgPMjAyNDA0MjMwNzQyMTlaGA8yMDI0MDQyNDA3NDIxOVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dF0WwIBADAHAgEAAgIP1DAHAgEAAgISDjAKAgUA # 6dLF2wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEJvaXp7B6ROIyclfeGn # 07zKDXR6j3SVyMoghjl4uaUoj81WJxX0deLVeJPyURtmjt81hVk2KWSjB0VOr021 # zUyWvsyxdVhVb7tPPKXiwtIRNqgzBqarwwym7mrG+PbmbV7A1+HUEMMjKI5J/owU # uFsNsJZTIa0ZOsOsKcJDwA+AMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgSJj4esOnq38+VAcvRao5a04P+xoT/gspoiDo5F5pwlUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEIA5fJ/+nEdtN6jKLrCIbid59sN9SleZy9MT3WBZD8wBA # MA0GCSqGSIb3DQEBCwUABIICADHcufKslDLhW+EyQedT+0FbT/Pq0E8AO/xYP5gX # lOXVlvyo+3KLUJihk/XrsImZbApwawLlaya9A31tl0tb698jJjSogqzNsi5hLhB9 # JtQhOuhvT3wVZR+WA1MUKC9uqUnkUaFWle+nIFhVRfHHP3M7RkvERs+4ZJOYapaq # 8uSuytMZrnsWWSZCpi1NSGSa6Ol68sMSbX+3WbS7N4bwORNhZlrBulQuTMPsAjqn # WWdnloszwibHWltleg/qB3Jk/8VirXBoPVhHua2ey8X2KUsPv7PtMyUNd1Hd00/0 # WeaZJ38OE/hXfisn+FgBjLEDUYARDoXSC0y+iByMBxVd1w7WHxmAEK3FQXrPcrnf # RuqwJJz9o3uqKIPPKg1TX3y6+s9OQCIThj1Sxspmm+iorU5rWBtPTOOYTsLr5hSe # u1rZIYD0ou1Jfj7TB0ufOabdla2W7rg2lcrCGBLoi++Yfcpi9Jny79bcYRFOCcTk # spC9ut2FHfN/7p/XAiC9k+x1z0DW/xyv89N9jCLr3ToMii5luqplNJQS28EBCsot # 9mkuk+YEaAmGrMugfRs9xL5/AsZWWoTONJuEicP+3A3CDVh5GY2zmVMSfdRoZFl4 # oV7v8QLT8oZg7NpdDdMJMxx4RHo9nTOTAfhEbvT2/iBqiMq/elm583cKitaM9XmC # 264W # SIG # End signature block
combined_dataset/train/non-malicious/2261.ps1
2261.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true)] $DriveLetter, [parameter(Mandatory=$true)] $FolderName ) Begin { } Process { $FolderStructure = @( "$($DriveLetter)\$($FolderName)", "$($DriveLetter)\$($FolderName)\Apps", "$($DriveLetter)\$($FolderName)\Pkgs", "$($DriveLetter)\$($FolderName)\SUM", "$($DriveLetter)\$($FolderName)\SUM\ADRs", "$($DriveLetter)\$($FolderName)\OSD", "$($DriveLetter)\$($FolderName)\OSD\BootImages", "$($DriveLetter)\$($FolderName)\OSD\CSettings", "$($DriveLetter)\$($FolderName)\OSD\DriverSources", "$($DriveLetter)\$($FolderName)\OSD\DriverPackages", "$($DriveLetter)\$($FolderName)\OSD\OSImages", "$($DriveLetter)\$($FolderName)\OSD\MDT", "$($DriveLetter)\$($FolderName)\OSD\MDT\Settings", "$($DriveLetter)\$($FolderName)\OSD\MDT\Toolkit" ) $FolderStructure | ForEach-Object { try { if (-not(Test-Path -Path $_ -ErrorAction SilentlyContinue)) { Write-Output "INFO: Creating folder $($_)" New-Item -Path $_ -ItemType Directory | Out-Null } } catch { Write-Error $_.Exception } } } End { }
combined_dataset/train/non-malicious/sample_15_22.ps1
sample_15_22.ps1
$ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:CleanupExePath = Join-Path $script:GCBinariesPath "em_extension_cleanup.exe" $script:ExtServiceName = "ExtensionService" if (Get-Service $script:ExtServiceName -ErrorAction SilentlyContinue | Where-Object {$_.Status -eq "Running"}) { Write-Host "Extension service is running and must be stopped using 'Stop-Service $script:ExtServiceName' before running the cleanup tool." exit 1 } if ($args.Length -eq 0) { Write-Host "No Arguments passed for cleanup tool. Run this script with '-h' for info on what is accepted" exit 1 } $Parameter1 = $args[0] if (($Parameter1 -eq "h") -or ($Parameter1 -eq "n") -or ($Parameter1 -eq "a") -or ($Parameter1 -eq "l")) { # Add in dash if user didn't provide it $Parameter1 = "-" + $Parameter1; } elseif (($Parameter1 -eq "help") -or ($Parameter1 -eq "name") -or ($Parameter1 -eq "all") -or ($Parameter1 -eq "list")) { # Add in dash if user didn't provide it $Parameter1 = "--" + $Parameter1; } if ($args.Length -gt 1) { $Parameter2 = $args[1] & $script:CleanupExePath $Parameter1 $Parameter2 } else { & $script:CleanupExePath $Parameter1 } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+GnaW4hiOwGjZ # C1KMSPMhx+MWWoBF5zhESHrbS0rMrqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICwWbqFlkKywiz0fJyt+eRkq # WQtolfkIimmlPcxLeCMZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAky5geE+O5F1BSETziw8cbkuKzyXUlhejDXmA79/pCSy96KG7g6gXD8uE # PqFsVCy/T0gKZpDAeljgcLzwgRdmTmdqyt0fAKcn4PnhNYWJa8cj/be59AKAxlks # 67Chold4gwlno1rGaDnDa+AW484MVkf9LotFiJGJGWa8hZrSt94gXmUEspBBugoY # MU4c97lbcw0U0Vyxfl+ar5BF+adpmiAlWdyc9sXb5kCi7QjUKpADobzpecGG+3C8 # /1ANpv85gWsuyq1Or39pHIj7cjQJK8N7zLyUyrzuy18FZ+mvSjbubr6V9dZBIJfu # dsaA5mwVts5jduf4xCD0c4USD3bsOqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBWn7WSlZZkJUknpJYgku5AGQajSBRxL42Ypy3umCebcAIGZhgk5rDS # GBMyMDI0MDQxNzE0NDMyMC4zNTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV # lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz # zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf # dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld # 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW # EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC # tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK # Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG # 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs # WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH # SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU # 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F # 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS # ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU # XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w # iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ # gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u # er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni # a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si # rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf # 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa # WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho # Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI # o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cnjaDAiGA8yMDI0MDQxNzA1NTgw # MFoYDzIwMjQwNDE4MDU1ODAwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpyeNo # AgEAMAcCAQACAgCSMAcCAQACAhPaMAoCBQDpyzToAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAJc7DENFfJaMmsy1FRwx9tr6ScYl+26jNkpTj+mtVNidiN3e # QJGidyJWM9H+Y3NYoMgclgQbPBlpj4kntmE+2cSOhECPr9hiOwg/TG6aPVcx/SYC # eBIvW3kIdmYqyRhM5+W4yShifNa6dMn5OU0LOhwS7yVmpqAMrCB1YM8EWgGHdzIk # 5aNsiFiue3emrdNP904HZBg4XwsxOFhPBqJ/SxgtfgJKDm7bJIysZyL0q188Wf0o # rwN0SFRxmFBB04IOP5yue3f+bnEbGP7nGtxGuP0Knvkf2FGK/mtY8W9dZi9PPheD # f+V76tNGvtqaE0kpbQe819s44MpLJm/AkPcML1sxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCD0b3pWx8pIak+SdPODP5Zu7meBNFhitFQ3Xzv3/5FqDTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o # CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgfIFOez/tbTjl0LuWn4zuRIP3J41i # jT6xzHvvdJxJLRswDQYJKoZIhvcNAQELBQAEggIAVnoVe3sCbQ1NKPAtxOFIJs1m # 14Mo56+ReYZI2uxAX6V+0RbGaYqZlG7UJebzCL3YG76hz6afVCxRO2YYRJgC/QuJ # K6vtMlDwlNoDX6+6GEwQw5W2ndAUb0/ZEtsiNzs8UnUv9ema2YyvDxbXSK0bk3mo # 2o2EgyQ0OOGJmJW2dPy8E9PgHA8bDFPaYSzfY2hGrfL7W+d/TV/JNBNxSxy9t5MJ # pdUSY6Tg00ricof2C7mayUqL6ZYhFSqPp9niRs+eXIXxR3kZiWaKrLoCW3tEmt9q # TPzpi2/TmREr0PLnBOOQW43l4/lNdHA4EzNo6FZ0QpNigIKILx8x6e45mkmItI3i # pjT/DR55z9fMMmNRTFqwsc76p93YOpZtWC5+vDVYlqqT8Z7DTLV+iboZSW6VzT98 # e7PndSAfasUAPpXfcTNDGhWLu//1Lb+YYaWm9vXIE9cCo0tvc6z8pQVxL7jDIo6t # ERI7pvm6oICxdZzcDahV45qfWOgojnUwbSmKBSLGFVbIVpmvOIkBkvApEj2rTlVM # 8rLKFPjO5vrHnEP9JRRfPicSqj5T+AS08x6ma4Qt5ifWBrNg2Fs8Js5iVlexxQ7e # Pe2OlXmCkIwsdT0G6ON/LzXQqrwoovYqyO/Cq7xnSNBtMGRQN7XVkXEypGmITP6a # cjDtA0VrvE9cL302KVU= # SIG # End signature block
combined_dataset/train/non-malicious/Write-Indented.ps1
Write-Indented.ps1
function Write-Host { #.Synopsis # Wraps Write-Host with support for indenting based on stack depth. #.Description # This Write-Host cmdlet customizes output. You can indent the text using PadIndent, or indent based on stack depth using AutoIndent or by setting the global variable $WriteHostAutoIndent = $true. # # You can specify the color of text by using the ForegroundColor parameter, and you can specify the background color by using the BackgroundColor parameter. The Separator parameter lets you specify a string to use to separate displayed objects. The particular result depends on the program that is hosting Windows PowerShell. #.Example # write-host "no newline test >" -nonewline # no newline test >C:\\PS> # # This command displays the input to the console, but because of the NoNewline parameter, the output is followed directly by the prompt. #.Example # C:\\PS> write-host (2,4,6,8,10,12) -Separator ", -> " -foregroundcolor DarkGreen -backgroundcolor white # 2, -> 4, -> 6, -> 8, -> 10, -> 12 # # This command displays the even numbers from 2 through 12. The Separator parameter is used to add the string , -> (comma, space, -, >, space). #.Example # write-host "Red on white text." -ForegroundColor red -BackgroundColor white # Red on white text. # # This command displays the string "Red on white text." The text is red, as defined by the ForegroundColor parameter. The background is white, as defined by the BackgroundColor parameter. #.Example # $WriteHostAutoIndent = $true # C:\\PS>&{ # >> Write-Host "Level 1" # >> &{ Write-Host "Level 2" # >> &{ Write-Host "Level 3" } # >> Write-Host "Level 2" # >> } } # Level 1 # Level 2 # Level 3 # Level 2 # # This command displays how you can set WriteHostAutoIndent to control the output of a series of nested functions that use Write-Host for logging... #.Inputs # System.Object # You can pipe objects to be written to the host #.Outputs # None # Write-Host sends objects to the host. It does not return any objects. However, the host might display the objects that Write-Host sends to it. [CmdletBinding(HelpUri='http://go.microsoft.com/fwlink/?LinkID=113426', RemotingCapability='None')] param( # Objects to display in the console. [Parameter(Position=0, ValueFromPipeline=$true, ValueFromRemainingArguments=$true)] [System.Object[]] ${Object}, # Specifies that the content displayed in the console does not end with a newline character. [switch] ${NoNewline}, # String to the output between objects displayed on the console. [System.Object] ${Separator}, # Specifies the text color. There is no default. [System.ConsoleColor] ${ForegroundColor}, # Specifies the background color. There is no default [System.ConsoleColor] ${BackgroundColor}, # If set, Write-Host will indent based on the stack depth. Defaults to the global preference variable $WriteHostAutoIndent (False). [Switch] $AutoIndent = $(if($Global:WriteHostAutoIndent){$Global:WriteHostAutoIndent}else{$False}), # Amount to indent (before auto indent). Defaults to the global preference variable $WriteHostPadIndent (0). [Int] $PadIndent = $(if($Global:WriteHostPadIndent){$Global:WriteHostPadIndent}else{0}), # Number of spaces in each indent. Defaults to the global preference variable WriteHostIndentSize (2). [Int] $IndentSize = $(if($Global:WriteHostIndentSize){$Global:WriteHostIndentSize}else{2}) ) begin { function Get-ScopeDepth { $depth = 0 trap { continue } # trap outside the do-while scope do { $null = Get-Variable PID -Scope (++$depth) } while($?) return $depth - 3 } if($PSBoundParameters.ContainsKey("AutoIndent")) { $null = $PSBoundParameters.Remove("AutoIndent") } if($PSBoundParameters.ContainsKey("PadIndent")) { $null = $PSBoundParameters.Remove("PadIndent") } if($PSBoundParameters.ContainsKey("IndentSize")) { $null = $PSBoundParameters.Remove("IndentSize") } $Indent = $PadIndent if($AutoIndent) { $Indent += (Get-ScopeDepth) * $IndentSize } $Width = $Host.Ui.RawUI.BufferSize.Width - $Indent if($PSBoundParameters.ContainsKey("Object")) { $OFS = $Separator $PSBoundParameters["Object"] = $( foreach($line in $Object) { $line = "$line".Trim("`n").Trim("`r") for($start = 0; $start -lt $line.Length; $start += $Width -1) { $Count = if($Width -gt ($Line.Length - $start)) { $Line.Length - $start} else { $Width - 1} (" " * $Indent) + $line.SubString($start,$Count).Trim() } } ) -join ${Separator} } try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Write-Host', [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters } $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $OFS = $Separator $_ = $( foreach($line in $_) { $line = "$line".Trim("`n").Trim("`r") for($start = 0; $start -lt $line.Length; $start += $Width -1) { $Count = if($Width -gt ($Line.Length - $start)) { $Line.Length - $start} else { $Width - 1} (" " * $Indent) + $line.SubString($start,$Count).Trim() } } ) -join ${Separator} $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } } function Write-Verbose { #.Synopsis # Wraps Write-Verbose with support for indenting based on stack depth. Writes text to the verbose message stream. #.Description # This Write-Verbose customizes output. You can indent the text using PadIndent, or indent based on stack depth using AutoIndent or by setting the global variable $WriteHostAutoIndent = $true. #.Example # $VerbosePreference = "Continue" # C:\\PS>write-verbose "Testing Verbose" # VERBOSE: Testing Verbose # # Setting the VerbosePreference causes Write-Verbose output to be displayed in the console #.Example # C:\\PS> write-Verbose (2,4,6,8,10,12) -Separator ", -> " # VERBOSE: 2, -> 4, -> 6, -> 8, -> 10, -> 12 # # This command displays the even numbers from 2 through 12. The Separator parameter is used to add the string , -> (comma, space, -, >, space). #.Example # $WriteVerboseAutoIndent = $true # C:\\PS>&{ # >> Write-Verbose "Level 1" # >> &{ Write-Verbose "Level 2" # >> &{ Write-Verbose "Level 3" } # >> Write-Verbose "Level 2" # >> } } # VERBOSE: Level 1 # VERBOSE: Level 2 # VERBOSE: Level 3 # VERBOSE: Level 2 # # This command displays how you can set WriteHostAutoIndent to control the output of a series of nested functions that use Write-Verbose for logging... #.Inputs # System.Object # You can pipe objects to be written to the verbose message stream. #.Outputs # None # Write-Verbose sends objects to the verbose message stream. It does not return any objects. However, the host might display the objects if the $VerbosePreference [CmdletBinding(HelpUri='http://go.microsoft.com/fwlink/?LinkID=113429', RemotingCapability='None')] param( # Objects to display in the console. [Parameter(Position=0, ValueFromPipeline=$true, ValueFromRemainingArguments=$true)] [System.Object[]] ${Message}, # String to the output between objects displayed on the console. [System.Object] ${Separator}, # If set, Write-Verbose will indent based on the stack depth. Defaults to the global preference variable $WriteVerboseAutoIndent (False). [Switch] $AutoIndent = $(if($Global:WriteVerboseAutoIndent){$Global:WriteVerboseAutoIndent}else{$False}), # Amount to indent (before auto indent). Defaults to the global preference variable $WriteVerbosePadIndent (0). [Int] $PadIndent = $(if($Global:WriteVerbosePadIndent){$Global:WriteVerbosePadIndent}else{0}), # Number of spaces in each indent. Defaults to the global preference variable WriteVerboseIndentSize (2). [Int] $IndentSize = $(if($Global:WriteVerboseIndentSize){$Global:WriteVerboseIndentSize}else{2}) ) begin { function Get-ScopeDepth { $depth = 0 trap { continue } # trap outside the do-while scope do { $null = Get-Variable PID -Scope (++$depth) } while($?) return $depth - 3 } if($PSBoundParameters.ContainsKey("AutoIndent")) { $null = $PSBoundParameters.Remove("AutoIndent") } if($PSBoundParameters.ContainsKey("PadIndent")) { $null = $PSBoundParameters.Remove("PadIndent") } if($PSBoundParameters.ContainsKey("IndentSize")) { $null = $PSBoundParameters.Remove("IndentSize") } if($PSBoundParameters.ContainsKey("Separator")) { $null = $PSBoundParameters.Remove("Separator") } $Indent = $PadIndent if($AutoIndent) { $Indent += (Get-ScopeDepth) * $IndentSize } $Prefix = "VERBOSE: ".Length $Width = $Host.Ui.RawUI.BufferSize.Width - $Indent - $Prefix if($PSBoundParameters.ContainsKey("Message")) { $OFS = $Separator $PSBoundParameters["Message"] = $( foreach($line in $Message) { $line = "$line".Trim("`n").Trim("`r") for($start = 0; $start -lt $line.Length; $start += $Width - 1) { $Count = if($Width -gt ($Line.Length - $start)) { $Line.Length - $start} else { $Width - 1} if($start) { (" " * ($Indent + $Prefix)) + $line.SubString($start,$Count).Trim() } else { (" " * $Indent) + $line.SubString($start,$Count).Trim() } } } ) -join "`n" } try { $outBuffer = $null if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { $PSBoundParameters['OutBuffer'] = 1 } $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand('Write-Verbose', [System.Management.Automation.CommandTypes]::Cmdlet) $scriptCmd = {& $wrappedCmd @PSBoundParameters } $steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin) $steppablePipeline.Begin($PSCmdlet) } catch { throw } } process { try { $OFS = $Separator $_ = $( foreach($line in $_) { $line = "$line".Trim("`n").Trim("`r") for($start = 0; $start -lt $line.Length; $start += $Width - 1) { $Count = if($Width -gt ($Line.Length - $start)) { $Line.Length - $start} else { $Width - 1} if($start) { (" " * ($Indent + $Prefix)) + $line.SubString($start,$Count).Trim() } else { (" " * $Indent) + $line.SubString($start,$Count).Trim() } } } ) -join "`n" $steppablePipeline.Process($_) } catch { throw } } end { try { $steppablePipeline.End() } catch { throw } } }
combined_dataset/train/non-malicious/sample_61_92.ps1
sample_61_92.ps1
<# : batch portion @REM ---------------------------------------------------------------------------- @REM Licensed to the Apache Software Foundation (ASF) under one @REM or more contributor license agreements. See the NOTICE file @REM distributed with this work for additional information @REM regarding copyright ownership. The ASF licenses this file @REM to you under the Apache License, Version 2.0 (the @REM "License"); you may not use this file except in compliance @REM with the License. You may obtain a copy of the License at @REM @REM http://www.apache.org/licenses/LICENSE-2.0 @REM @REM Unless required by applicable law or agreed to in writing, @REM software distributed under the License is distributed on an @REM "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY @REM KIND, either express or implied. See the License for the @REM specific language governing permissions and limitations @REM under the License. @REM ---------------------------------------------------------------------------- @REM ---------------------------------------------------------------------------- @REM Apache Maven Wrapper startup batch script, version 3.3.2 @REM @REM Optional ENV vars @REM MVNW_REPOURL - repo url base for downloading maven distribution @REM MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven @REM MVNW_VERBOSE - true: enable verbose log; others: silence the output @REM ---------------------------------------------------------------------------- @IF "%__MVNW_ARG0_NAME__%"=="" (SET __MVNW_ARG0_NAME__=%~nx0) @SET __MVNW_CMD__= @SET __MVNW_ERROR__= @SET __MVNW_PSMODULEP_SAVE=%PSModulePath% @SET PSModulePath= @FOR /F "usebackq tokens=1* delims==" %%A IN (`powershell -noprofile "& {$scriptDir='%~dp0'; $script='%__MVNW_ARG0_NAME__%'; icm -ScriptBlock ([Scriptblock]::Create((Get-Content -Raw '%~f0'))) -NoNewScope}"`) DO @( IF "%%A"=="MVN_CMD" (set __MVNW_CMD__=%%B) ELSE IF "%%B"=="" (echo %%A) ELSE (echo %%A=%%B) ) @SET PSModulePath=%__MVNW_PSMODULEP_SAVE% @SET __MVNW_PSMODULEP_SAVE= @SET __MVNW_ARG0_NAME__= @SET MVNW_USERNAME= @SET MVNW_PASSWORD= @IF NOT "%__MVNW_CMD__%"=="" (%__MVNW_CMD__% %*) @echo Cannot start maven from wrapper >&2 && exit /b 1 @GOTO :EOF : end batch / begin powershell #> $ErrorActionPreference = "Stop" if ($env:MVNW_VERBOSE -eq "true") { $VerbosePreference = "Continue" } # calculate distributionUrl, requires .mvn/wrapper/maven-wrapper.properties $distributionUrl = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionUrl if (!$distributionUrl) { Write-Error "cannot read distributionUrl property in $scriptDir/.mvn/wrapper/maven-wrapper.properties" } switch -wildcard -casesensitive ( $($distributionUrl -replace '^.*/','') ) { "maven-mvnd-*" { $USE_MVND = $true $distributionUrl = $distributionUrl -replace '-bin\.[^.]*$',"-windows-amd64.zip" $MVN_CMD = "mvnd.cmd" break } default { $USE_MVND = $false $MVN_CMD = $script -replace '^mvnw','mvn' break } } # apply MVNW_REPOURL and calculate MAVEN_HOME # maven home pattern: ~/.m2/wrapper/dists/{apache-maven-<version>,maven-mvnd-<version>-<platform>}/<hash> if ($env:MVNW_REPOURL) { $MVNW_REPO_PATTERN = if ($USE_MVND) { "/org/apache/maven/" } else { "/maven/mvnd/" } $distributionUrl = "$env:MVNW_REPOURL$MVNW_REPO_PATTERN$($distributionUrl -replace '^.*'+$MVNW_REPO_PATTERN,'')" } $distributionUrlName = $distributionUrl -replace '^.*/','' $distributionUrlNameMain = $distributionUrlName -replace '\.[^.]*$','' -replace '-bin$','' $MAVEN_HOME_PARENT = "$HOME/.m2/wrapper/dists/$distributionUrlNameMain" if ($env:MAVEN_USER_HOME) { $MAVEN_HOME_PARENT = "$env:MAVEN_USER_HOME/wrapper/dists/$distributionUrlNameMain" } $MAVEN_HOME_NAME = ([System.Security.Cryptography.MD5]::Create().ComputeHash([byte[]][char[]]$distributionUrl) | ForEach-Object {$_.ToString("x2")}) -join '' $MAVEN_HOME = "$MAVEN_HOME_PARENT/$MAVEN_HOME_NAME" if (Test-Path -Path "$MAVEN_HOME" -PathType Container) { Write-Verbose "found existing MAVEN_HOME at $MAVEN_HOME" Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD" exit $? } if (! $distributionUrlNameMain -or ($distributionUrlName -eq $distributionUrlNameMain)) { Write-Error "distributionUrl is not valid, must end with *-bin.zip, but found $distributionUrl" } # prepare tmp dir $TMP_DOWNLOAD_DIR_HOLDER = New-TemporaryFile $TMP_DOWNLOAD_DIR = New-Item -Itemtype Directory -Path "$TMP_DOWNLOAD_DIR_HOLDER.dir" $TMP_DOWNLOAD_DIR_HOLDER.Delete() | Out-Null trap { if ($TMP_DOWNLOAD_DIR.Exists) { try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } } } New-Item -Itemtype Directory -Path "$MAVEN_HOME_PARENT" -Force | Out-Null # Download and Install Apache Maven Write-Verbose "Couldn't find MAVEN_HOME, downloading and installing it ..." Write-Verbose "Downloading from: $distributionUrl" Write-Verbose "Downloading to: $TMP_DOWNLOAD_DIR/$distributionUrlName" $webclient = New-Object System.Net.WebClient if ($env:MVNW_USERNAME -and $env:MVNW_PASSWORD) { $webclient.Credentials = New-Object System.Net.NetworkCredential($env:MVNW_USERNAME, $env:MVNW_PASSWORD) } [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 $webclient.DownloadFile($distributionUrl, "$TMP_DOWNLOAD_DIR/$distributionUrlName") | Out-Null # If specified, validate the SHA-256 sum of the Maven distribution zip file $distributionSha256Sum = (Get-Content -Raw "$scriptDir/.mvn/wrapper/maven-wrapper.properties" | ConvertFrom-StringData).distributionSha256Sum if ($distributionSha256Sum) { if ($USE_MVND) { Write-Error "Checksum validation is not supported for maven-mvnd. `nPlease disable validation by removing 'distributionSha256Sum' from your maven-wrapper.properties." } Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) { Write-Error "Error: Failed to validate Maven distribution SHA-256, your Maven distribution might be compromised. If you updated your Maven version, you need to update the specified distributionSha256Sum property." } } # unzip and move Expand-Archive "$TMP_DOWNLOAD_DIR/$distributionUrlName" -DestinationPath "$TMP_DOWNLOAD_DIR" | Out-Null Rename-Item -Path "$TMP_DOWNLOAD_DIR/$distributionUrlNameMain" -NewName $MAVEN_HOME_NAME | Out-Null try { Move-Item -Path "$TMP_DOWNLOAD_DIR/$MAVEN_HOME_NAME" -Destination $MAVEN_HOME_PARENT | Out-Null } catch { if (! (Test-Path -Path "$MAVEN_HOME" -PathType Container)) { Write-Error "fail to move MAVEN_HOME" } } finally { try { Remove-Item $TMP_DOWNLOAD_DIR -Recurse -Force | Out-Null } catch { Write-Warning "Cannot remove $TMP_DOWNLOAD_DIR" } } Write-Output "MVN_CMD=$MAVEN_HOME/bin/$MVN_CMD"
combined_dataset/train/non-malicious/sample_29_33.ps1
sample_29_33.ps1
Import-LocalizedData -BindingVariable locSbeTxt -FileName AzStackHci.SBEHealth.Strings.psd1 function Copy-SBEContentLocalToNode { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string]$PackagePath, [Parameter(Mandatory=$true)] [string]$TargetNodeName, [Parameter(Mandatory=$false)] [string[]]$ExcludeDirs, [Parameter(Mandatory=$false)] [string[]]$ExcludeFiles, [PSCredential]$Credential ) $copyItems = @() $sbeConfig = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.SBEConfiguration" $sbeConfigDest = "" if ($env:ComputerName -eq $TargetNodeName) { $dest = Join-Path -Path $env:SystemDrive -ChildPath "SBE\Extracted" } else { $root = '\\' + $TargetNodeName + '\' + ($env:SystemDrive ).Replace(':','$') $dest = $root + '\SBE\Extracted' $sbeConfigDest = Join-Path -Path $root -ChildPath ($sbeConfig.Replace($env:SystemDrive,'')) $drv = New-PSDrive -Credential $Credential -Name SBE -PSProvider FileSystem -Root $root } $copyItems += @{Source=$PackagePath;Destination=$dest} if (-not([string]::IsNullOrWhitespace($sbeConfigDest))) { $copyItems += @{Source=$sbeConfig;Destination=$sbeConfigDest} } [string]$exclude = "" if ($ExcludeFiles.Count -ne 0) { $exclude += " /XF $ExcludeFiles" } if ($ExcludeDirs.Count -ne 0) { $exclude += " /XD $ExcludeDirs" } foreach ($item in $copyItems) { Log-Info -Message ($locSbeTxt.CopySBEToNode -f $item.Source, $item.Destination) -Type Info $copyCmd = "robocopy.exe $($item.Source) $($item.Destination) *.* /MIR /NP /R:2 /W:10$exclude" $output = Invoke-Command -ScriptBlock { cmd.exe /c $copyCmd } # Check for exit code. If exit code is greater than 7, an error occurred while peforming the copy operation. if ($LASTEXITCODE -ge 8) { Log-Info -Message ($locSbeTxt.RobocopyFailed -f $LASTEXITCODE) -ConsoleOut -Type Error Log-Info -Message ($output | Out-String).Trim() -ConsoleOut -Type Info if ($drv) { $drv | Remove-PSDrive -ErrorAction SilentlyContinue } return $false } } if ($drv) { $drv | Remove-PSDrive -ErrorAction SilentlyContinue } return $true } function Get-SBEHealthCheckParams { # TODO : Implement calling these SBESolutionExtensionHelper functions once they are implemented to supply these param values # $credList = Get-SBECredentialList -SecretStoreConfig [PSObject]$storeConfig # $hostData = Get-AllNodesData -BareMetalConfig [PSObject]$BareMetalConfig # $partnerProp = Get-SBEPartnerProperties -SBERoleConfig [PSObject]$sbeRoleConfig # For $Tag we may need logic to convert EnvChkr Tag to partner Tag values $credList = $null $hostData = $null $partnerProp = $null $params = @{ CredentialList = $credList HostData = $hostData PartnerProperties = $partnerProp Tag = $Tag } return $params } function Test-SolutionExtensionModule { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $PackagePath, [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $solExtModule = $null Log-Info -Message ($locSbeTxt.SBEPackagePath -f $PackagePath) -Type Info if ($PSSession) { $computername = $PsSession.ComputerName } else { $computername = $env:ComputerName } # Validate the SolutionExtension module using a function from the SBE Role Helper module $sbValidate = { try { if ($null -eq $PackagePath) { $PackagePath = $using:PackagePath } $sbeRoleNuget = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Role.SBE" Import-Module "$($sbeRoleNuget)\content\Helpers\SBESolutionExtensionHelper.psm1" -Force -ErrorAction Stop -Verbose:$false -DisableNameChecking -Global | Out-Null $solExtModulePath = Join-Path -Path $PackagePath -ChildPath "Configuration\SolutionExtension" $solExtModule = Initialize-SolutionExtensionModule -SolExtFilePath $solExtModulePath -RequireTag "HealthServiceIntegration" -AssertCertificate return $solExtModule } catch { Write-Output "An exception occurred while validating the SolutionExtension module: " + ($PSItem | Format-List * | Out-String).Trim() } } $solExtModule = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sbValidate } else { Invoke-Command -ScriptBlock $sbValidate } if ($null -eq $solExtModule) { Log-Info -Message ($locSbeTxt.NoHeatlhChecks) -Type Info return $false } elseif ($solExtModule -match "An exception occurred") { throw $solExtModule } return $true } function Invoke-TestSBEContentIntegrity { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $SBEMetadataPath, [Parameter(Mandatory=$true)] [string] $SBEContentPath, [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $sbIntegrity = { if ($null -eq $SBEMetadataPath) { $SBEMetadataPath = $using:SBEMetadataPath } if ($null -eq $SBEContentPath) { $SBEContentPath = $using:SBEContentPath } try { if (-not(Get-Command -Name Test-SBEContentIntegrity -ErrorAction SilentlyContinue)) { $sbeRoleNuget = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.Role.SBE" Import-Module "$($sbeRoleNuget)\content\Helpers\SBESolutionExtensionHelper.psm1" -Force -ErrorAction Stop -Verbose:$false -DisableNameChecking -Global | Out-Null } $skipDir = @("IntegratedContent") Test-SBEContentIntegrity -SBEMetadataDirPath $SBEMetadataPath -SBEContentPath $SBEContentPath -IgnoreTopLevelFolder $skipDir } catch { throw $PSItem } } $result = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sbIntegrity } else { Invoke-Command -ScriptBlock $sbIntegrity } return $result } function Import-SolutionExtensionModule { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [string] $PackagePath, [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop # Import the SolutionExtension module $solExtModule = (Join-Path -Path $PackagePath -ChildPath "Configuration\SolutionExtension\SolutionExtension.psd1") Log-Info -Message ($locSbeTxt.ModuleToImport -f $solExtModule) -Type Info $sbImport = { try { if ($null -eq $solExtModule) { $solExtModule = $using:solExtModule } Import-Module $solExtModule -Force -ErrorAction Stop -Verbose:$false -DisableNameChecking -Global | Out-Null } catch { Write-Output "An error occurred while importing the SolutionExtension module: " + ($PSItem | Format-List * | Out-String).Trim() } } $result = if ($PsSession) { Invoke-Command -Session $PsSession -ScriptBlock $sbImport } else { Invoke-Command -ScriptBlock $sbImport } if ($result -match "An exception occurred") { throw $solExtModule } return $true } function New-SBEHealthResultObject { param ( [Parameter(Mandatory=$true)] [string]$TargetName, [Parameter()] [string]$TestName, [Parameter()] [ValidateSet('CRITICAL','WARNING','INFORMATIONAL')] [string]$Severity = 'INFORMATIONAL', [Parameter()] [ValidateSet('SUCCESS', 'FAILURE', 'ERROR')] [string]$Status, [Parameter()] [string]$Description, [Parameter()] [string]$Detail, [Parameter()] [bool]$PopulateAdditionalData = $true ) $name = 'AzStackHci_SBEHealth' $title = 'SBE' if (-not([string]::IsNullOrWhiteSpace($TestName))) { $name += "_$TestName" $title += " $TestName" } $name += "_$TargetName" if (-not($title.EndsWith(" Health Check"))) { $title += " Health Check" } $params = @{ Name = $name Title = $title DisplayName = $title Severity = $Severity Description = $Description Tags = @{} Remediation = '' TargetResourceID = $TargetName TargetResourceName = $TargetName TargetResourceType = 'SBEHealth' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $TargetName Resource = 'SBEHealth' Detail = $Detail Status = $Status TimeStamp = $resultObj.Timestamp } HealthCheckSource = $ENV:EnvChkrId } $resultObj = New-AzStackHciResultObject @params return $resultObj } function Get-ResultObject { $resultObject = @{ "Name" = "" "DisplayName" = "" "Title"= "" "Description" = "" "Status" = "" "Severity" = "" "Timestamp" = "" "TargetResourceID" = "" "TargetResourceName" = "" "TargetResourceType" = "" "Tags" = @{} "AdditionalData" = @{} "HealthCheckSource" = "" "Remediation" = "" } return $resultObject } function Assert-ResponseSchemaValid { [CmdletBinding()] param ( [PSObject[]]$ResultObject ) $expectedSchema = Get-ResultObject foreach ($item in $ResultObject) { # Assert Name or Title must contain information if ([string]::IsNullOrWhiteSpace($item.Name) -and [string]::IsNullOrWhiteSpace($item.Title)) { $msg = "Both Name and Title properties of this result object are empty" Log-Info -Message $msg -Type Error $item.AdditionalData.NameTitleEmpty = $msg $item.Severity = 'CRITICAL' $item.Status = "Error" } elseif ([string]::IsNullOrWhiteSpace($item.Name)) { $item.Name = $item.Title } elseif ([string]::IsNullOrWhiteSpace($item.Title)) { $item.Title = $item.Name } # Assert response contains expected schema properties foreach ($expectedKey in $expectedSchema.Keys) { if (-not($item.ContainsKey($expectedKey))) { # TODO : Temporary special case to add DisplayName if missing due to this being added after partner communication if ($key -eq "DisplayName") { $item.DisplayName = $item.Title } else { Log-Info -Message "Expected result property '$($expectedKey)' was not found" -Type Warning $item.$expectedKey = "" # TODO : In the future, we should decide how to better handle these cases of missing properties } } } # Assert Status values if ($item.Status -notin @("Success", "Failure", "Error")) { $msg = "Unexpected Status: '$($item.Status)'" Log-Info -Message $msg $item.AdditionalData.StatusDiscrepancy = $msg $item.Status = "Error" } # Assert Severity values if ($item.Severity -notin @('CRITICAL', 'WARNING', 'INFORMATIONAL')) { $msg = "Unexpected Severity: '$($item.Severity)'" $item.AdditionalData.SeverityDiscrepancy = $msg if ($item.Status -eq "Success") { $item.Severity = 'WARNING' Log-Info -Message $msg -Type Warning } else { $item.Severity = 'CRITICAL' Log-Info -Message $msg -Type Error } } } return $ResultObject } Export-ModuleMember -Function Test-* Export-ModuleMember -Function New-SBEHealthResultObject Export-ModuleMember -Function Get-SBEHealthCheckParams Export-ModuleMember -Function Copy-SBEContentLocalToNode Export-ModuleMember -Function Import-SolutionExtensionModule Export-ModuleMember -Function Assert-ResponseSchemaValid Export-ModuleMember -Function Invoke-TestSBEContentIntegrity # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCo2q71+hNAxiPA # zhwld2i0bfi91SEcRPk5rKrOlrQveqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOoHRI//OKT0U5s3s7t5PxvY # f+opR1fdoxIq411C0FY1MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAaq+7aAfUhSSNUMPj6DVchv6OKNpmub09uHDUfxs9BOIyW/hh9qK8zjEZ # bf2H9GgIuPZzPUldqW0Z2a2dJJODcfMV/2CPK8t9FV+PNq1uA8Po5z9wr/QAy5BO # nVLepWNJpSh7Wmt0sywBI93gdL5b3Hs8Z6YRs6FqdwQM0EkfIWVYJ0XRnCqpbSAP # x/HSbgrWtfTC4oCoTDLn440MUrUIyPiPvSvn6H7ST4dS9DCw0rG6S7n/GqWPXh1W # XkHxxBmMOMni/kT7zGH49HtblhzQfkclCuPqNZohB8xs7dnRkLTzmo3VNrtDqpZE # qzuNXmL4V9D7VwmRxsHpNOsmmMmho6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCLy4ton2vMG18MfWxEJuiTP8xoqcMVhCys8SE1nqokaQIGZbwS6brO # GBMyMDI0MDIxMjE0MDcwOC43NTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6 # G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q # 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G # HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR # mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX # STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai # PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug # 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc # EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j # cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4 # nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH # fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H # oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c # 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W # bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT # 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl # Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I # glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD # VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S # 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK # ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8 # MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe # 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ # 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRolzAiGA8yMDI0MDIxMjA5NTEx # OVoYDzIwMjQwMjEzMDk1MTE5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiX # AgEAMAoCAQACAiY/AgH/MAcCAQACAhOAMAoCBQDpdboXAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAIeJj1Hw+sb1l/Ps+mMe19bwjz4JymTkkcg4/ZlM8LxH # 9fkRHefrXaZ6DCazKS3epw5b58/BWoFMgcbQ45EggsR0O80tcVQxZZu9i38A//4H # Y6IhXO45bl8BajblrQ+4B0VEH+qxyk2qQKxeyiNaahLczgvfq86urkunZ5LaXGVW # 6Q5NVzIhu1X5Dbx/AwhCqG6BN1PcIYVrcrBJK3ot2XMbL3kSojn7/ahLaswmAmNX # a052rk01sRRF04kuuS1fBFnuwFqwaNQ7nQ1u9z7fl5nPnMrUG+tIJHW4sjYbsuYG # kWVpYpukdWCg/0bLr6S5/5ISkM3NHeSXPoU3LydiMWUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB # 6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDlyVnFO+S15NPVjqHtr8PujF6WHKUlHSLO9eoCG36D # OzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh # 5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgZ/tX+K4cIAQr7/jYomvwBCtf # vDto7JlyjY5tCOO7B40wDQYJKoZIhvcNAQELBQAEggIAsJVfoywXhNKaEQP8UcPG # j/cAm5glIuDO3/EYSwupv0HXkHQa1Xn+9P46aIvCviA65qvknuzxpJmxIdqfXyDV # mCfgeYoo2STIaSU8sQ3CzN5pH2qt9pcqcw30mv1beUc/qxrrxJfqWVE9APJtlK+h # tJYI4ASicnglSRICQvRNOSgO9CdegML+CQpjTZWTcw+ZAJlzb1fJrZV9mVqsbzyT # WSKtcjBbK8CpjLVIFYG3AcR3YqVdmSbnWmKHb+h552KqTXee77gM1PNPQy/my+bE # JqIE4ffC/LUNSXzN30ihxRELru5tgdQ00wCyiVH14Yhn6r5PJ2JETxfsIezTpxPw # vvcoVo8kWq8bRYu8fasStk2I1Yn1FMaalVk+n72f7ubb0+gifaoL8wFzRUToL6B2 # d7hEB+jsJUVPoeMEq0f41cGEZfZr69YMYdrF22dwnJTFzdPMG58Srl5E8sna9w7c # 0G8Kh8QkjdKCyjp9+OLVbIiyFDH47l9Uml4yjjN23y4S+FGV2Zv8SCT935UOuojs # DW2FjpHz4fie7LfbvgR2GedBumIUw99C6cUs38yBpQEKTmRMjdvSekjruD3Ylm52 # eZxqfL0ER+LPs541X9UyJXwQ8Tv1YBhtKraflY7TuRfGZ2/SEQsGKjMy1lo09BZQ # 0DEJnTnx75fLVDpj0k1YHXU= # SIG # End signature block
combined_dataset/train/non-malicious/Get-OnlineHelp.ps1
Get-OnlineHelp.ps1
## This is a VERY EARLY prototype of a function that could retrieve cmdlet help from TechNet ... ## and hypothetically, other online help sites which used the same format (none) # REQUIRES the HttpRest module, to convert XHTML to XML (Uses Get-WebPageContent below) # Otherwise I'm getting 503 errors when trying to resolve the DTD (need to look into that param( [Parameter(Mandatory=$true,Position=0)] [String]$Name , [Parameter(Mandatory=$false,Position=1)] [String[]]$Sections= @("Name", "Synopsis", "Syntax", "Description") ) # http://poshcode.org/1718 function Select-Expand { <# .Synopsis Like Select-Object -Expand, but with recursive iteration of a select chain .Description Takes a dot-separated series of properties to expand, and recursively iterates the output of each property ... .Parameter Property A collection of property names to expand. Each property can be a dot-separated series of properties, and each one is expanded, iterated, and then evaluated against the next .Parameter InputObject The input to be selected from .Parameter Unique If set, this becomes a pipeline hold-up, and the total output is checked to ensure uniqueness .Parameter EmptyToo If set, Select-Expand will include empty/null values in it's output .Example Get-Help Get-Command | Select-Expand relatedLinks.navigationLink.uri -Unique This will return the online-help link for Get-Command. It's the equivalent of running the following command: C:\\PS> Get-Help Get-Command | Select-Object -Expand relatedLinks | Select-Object -Expand navigationLink | Select-Object -Expand uri | Where-Object {$_} | Select-Object -Unique #> param( [Parameter(ValueFromPipeline=$false,Position=0)] [string[]]$Property , [Parameter(ValueFromPipeline=$true)] [Alias("IO")] [PSObject[]]$InputObject , [Switch]$Unique , [Switch]$EmptyToo ) begin { if($unique) { $output = @() } } process { foreach($io in $InputObject) { foreach($prop in $Property -split "\\.") { if($io -ne $null) { $io = $io | Select-Object -Expand $prop Write-Verbose $($io | out-string) } } if(!$EmptyToo -and ($io -ne $null)) { $io = $io | Where-Object {$_} } if($unique) { $output += @($io) } else { Write-Output $io } } } end { if($unique) { Write-Output $output | Select-Object -Unique } } } # New-Alias slep Select-Expand function Get-OnlineHelpContent { param( [Parameter(Mandatory=$true,Position=0)] [String]$Name , [Parameter(Mandatory=$false,Position=1)] [String[]]$Sections= @("Name", "Synopsis", "Syntax", "Description") ) process { $uri = Get-Help $Name | Select-Expand relatedLinks.navigationLink.uri -Unique if(!$uri) { throw "Couldn't find online help URL for $Name" } $req = [System.Net.HttpWebRequest]::Create($uri) $req.Method = "HEAD" $response = $req.GetResponse() $uri = $response.ResponseUri.AbsoluteUri + "(pull)" $response.Close() # clean up like a good boy write-verbose "Fetching: $uri" # LEST THERE BE ANY DOUBT: THIS uses HttpRest to convert XHTML to XML $global:OnlineHelpContent = Get-WebPageContent $uri "//*[local-name()='div' and @class='ContentArea']" # Name, Synopsis, Syntax, Description, $NameNode = $global:OnlineHelpContent.SelectSingleNode("//*[local-name()='div' and @class='topic']/*[local-name()='div' and @class='title']") $NameNode.SetAttribute("header","NAME") $global:OnlineHelpContent = $global:OnlineHelpContent.SelectSingleNode("//*[local-name()='div' and @id='mainBody']") $Synopsis = $global:OnlineHelpContent.SelectSingleNode("*[local-name()='p']") $Synopsis.SetAttribute("header","SYNOPSIS") $headers = $OnlineHelpContent.h2 | ForEach-Object { $_.InnerText().Trim() } $content = $OnlineHelpContent.div | ForEach-Object { $_ } $global:help = @{Name=$NameNode; Synopsis=$Synopsis} if($headers.Count -ne $content.Count) { Write-Warning "Unmatched content" foreach($header in $headers) { $help.$header = $OnlineHelpContent.SelectNodes( "//*[preceding-sibling::*[1][local-name()='h2' and normalize-space()='$header']]" ) $help.$header.SetAttribute("header",$header.ToUpper()) } } else { for($h=0;$h -lt $headers.Count; $h++){ $help.($headers[$h]) = $content[$h] $help.($headers[$h]).SetAttribute("header",$headers[$h].ToUpper()) } } $help $content[$Sections] | ForEach-Object { Write-Output Write-Output $_.Header Write-Output Write-Output ($_.InnerText() -replace '^[\\n\\s]*\\n|\\n\\s+$') } } } Get-OnlineHelpContent $Name | out-null $help[$Sections] | ForEach-Object { Write-Host Write-Host $_.Header -Fore Cyan Write-Host Write-Host ($_.InnerText() -replace '^[\\n\\s]*\\n|\\n\\s+$') }
combined_dataset/train/non-malicious/Install-Solarized.ps1
Install-Solarized.ps1
param($Path = "~\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Windows PowerShell.lnk" ) # SOLARIZED HEX 16/8 TERMCOL XTERM/HEX L*A*B RGB HSB # --------- ------- ---- ------- ----------- ---------- ----------- ----------- # base03 #002b36 8/4 brblack 234 #1c1c1c 15 -12 -12 0 43 54 193 100 21 # base02 #073642 0/4 black 235 #262626 20 -12 -12 7 54 66 192 90 26 # base01 #586e75 10/7 brgreen 240 #585858 45 -07 -07 88 110 117 194 25 46 # base00 #657b83 11/7 bryellow 241 #626262 50 -07 -07 101 123 131 195 23 51 # base0 #839496 12/6 brblue 244 #808080 60 -06 -03 131 148 150 186 13 59 # base1 #93a1a1 14/4 brcyan 245 #8a8a8a 65 -05 -02 147 161 161 180 9 63 # base2 #eee8d5 7/7 white 254 #e4e4e4 92 -00 10 238 232 213 44 11 93 # base3 #fdf6e3 15/7 brwhite 230 #ffffd7 97 00 10 253 246 227 44 10 99 # yellow #b58900 3/3 yellow 136 #af8700 60 10 65 181 137 0 45 100 71 # orange #cb4b16 9/3 brred 166 #d75f00 50 50 55 203 75 22 18 89 80 # red #dc322f 1/1 red 160 #d70000 50 65 45 220 50 47 1 79 86 # magenta #d33682 5/5 magenta 125 #af005f 50 65 -05 211 54 130 331 74 83 # violet #6c71c4 13/5 brmagenta 61 #5f5faf 50 15 -45 108 113 196 237 45 77 # blue #268bd2 4/4 blue 33 #0087ff 55 -10 -45 38 139 210 205 82 82 # cyan #2aa198 6/6 cyan 37 #00afaf 60 -35 -05 42 161 152 175 74 63 # green #859900 2/2 green 64 #5f8700 60 -20 65 133 153 0 68 100 60 ## On Windows, we don't have "Magenta" and "BrightMagenta" -- We have "Magenta" and "DarkMagenta" ## Consequently, the Solarized order is confusing, we'll use the .Net ConsoleColor order instead $Black = 0 $DarkBlue = 1 $DarkGreen = 2 $DarkCyan = 3 $DarkRed = 4 $DarkMagenta = 5 $DarkYellow = 6 ## Yes, these really are switched, numerically speaking ... ## They're really DarkWhite (Gray) and LightBlack (DarkGray) $Gray = 7 $DarkGray = 8 $Blue = 9 $Green = 10 $Cyan = 11 $Red = 12 $Magenta = 13 $Yellow = 14 $White = 15 # Requires the "Get-Link script":http://poshcode.org/2493 $lnk = Get-Link $Path $lnk.ConsoleColors[$Black] = "#002b36" # Base03 $lnk.ConsoleColors[$DarkBlue] = "#073642" # Base02 $lnk.ConsoleColors[$DarkGreen] = "#586e75" # Base01 $lnk.ConsoleColors[$DarkCyan] = "#657b83" # Base00 $lnk.ConsoleColors[$DarkRed] = "#839496" # Base0 $lnk.ConsoleColors[$DarkMagenta] = "#6c71c4" # Violet $lnk.ConsoleColors[$DarkYellow] = "#cb4b16" # Orange $lnk.ConsoleColors[$Gray] = "#eee8d5" # Base2 $lnk.ConsoleColors[$DarkGray] = "#93a1a1" # Base1 $lnk.ConsoleColors[$Blue] = "#268bd2" # Blue $lnk.ConsoleColors[$Green] = "#859900" # Green $lnk.ConsoleColors[$Cyan] = "#2aa198" # Cyan $lnk.ConsoleColors[$Red] = "#dc322f" # Red $lnk.ConsoleColors[$Magenta] = "#d33682" # Magenta $lnk.ConsoleColors[$Yellow] = "#b58900" # Yellow $lnk.ConsoleColors[$White] = "#fdf6e3" # Base3 $lnk.Save() ## You need to put these at the top of your profile now ... ## BEGIN SOLARIZING ---------------------------------------------- ## Based on whether we're elevated or not, switch between DARK and LIGHT versions of Solarized: if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( # current user is an administrator (Note: ROLE, not GROUP) [Security.Principal.WindowsIdentity]::GetCurrent()) ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { # Set the WindowTitlePrefix for my prompt function, so it won't need to test for IsInRole Administrator again. $Host.UI.RawUI.WindowTitle = $global:WindowTitlePrefix = "PoSh ${Env:UserName}@${Env:UserDomain} (ADMIN)" $Host.UI.RawUI.BackgroundColor = "White" $Host.UI.RawUI.ForegroundColor = "DarkCyan" } else { $Host.UI.RawUI.WindowTitle = $global:WindowTitlePrefix = "PoSh ${Env:UserName}@${Env:UserDomain}" $Host.UI.RawUI.BackgroundColor = "Black" $Host.UI.RawUI.ForegroundColor = "DarkRed" } Clear-Host $Host.PrivateData.ErrorForegroundColor = "Magenta" $Host.PrivateData.ErrorBackgroundColor = $Host.UI.RawUI.BackgroundColor $Host.PrivateData.WarningForegroundColor = "DarkYellow" $Host.PrivateData.WarningBackgroundColor = $Host.UI.RawUI.BackgroundColor $Host.PrivateData.DebugForegroundColor = "Yellow" $Host.PrivateData.DebugBackgroundColor = $Host.UI.RawUI.BackgroundColor $Host.PrivateData.VerboseForegroundColor = "Blue" $Host.PrivateData.VerboseBackgroundColor = $Host.UI.RawUI.BackgroundColor $Host.PrivateData.ProgressForegroundColor = "Green" $Host.PrivateData.ProgressBackgroundColor = $Host.UI.RawUI.BackgroundColor ## END SOLARIZING ----------------------------------------------
combined_dataset/train/non-malicious/New-Activity.ps1
New-Activity.ps1
# # By Adam Driscoll # This is very much a test function to see if this was possible. There was no polishing done. Please visit # http://csharpening.net/?p=867 for more information. # function global:Test-IsCommonParameter { param ( $Parameter ) 'WhatIf','Confirm','UseTransaction','Verbose','Debug','OutBuffer','OutVariable','WarningVariable','ErrorVariable','ErrorAction','WarningAction' -contains $Parameter.Name } function global:New-Activity { param( [string] $CommandName, [String] $OutputAssembly ) $Command = Get-Command -Name $CommandName $ParameterString = "" foreach($parameter in $Command.Parameters.Values ) { if (Test-IsCommonParameter -Parameter $Parameter) { continue } $ParameterType = $parameter.ParameterType if ($ParameterType -match "switch") { $ParameterType = "SwitchParameter" } if ($ParameterType -match "scriptblock") { $ParameterType = "ScriptBlock" } $ParameterString += " [ParameterSpecificCategory] public InArgument<$ParameterType> $($Parameter.Name) {get;set;} " } $MethodString = "" foreach($parameter in $command.Parameters.Values) { if (Test-IsCommonParameter -Parameter $Parameter) { continue } $ParameterName = $parameter.Name $MethodString += " if (this.$ParameterName.Expression != null) { shell2.AddParameter(`"$ParameterName`", this.$ParameterName.Get(context)); } " } $ClassName = $Command.Name.Replace("-", "") $FullName = $command.ModuleName + "\\" + $command.Name Add-Type -OutputType Library -OutputAssembly $OutputAssembly -ReferencedAssemblies "System.Activities","C:\\windows\\assembly\\GAC_MSIL\\Microsoft.PowerShell.Workflow.ServiceCore\\3.0.0.0__31bf3856ad364e35\\Microsoft.PowerShell.Workflow.ServiceCore.dll" -TypeDefinition " using System.Activities; using System.Management.Automation; using Microsoft.PowerShell.Activities; using System; namespace CustomActitivies { public sealed class $ClassName : PSRemotingActivity { public $ClassName() { base.DisplayName = `"$ClassName`"; } $ParameterString protected override ActivityImplementationContext GetPowerShell(NativeActivityContext context) { PowerShell shell = PowerShell.Create(); PowerShell shell2 = shell.AddCommand(this.PSCommandName); $MethodString ActivityImplementationContext context2 = new ActivityImplementationContext(); context2.PowerShellInstance = shell; return context2; } public override string PSCommandName { get { return @`"$FullName`"; } } } } " }
combined_dataset/train/non-malicious/1492.ps1
1492.ps1
function Remove-ItemWithRetry($item, [Switch]$Recurse) { if( -not (Test-Path $item) ) { return } $RecurseParam = if( $Recurse ) { '-Recurse' } else { '' } $numTries = 0 do { if( -not (Test-Path $item) ) { return $true } if( $Recurse ) { Remove-Item $item -Recurse -Force -ErrorAction SilentlyContinue } else { Remove-Item $item -Force -ErrorAction SilentlyContinue } if( Test-Path $item ) { Start-Sleep -Milliseconds 100 } else { return $true } $numTries += 1 } while( $numTries -lt 20 ) return $false }
combined_dataset/train/non-malicious/122.ps1
122.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-ManagedDevices(){ [cmdletbinding()] param ( [switch]$IncludeEAS, [switch]$ExcludeMDM ) $graphApiVersion = "beta" $Resource = "deviceManagement/managedDevices" try { $Count_Params = 0 if($IncludeEAS.IsPresent){ $Count_Params++ } if($ExcludeMDM.IsPresent){ $Count_Params++ } if($Count_Params -gt 1){ write-warning "Multiple parameters set, specify a single parameter -IncludeEAS, -ExcludeMDM or no parameter against the function" Write-Host break } elseif($IncludeEAS){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource" } elseif($ExcludeMDM){ $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'eas'" } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=managementAgent eq 'mdm' and managementAgent eq 'easmdm'" Write-Warning "EAS Devices are excluded by default, please use -IncludeEAS if you want to include those devices" Write-Host } (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Set-ManagedDevice(){ [cmdletbinding()] param ( $id, $ownertype ) $graphApiVersion = "Beta" $Resource = "deviceManagement/managedDevices" try { if($id -eq "" -or $id -eq $null){ write-host "No Device id specified, please provide a device id..." -f Red break } if($ownerType -eq "" -or $ownerType -eq $null){ write-host "No ownerType parameter specified, please provide an ownerType. Supported value personal or company..." -f Red Write-Host break } elseif($ownerType -eq "company"){ $JSON = @" { ownerType:"company" } "@ write-host write-host "Are you sure you want to change the device ownership to 'company' on this device? Y or N?" $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ $uri = "https://graph.microsoft.com/beta/deviceManagement/managedDevices('$ID')" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $Json -ContentType "application/json" } else { Write-Host "Change of Device Ownership for the device $ID was cancelled..." -ForegroundColor Yellow Write-Host } } elseif($ownerType -eq "personal"){ $JSON = @" { ownerType:"personal" } "@ write-host write-host "Are you sure you want to change the device ownership to 'personal' on this device? Y or N?" $Confirm = read-host if($Confirm -eq "y" -or $Confirm -eq "Y"){ $uri = "https://graph.microsoft.com/beta/deviceManagement/managedDevices('$ID')" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $Json -ContentType "application/json" } else { Write-Host "Change of Device Ownership for the device $ID was cancelled..." -ForegroundColor Yellow Write-Host } } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $ManagedDevice = Get-ManagedDevices | Where-Object { $_.deviceName -eq "IPADMINI4" } if($ManagedDevice){ if(@($ManagedDevice.count) -gt 1){ Write-Host "More than 1 device was found, script supports single deviceID..." -ForegroundColor Red Write-Host break } else { write-host "Device Name:"$ManagedDevice.deviceName -ForegroundColor Cyan write-host "Management State:"$ManagedDevice.managementState write-host "Operating System:"$ManagedDevice.operatingSystem write-host "Device Type:"$ManagedDevice.deviceType write-host "Last Sync Date Time:"$ManagedDevice.lastSyncDateTime write-host "Jail Broken:"$ManagedDevice.jailBroken write-host "Compliance State:"$ManagedDevice.complianceState write-host "Enrollment Type:"$ManagedDevice.enrollmentType write-host "AAD Registered:"$ManagedDevice.aadRegistered write-host "Management Agent:"$ManagedDevice.managementAgent Write-Host "User Principal Name:"$ManagedDevice.userPrincipalName Write-Host "Owner Type:"$ManagedDevice.ownerType -ForegroundColor Yellow Set-ManagedDevice -id $ManagedDevice.id -ownertype personal } } else { Write-Host "No Managed Device found..." -ForegroundColor Red Write-Host }